Subversion Repositories ALCASAR

Rev

Rev 3298 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
672 richard 1
#!/bin/bash
2454 tom.houday 2
#  $Id: alcasar.sh 3309 2026-01-04 00:29:23Z rexy $
1 root 3
 
2969 rexy 4
# ALCASAR is a Free and open source NAC (Network Access Controler) created by Franck BOUIJOUX (3abtux), Pascal LEVANT and Richard REY (Rexy)
3230 rexy 5
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares Coovachilli, freeradius, mariaDB, apache, php, netfilter, e2guardian, ntpd, openssl, unbound, gammu, Ulog, fail2ban, vnstat, wkhtml2pdf, ipt_NETFLOW, NFsen and NFdump
2969 rexy 6
# contact : info@alcasar.net
959 franck 7
 
1 root 8
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
2969 rexy 9
# This script is distributed under the Gnu General Public License (GPLV3)
2466 richard 10
 
1 root 11
# Options :
376 franck 12
#       -i or --install
13
#       -u or --uninstall
14
# Functions :
2990 rexy 15
#	system_testing	: Free space test and mageia version test
16
#	network_testing	: Internet connectivity tests
1221 richard 17
#	init			: Installation of RPM and scripts
18
#	network			: Network parameters
2552 rexy 19
#	ACC				: ALCASAR Control Center installation
20
#	CA				: Certification Authority initialization
1837 richard 21
#	time_server		: NTPd configuration
1221 richard 22
#	init_db			: Initilization of radius database managed with MariaDB
2421 richard 23
#	freeradius		: FreeRadius initialisation
2990 rexy 24
#	chilli			: Coovachilli initialisation (+authentication page)
2521 armand.ito 25
#	e2guardian		: E2Guardian filtering HTTP proxy configuration
2990 rexy 26
#	ulogd			: Log system in userland (match NFLOG target of iptables)
3248 rexy 27
#	nfsen			: Configuration of netflow collector (nfcapd) and Netflow grapher (nfsen-ng)
2688 lucas.echa 28
#	unbound			: Name server configuration
2990 rexy 29
#	vnstat			: Little network stat daemon
2688 lucas.echa 30
#	BL				: Adaptation of Toulouse University BlackList : split into 3 BL (for unbound, for e2guardian and for Netfilter)
1266 richard 31
#	cron			: Logs export + watchdog + connexion statistics
1389 richard 32
#	fail2ban		: Fail2ban IDS installation and configuration
33
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
2969 rexy 34
#	msec			: Mageia security package configuration
2304 tom.houday 35
#	letsencrypt		: Let's Encrypt client
2990 rexy 36
#	mail_service	: Mail service for email authentification method
2552 rexy 37
#	post_install	: Security, log rotation, etc.
1 root 38
 
2499 tom.houday 39
DEBUG_ALCASAR='off'; export DEBUG_ALCASAR	# Debug mode = wait (hit key) after each function
1 root 40
DATE=`date '+%d %B %Y - %Hh%M'`
41
DATE_SHORT=`date '+%d/%m/%Y'`
595 richard 42
Lang=`echo $LANG|cut -c 1-2`
3219 rexy 43
export LC_ALL=C		 					# switch to default language
1362 richard 44
mode="install"
1 root 45
# ******* Files parameters - paramètres fichiers *********
2552 rexy 46
DIR_INSTALL=`pwd`						# current directory
1015 richard 47
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
48
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
2552 rexy 49
DIR_BLACKLIST="$DIR_INSTALL/blacklist"	# install directory (with blacklist files)
50
DIR_SAVE="/var/Save"					# backup directory (traceability_log, user_db, security_log)
3230 rexy 51
DIR_WEB="/var/www/html"					# directory of Apache
3197 rexy 52
DIR_E2G="/etc/e2guardian"				# directory of E2Guardian
2552 rexy 53
DIR_ACC="$DIR_WEB/acc"					# directory of the 'ALCASAR Control Center'
1015 richard 54
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
55
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
2688 lucas.echa 56
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (unbound for instance)
2552 rexy 57
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"	# central ALCASAR conf file
1015 richard 58
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
1 root 59
# ******* DBMS parameters - paramètres SGBD ********
2552 rexy 60
DB_RADIUS="radius"						# database name used by FreeRadius server
61
DB_USER="radius"						# user name allows to request the users database
62
DB_GAMMU="gammu"						# database name used by Gammu-smsd
1 root 63
# ******* Network parameters - paramètres réseau *******
2552 rexy 64
HOSTNAME="alcasar"						# default hostname
3238 rexy 65
DOMAIN="lan"							# default local domain
2736 rexy 66
EXTIF=''								# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
67
INTIF=''								# INTIF is connected to the consultation network
1148 crox53 68
MTU="1500"
1243 richard 69
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
1 root 70
# ****** Paths - chemin des commandes *******
71
SED="/bin/sed -i"
72
# ****************** End of global parameters *********************
73
 
2724 rexy 74
license()
959 franck 75
{
76
	if [ $Lang == "fr" ]
1538 richard 77
	then
3190 rexy 78
		echo "                   *******************************"
79
		echo "                   **** Licence d'utilisation ****"
80
		echo "                   *******************************"
81
		echo
82
		echo "ALCASAR est un logiciel libre"
83
		echo
84
		echo "Avant de l'installer, vous devez accepter les termes de sa licence 'GPL-V3'"
85
		echo "Le descriptif de cette licence est disponible dans le fichier 'GPL-3.0.txt'"
86
		echo "Une traduction française est disponible dans le fichier 'GPL-3.0.fr.txt'."
87
		echo
88
		echo "Les objectifs de cette licence sont de garantir à l'utilisateur :"
89
		echo "- La liberté d'exécuter le logiciel, pour n'importe quel usage ;"
90
		echo "- La liberté d'étudier et d'adapter le logiciel à ses besoins ;"
91
		echo "- La liberté de redistribuer des copies ;"
92
		echo "- L'obligation de faire bénéficier à la communauté les versions modifiées."
93
		echo
1538 richard 94
	else
3190 rexy 95
		echo "                   *******************************"
96
		echo "                   ****      User License     ****"
97
		echo "                   *******************************"
98
		echo
99
		echo "ALCASAR is an open source software"
100
		echo
101
		echo "Before install it, you must understand and accept the license 'GPL-V3'"
102
		echo "you can read this license in the file 'GPL-3.0.txt'"
103
		echo
104
		echo "The goals of this license are :"
105
		echo "- the freedom of using the software ;"
106
		echo "- the freedom of studying et adapting it for its own uses ;"
107
		echo "- the freedom of redistributing copies of it ;"
108
		echo "- the compulsory of giving the modify versions to the community"
109
		echo
959 franck 110
	fi
1538 richard 111
	response=0
2760 lucas.echa 112
	PTN='^[oOyYnN]?$'
113
	until [[ "$response" =~ $PTN ]]
1538 richard 114
	do
115
		if [ $Lang == "fr" ]
1563 franck 116
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
1538 richard 117
			else echo -n "Do you accept the terms of this license (Y/n)? : "
118
		fi
119
		read response
120
	done
121
	if [ "$response" = "n" ] || [ "$response" = "N" ]
122
	then
123
		exit 1
124
	fi
2724 rexy 125
} # End of license()
959 franck 126
 
2724 rexy 127
header_install()
1 root 128
{
129
	clear
130
	echo "-----------------------------------------------------------------------------"
460 richard 131
	echo "                     ALCASAR V$VERSION Installation"
1 root 132
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
133
	echo "-----------------------------------------------------------------------------"
2724 rexy 134
} # End of header_install()
1 root 135
 
2552 rexy 136
########################################################
2990 rexy 137
##                  "system_testing"                  ##
3190 rexy 138
## - Test distribution version                        ##
2552 rexy 139
## - Test ALCASAR version (if already installed)      ##
140
## - Test free space on /var  (>10G)                  ##
141
## - Test Internet access                             ##
142
########################################################
2990 rexy 143
system_testing()
29 richard 144
{
1529 richard 145
# Test of Mageia version
3043 rexy 146
# extract the current Mageia version and hardware architecture (X86_64)
3190 rexy 147
	fic="/etc/product.id"
148
	DISTRIBUTION_NAME=`cat $fic|cut -d"," -f2|cut -d"=" -f2`
149
	DISTRIBUTION_VERSION=`cat $fic|cut -d"," -f4|cut -d"=" -f2`
150
	DISTRIBUTION_ARCH=`cat $fic|cut -d"," -f7|cut -d"=" -f2`
151
	if [ "$DISTRIBUTION_ARCH" != "x86_64" ]
2149 richard 152
		then
153
		if [ $Lang == "fr" ]
2669 tom.houday 154
			then echo "Votre architecture matérielle doit être en 64bits"
155
			else echo "You hardware architecture must be 64bits"
2149 richard 156
		fi
2482 lucas.echa 157
		exit 1
2149 richard 158
	fi
3190 rexy 159
	if [[("$DISTRIBUTION_NAME" != "Mageia" ) || (( "$DISTRIBUTION_VERSION" != "8" ) && ( "$DISTRIBUTION_VERSION" != "9" ))]]
2688 lucas.echa 160
	then
2669 tom.houday 161
		if [ -e /var/tmp/alcasar-conf.tar.gz ] # update
162
			then
163
			echo
164
			if [ $Lang == "fr" ]
165
				then
166
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
167
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
3077 rexy 168
				echo "2 - Installez Linux-Mageia 8 et ALCASAR (cf. doc d'installation)"
2669 tom.houday 169
				echo "3 - Importez votre base des usagers"
170
			else
171
				echo "The automatic update of ALCASAR can't be performed."
172
				echo "1 - Save your traceability files and the user database"
3077 rexy 173
				echo "2 - Install Linux-Mageia 8 & ALCASAR (cf. installation doc)"
2669 tom.houday 174
				echo "3 - Import your users database"
175
			fi
176
		else
177
			if [ $Lang == "fr" ]
178
				then echo "L'installation d'ALCASAR ne peut pas être réalisée."
179
				else echo "The installation of ALCASAR can't be performed."
180
			fi
181
		fi
182
		echo
183
		if [ $Lang == "fr" ]
3077 rexy 184
			then echo "Le système d'exploitation doit être remplacé (Mageia8)"
185
			else echo "The OS must be replaced (Mageia8)"
2669 tom.houday 186
		fi
2688 lucas.echa 187
		exit 1
2669 tom.houday 188
	fi
189
 
1362 richard 190
# Test if ALCASAR is already installed
191
	if [ -e $CONF_FILE ]
192
	then
2396 tom.houday 193
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
1342 richard 194
		if [ $Lang == "fr" ]
2669 tom.houday 195
			then echo "La version $current_version d'ALCASAR est déjà installée"
196
			else echo "ALCASAR version $current_version is already installed"
1342 richard 197
		fi
1362 richard 198
		response=0
2458 richard 199
		PTN='^[12]$'
2760 lucas.echa 200
		until [[ "$response" =~ $PTN ]]
1362 richard 201
		do
202
			if [ $Lang == "fr" ]
2669 tom.houday 203
				then echo -n "Tapez '1' pour une mise à jour; Tapez '2' pour une réinstallation : "
204
				else echo -n "Hit '1' for an update; Hit '2' for a reinstallation : "
2499 tom.houday 205
			fi
1362 richard 206
			read response
207
		done
2458 richard 208
		if [ "$response" = "2" ]
1362 richard 209
		then
2560 rexy 210
			rm -f /var/tmp/alcasar-conf*
3273 rexy 211
		else 
2870 rexy 212
# Create the archive of conf files
3273 rexy 213
			[ ! -e /usr/bin/mariadb_install_db ] && ln -s /usr/bin/mariadb-install-db /usr/bin/mariadb_install_db # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
214
			[ ! -e /usr/sbin/mysqld-prepare-db-dir ] && ln -s /usr/sbin/mariadb-prepare-db-dir /usr/sbin/mysqld-prepare-db-dir # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
215
			$DIR_DEST_BIN/alcasar-daemon.sh
3206 rexy 216
			$DIR_DEST_BIN/alcasar-conf.sh --create
1362 richard 217
			mode="update"
218
		fi
3180 rexy 219
	else
220
		license
1529 richard 221
	fi
2847 rexy 222
# Free /var (when updating) and test free space
223
	[ -d /var/log/netflow ] && rm -rf /var/log/netflow  # remove old porttracker RRD database
224
	journalctl -q --vacuum-files 1  # remove previous journal logs
2771 rexy 225
	free_space=`df -BG --output=avail /var|tail -1|tr -d '[:space:]G'`
226
	if [ $free_space -lt 10 ]
1529 richard 227
		then
2771 rexy 228
		if [ $Lang == "fr" ]
2847 rexy 229
			then echo "Espace disponible insuffisant sur /var ($free_space Go au lieu de 10 Go au minimum)"
2771 rexy 230
			else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
1529 richard 231
		fi
2771 rexy 232
	exit 0
1529 richard 233
	fi
2990 rexy 234
} # End of system_testing
2669 tom.houday 235
 
2870 rexy 236
########################################################
2990 rexy 237
##                   "network_testing"                ##
238
## - Internet access test                             ##
2870 rexy 239
########################################################
2990 rexy 240
network_testing()
2870 rexy 241
{
2669 tom.houday 242
# Detect external/internal interfaces
243
	if [ -z "$EXTIF" ]; then
3112 rexy 244
		GwListSorted=$(/usr/sbin/ip r list | grep default | cut -d" " -f5 | uniq )
245
		nb_gw=$(echo $GwListSorted | wc -w)
246
		if [ $nb_gw -eq 0 ]; then
2669 tom.houday 247
			if [ "$Lang" == 'fr' ]
2771 rexy 248
				then echo "Aucune passerelle par défaut configurée"
249
				else echo "No default gateway configured"
2669 tom.houday 250
			fi
251
			exit 1
3112 rexy 252
		elif [ $nb_gw -eq 1 ]; then
253
			EXTIF="$GwListSorted"
254
		else
255
			if [ "$Lang" == 'fr' ]
256
				then echo -n "Erreur : Plusieurs interfaces ont une passerelle par défaut ( "
257
				else echo -n "Error : Several interfaces have a default gateway ( "
258
			fi
259
				echo "$GwListSorted" | tr "\n" " "
260
				echo ")"
261
			exit 1
2669 tom.houday 262
		fi
263
	fi
264
	if [ "$Lang" == 'fr' ]
265
		then echo "Interface externe (Internet) utilisée : $EXTIF"
266
		else echo "External interface (Internet) used: $EXTIF"
267
	fi
268
 
269
	if [ -z "$INTIF" ]; then
3112 rexy 270
		IntifListSorted=$(/usr/sbin/ip -br link show | cut -d' ' -f1 | grep -v "^\(lo\|tun0\|$EXTIF\)\$" | uniq | sort)
271
		IntifCount=$(echo "$IntifListSorted" | wc -w)
272
		if [ $IntifCount -eq 0 ]; then
2669 tom.houday 273
			if [ "$Lang" == 'fr' ]
274
				then echo "Aucune interface de disponible pour le réseau interne"
275
				else echo "No interface available for the internal network"
276
			fi
277
			exit 1
3112 rexy 278
		elif [ $IntifCount -eq 1 ]; then
279
			INTIF="$IntifListSorted"
2669 tom.houday 280
		else
3112 rexy 281
			IntifPreferred=$(echo "$IntifListSorted" | head -1 | cut -d' ' -f1)
2669 tom.houday 282
			if [ "$Lang" == 'fr' ]
3112 rexy 283
				then echo 'Liste des interfaces disponibles pour le réseau interne :'
284
				else echo 'List of available interfaces for internal network:'
2669 tom.houday 285
			fi
3112 rexy 286
			echo "$IntifListSorted"
2669 tom.houday 287
			response=''
288
			while true; do
289
				if [ "$Lang" == 'fr' ]
3112 rexy 290
					then echo -n "Choix de l'interface interne ? [$IntifPreferred] "
291
					else echo -n "Choice of internal interface ? [$IntifPreferred] "
2669 tom.houday 292
				fi
293
				read response
3112 rexy 294
				[ -z "$response" ] && response="$IntifPreferred"
2669 tom.houday 295
 
296
				# Check if interface exist
3112 rexy 297
				if [ "$(echo "$IntifListSorted" | grep -c "^$response\$")" -eq 1 ]; then
2669 tom.houday 298
					INTIF="$response"
299
					break
300
				else
301
					if [ "$Lang" == 'fr' ]
302
						then echo "Interface \"$response\" introuvable"
303
						else echo "Interface \"$response\" not found"
304
					fi
305
				fi
306
			done
307
		fi
308
	fi
309
	if [ "$Lang" == 'fr' ]
310
		then echo "Interface interne utilisée : $INTIF"
311
		else echo "Internal interface used: $INTIF"
312
	fi
313
 
2290 richard 314
	if [ $Lang == "fr" ]
315
		then echo -n "Tests des paramètres réseau : "
2549 tom.houday 316
		else echo -n "Network parameters tests: "
2290 richard 317
	fi
318
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
2688 lucas.echa 319
	cd /etc/sysconfig/network-scripts/ || { echo "Unable to find /etc/sysconfig/network-scripts directory"; exit 1; }
2290 richard 320
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
2282 richard 321
	for i in $IF_INTERFACES
322
	do
2688 lucas.echa 323
		if [ "$(/usr/sbin/ip link | grep -c " $i:")" -eq 0 ]; then
2282 richard 324
			rm -f ifcfg-$i
2454 tom.houday 325
 
2282 richard 326
			if [ $Lang == "fr" ]
327
				then echo "Suppression : ifcfg-$i"
2549 tom.houday 328
				else echo "Deleting: ifcfg-$i"
2282 richard 329
			fi
330
		fi
331
	done
2688 lucas.echa 332
	cd $DIR_INSTALL || { echo "Unable to find $DIR_INSTALL directory"; exit 1; }
2290 richard 333
	echo -n "."
2454 tom.houday 334
# Test Ethernet NIC links state
2669 tom.houday 335
	interfacesDown=$(/usr/sbin/ip -br link | grep "^\($EXTIF\|$INTIF\) " | grep 'NO-CARRIER' | cut -d' ' -f1)
336
	if [ ! -z "$interfacesDown" ]; then
337
		for i in $interfacesDown; do
338
			if [ $Lang == "fr" ]
339
			then
340
				echo -e "\nÉchec"
341
				echo "Le lien réseau de la carte $i n'est pas actif."
342
				echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
343
			else
344
				echo -e "\nFailed"
345
				echo "The link state of $i interface is down."
346
				echo "Make sure that this network card is connected to a switch or an A.P."
347
			fi
348
		done
349
		exit 1
350
	fi
1471 richard 351
	echo -n "."
352
# Test EXTIF config files
2681 tom.houday 353
	PUBLIC_IP_MASK=`/usr/sbin/ip addr show $EXTIF | grep '^\s*inet\s' | awk '{ print $2 }'`
354
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d'/' -f1`
2981 rexy 355
	PUBLIC_GATEWAY=`/usr/sbin/ip route list | awk -v EXTIF="$EXTIF" '(/ via / && $5 == EXTIF) {print $3}' | head -n 1`
2688 lucas.echa 356
	if [ "$(echo $PUBLIC_IP|wc -c)" -lt 7 ] || [ "$(echo $PUBLIC_GATEWAY|wc -c)" -lt 7 ]
1471 richard 357
	then
784 richard 358
		if [ $Lang == "fr" ]
2454 tom.houday 359
		then
2669 tom.houday 360
			echo -e "\nÉchec"
784 richard 361
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
362
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
1362 richard 363
			echo "Appliquez les changements : 'systemctl restart network'"
784 richard 364
		else
2669 tom.houday 365
			echo -e "\nFailed"
784 richard 366
			echo "The Internet connected network card ($EXTIF) isn't well configured."
367
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
2669 tom.houday 368
			echo "Apply the new configuration: 'systemctl restart network'"
784 richard 369
		fi
830 richard 370
		echo "DEVICE=$EXTIF"
784 richard 371
		echo "IPADDR="
372
		echo "NETMASK="
373
		echo "GATEWAY="
374
		echo "DNS1="
375
		echo "DNS2="
830 richard 376
		echo "ONBOOT=yes"
2669 tom.houday 377
		exit 1
784 richard 378
	fi
379
	echo -n "."
2290 richard 380
# Test if default GW is alive
3214 rexy 381
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
2688 lucas.echa 382
	if [ "$(expr $arp_reply)" -eq 0 ]
2454 tom.houday 383
		then
595 richard 384
		if [ $Lang == "fr" ]
2454 tom.houday 385
		then
2669 tom.houday 386
			echo -e "\nÉchec"
2290 richard 387
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
595 richard 388
			echo "Réglez ce problème puis relancez ce script."
389
		else
2669 tom.houday 390
			echo -e "\nFailed"
2290 richard 391
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
595 richard 392
			echo "Resolv this problem, then restart this script."
393
		fi
2669 tom.houday 394
		exit 1
308 richard 395
	fi
396
	echo -n "."
2290 richard 397
# Test Internet connectivity
2669 tom.houday 398
	domainTested='www.google.com'
399
	/usr/bin/curl -s --head "$domainTested" &>/dev/null
400
	if [ $? -ne 0 ]; then
595 richard 401
		if [ $Lang == "fr" ]
2454 tom.houday 402
		then
2669 tom.houday 403
			echo -e "\nLa tentative de connexion vers Internet a échoué ($domainTested)."
595 richard 404
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
405
			echo "Vérifiez la validité des adresses IP des DNS."
406
		else
2669 tom.houday 407
			echo -e "\nThe Internet connection try failed ($domainTested)."
595 richard 408
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
409
			echo "Verify the DNS IP addresses"
410
		fi
2669 tom.houday 411
		exit 1
29 richard 412
	fi
308 richard 413
	echo ". : ok"
2990 rexy 414
} # End of network_testing()
302 richard 415
 
2552 rexy 416
#######################################################################
2990 rexy 417
##                             "init"                                ##
2552 rexy 418
## - Creation of ALCASAR conf file "/usr/local/etc/alcasar.conf      ##
419
## - Creation of random password for GRUB, mariadb (admin and user)  ##
420
#######################################################################
2724 rexy 421
init()
302 richard 422
{
527 richard 423
	if [ "$mode" != "update" ]
302 richard 424
	then
425
# On affecte le nom d'organisme
597 richard 426
		header_install
302 richard 427
		ORGANISME=!
428
		PTN='^[a-zA-Z0-9-]*$'
2760 lucas.echa 429
		until [[ "$ORGANISME" =~ $PTN ]]
2454 tom.houday 430
		do
595 richard 431
			if [ $Lang == "fr" ]
2454 tom.houday 432
				then echo -n "Entrez le nom de votre organisme : "
597 richard 433
				else echo -n "Enter the name of your organism : "
595 richard 434
			fi
330 franck 435
			read ORGANISME
613 richard 436
			if [ "$ORGANISME" == "" ]
2688 lucas.echa 437
			then
330 franck 438
				ORGANISME=!
439
			fi
440
		done
302 richard 441
	fi
1 root 442
# On crée aléatoirement les mots de passe et les secrets partagés
2419 richard 443
# We create random passwords and shared secrets
628 richard 444
	rm -f $PASSWD_FILE
2419 richard 445
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
2688 lucas.echa 446
	grub2pwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c8`
2454 tom.houday 447
	pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
448
		LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
449
		grep -v '[eE]nter password:' | \
450
		sed -e "s/PBKDF2 hash of your password is //"`
3222 rexy 451
	[ -e /etc/grub.d/default-40_custom ]  || cp /etc/grub.d/40_custom /etc/grub.d/default-40_custom
452
	echo "set superusers=\"root\"" >> /etc/grub.d/40_custom
453
	echo "password_pbkdf2 root $pbkdf2" >> /etc/grub.d/40_custom
2419 richard 454
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
2454 tom.houday 455
	echo "GRUB2_user=root" >> $PASSWD_FILE
456
	echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
3269 rexy 457
	dbpwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2419 richard 458
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
3269 rexy 459
	echo "db_root=$dbpwd" >> $PASSWD_FILE
2688 lucas.echa 460
	radiuspwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2419 richard 461
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
2421 richard 462
	echo "db_user=$DB_USER" >> $PASSWD_FILE
463
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
2688 lucas.echa 464
	secretuam=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2412 tom.houday 465
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
466
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
2688 lucas.echa 467
	secretradius=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2412 tom.houday 468
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
469
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
3135 rexy 470
	csrfkey=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
471
	echo "# Key used to create CSRF-tokens in several ACC forms" >> $PASSWD_FILE
472
	echo "csrf_key=$csrfkey" >> $PASSWD_FILE
628 richard 473
	chmod 640 $PASSWD_FILE
1828 richard 474
#  copy scripts in in /usr/local/bin
2664 tom.houday 475
	cp -fr $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown -R root:root $DIR_DEST_BIN/alcasar* ; chmod -R 740 $DIR_DEST_BIN/alcasar*
1828 richard 476
#  copy conf files in /usr/local/etc
1954 richard 477
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
3269 rexy 478
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mariadb.sh
3222 rexy 479
# generate main conf file
628 richard 480
	cat <<EOF > $CONF_FILE
612 richard 481
##########################################
482
##                                      ##
483
##          ALCASAR Parameters          ##
484
##                                      ##
485
##########################################
1 root 486
 
612 richard 487
INSTALL_DATE=$DATE
488
VERSION=$VERSION
489
ORGANISM=$ORGANISME
490
EOF
628 richard 491
	chmod o-rwx $CONF_FILE
2724 rexy 492
} # End of init()
1 root 493
 
2552 rexy 494
#########################################################
2990 rexy 495
##                     "network"                       ##
2552 rexy 496
## - Define the several network address                ##
497
## - Define the DNS naming                             ##
498
## - INTIF parameters (consultation network)           ##
499
## - Write "/etc/hosts" file                           ##
500
## - write "hosts.allow" & "hosts.deny" files          ##
501
#########################################################
2724 rexy 502
network()
1 root 503
{
504
	header_install
636 richard 505
	if [ "$mode" != "update" ]
506
		then
507
		if [ $Lang == "fr" ]
508
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
509
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
510
		fi
511
		response=0
2760 lucas.echa 512
		PTN='^[oOyYnN]?$'
513
		until [[ "$response" =~ $PTN ]]
1 root 514
		do
595 richard 515
			if [ $Lang == "fr" ]
659 richard 516
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
618 richard 517
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
595 richard 518
			fi
1 root 519
			read response
520
		done
636 richard 521
		if [ "$response" = "n" ] || [ "$response" = "N" ]
522
		then
523
			PRIVATE_IP_MASK="0"
524
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
2760 lucas.echa 525
			until [[ $(expr "$PRIVATE_IP_MASK" : $PTN) -gt 0 ]]
1 root 526
			do
595 richard 527
				if [ $Lang == "fr" ]
597 richard 528
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
529
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
595 richard 530
				fi
597 richard 531
				read PRIVATE_IP_MASK
1 root 532
			done
636 richard 533
		else
2688 lucas.echa 534
			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
636 richard 535
		fi
595 richard 536
	else
2834 rexy 537
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= /var/tmp/conf/etc/alcasar.conf|cut -d"=" -f2`
538
		rm -rf /var/tmp/conf
1 root 539
	fi
861 richard 540
# Define LAN side global parameters
1740 richard 541
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
977 richard 542
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
1499 richard 543
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
977 richard 544
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
1499 richard 545
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
3247 rexy 546
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`								# ALCASAR private ip address (consultation LAN side)
547
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]											# when entering network address instead of ip address
2688 lucas.echa 548
	then
2454 tom.houday 549
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`
1499 richard 550
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
2454 tom.houday 551
	fi
3247 rexy 552
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
553
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`	# private network broadcast (ie.: 192.168.182.255)
554
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`;				# ie.: 2=classe B, 3=classe C
1499 richard 555
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
3247 rexy 556
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`				# last octet of LAN broadcast
1499 richard 557
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
3244 rexy 558
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
3247 rexy 559
	classe=$((PRIVATE_PREFIX/8))												# ie.: 2=classe B, 3=classe C
560
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.		# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
1828 richard 561
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
841 richard 562
# Define Internet parameters
2809 rexy 563
	DNS1=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS1='| cut -d"=" -f2`	# 1st DNS server
564
	DNS2=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS2=' | cut -d"=" -f2`	# 2nd DNS server
2870 rexy 565
	DNS1=${DNS1:=208.67.220.220}
70 franck 566
	DNS2=${DNS2:=208.67.222.222}
1499 richard 567
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
1052 richard 568
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
1069 richard 569
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
2552 rexy 570
# Write network parameters in the conf file
2737 rexy 571
	echo "HOSTNAME=$HOSTNAME" >> $CONF_FILE
572
	echo "DOMAIN=$DOMAIN" >> $CONF_FILE
1469 richard 573
	echo "EXTIF=$EXTIF" >> $CONF_FILE
574
	echo "INTIF=$INTIF" >> $CONF_FILE
2770 rexy 575
# Retrieve NIC name of other consultation LAN
2282 richard 576
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
577
	for i in $INTERFACES
578
	do
579
		SUB=`echo ${i:0:2}`
580
		if [ $SUB = "wl" ]
581
			then WIFIF=$i
2454 tom.houday 582
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ]
2282 richard 583
			then LANIF=$i
584
		fi
585
	done
586
	if [ -n "$WIFIF" ]
587
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
588
	elif [ -n "$LANIF" ]
589
		then echo "LANIF=$LANIF" >> $CONF_FILE
590
	fi
2552 rexy 591
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2` # test static or dynamic
1499 richard 592
	if [ $IP_SETTING == "dhcp" ]
2688 lucas.echa 593
	then
2947 rexy 594
		DHCP_DNS_servers=`cat /var/lib/dhclient/dhclient--$EXTIF.lease |grep domain-name-servers|sed -n "1 p"| rev|cut -d" " -f1|rev|tr -d ';'`
595
		DNS1=`echo $DHCP_DNS_servers | cut -d"," -f1`
596
		DNS2=`echo $DHCP_DNS_servers | cut -d"," -f2`
1499 richard 597
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
1585 richard 598
		echo "GW=dhcp" >> $CONF_FILE
1499 richard 599
	else
600
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
1585 richard 601
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
1499 richard 602
	fi
1587 richard 603
	echo "DNS1=$DNS1" >> $CONF_FILE
604
	echo "DNS2=$DNS2" >> $CONF_FILE
2956 rexy 605
	echo "PROXY=off" >> $CONF_FILE
606
	echo "PROXY_IP=\"192.168.0.100:80\"" >> $CONF_FILE
607
	echo "PUBLIC_WEIGHT=1" >> $CONF_FILE
994 franck 608
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
628 richard 609
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
1484 richard 610
	echo "DHCP=on" >> $CONF_FILE
2708 tom.houday 611
	echo "EXT_DHCP_IP=" >> $CONF_FILE
612
	echo "RELAY_DHCP_IP=" >> $CONF_FILE
613
	echo "RELAY_DHCP_PORT=" >> $CONF_FILE
2709 tom.houday 614
	echo "INT_DNS_DOMAIN=" >> $CONF_FILE
615
	echo "INT_DNS_IP=" >> $CONF_FILE
1610 franck 616
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
1499 richard 617
# network default
597 richard 618
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
1 root 619
	cat <<EOF > /etc/sysconfig/network
620
NETWORKING=yes
621
FORWARD_IPV4=true
622
EOF
2552 rexy 623
# write "/etc/hosts"
1 root 624
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
625
	cat <<EOF > /etc/hosts
503 richard 626
127.0.0.1	localhost
2558 rexy 627
$PRIVATE_IP	$HOSTNAME
1 root 628
EOF
2552 rexy 629
# write EXTIF (Internet) config
1499 richard 630
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
631
	if [ $IP_SETTING == "dhcp" ]
2688 lucas.echa 632
	then
1499 richard 633
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
14 richard 634
DEVICE=$EXTIF
1585 richard 635
BOOTPROTO=dhcp
636
DNS1=127.0.0.1
637
PEERDNS=no
638
RESOLV_MODS=yes
639
ONBOOT=yes
1613 franck 640
NOZEROCONF=yes
1585 richard 641
METRIC=10
642
MII_NOT_SUPPORTED=yes
643
IPV6INIT=no
644
IPV6TO4INIT=no
645
ACCOUNTING=no
646
USERCTL=no
647
MTU=$MTU
648
EOF
2688 lucas.echa 649
	else
1585 richard 650
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
651
DEVICE=$EXTIF
14 richard 652
BOOTPROTO=static
597 richard 653
IPADDR=$PUBLIC_IP
654
NETMASK=$PUBLIC_NETMASK
655
GATEWAY=$PUBLIC_GATEWAY
2870 rexy 656
DNS1=$DNS1
657
DNS2=$DNS2
1499 richard 658
RESOLV_MODS=yes
14 richard 659
ONBOOT=yes
660
METRIC=10
1610 franck 661
NOZEROCONF=yes
14 richard 662
MII_NOT_SUPPORTED=yes
663
IPV6INIT=no
664
IPV6TO4INIT=no
665
ACCOUNTING=no
666
USERCTL=no
994 franck 667
MTU=$MTU
14 richard 668
EOF
1499 richard 669
	fi
2552 rexy 670
# write INTIF (consultation LAN) in normal mode
2868 rexy 671
cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
841 richard 672
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
673
DEVICE=$INTIF
674
BOOTPROTO=static
675
ONBOOT=yes
676
NOZEROCONF=yes
677
MII_NOT_SUPPORTED=yes
678
IPV6INIT=no
679
IPV6TO4INIT=no
680
ACCOUNTING=no
681
USERCTL=no
682
EOF
2552 rexy 683
# write INTIF in bypass mode (see "alcasar-bypass.sh")
1554 richard 684
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
1 root 685
DEVICE=$INTIF
686
BOOTPROTO=static
687
IPADDR=$PRIVATE_IP
604 richard 688
NETMASK=$PRIVATE_NETMASK
1 root 689
ONBOOT=yes
690
METRIC=10
691
NOZEROCONF=yes
692
MII_NOT_SUPPORTED=yes
14 richard 693
IPV6INIT=no
694
IPV6TO4INIT=no
695
ACCOUNTING=no
696
USERCTL=no
1 root 697
EOF
2282 richard 698
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
699
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
700
	then
701
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
702
DEVICE=$WIFIF
703
BOOTPROTO=static
704
ONBOOT=yes
705
NOZEROCONF=yes
706
MII_NOT_SUPPORTED=yes
707
IPV6INIT=no
708
IPV6TO4INIT=no
709
ACCOUNTING=no
710
USERCTL=no
711
EOF
712
	elif [ -n "$LANIF" ]
713
	then
714
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
715
DEVICE=$LANIF
716
BOOTPROTO=static
717
ONBOOT=yes
718
NOZEROCONF=yes
719
MII_NOT_SUPPORTED=yes
720
IPV6INIT=no
721
IPV6TO4INIT=no
722
ACCOUNTING=no
723
USERCTL=no
724
EOF
725
	fi
3285 rexy 726
# write resolv.conf
727
	[ -e /etc/resolv.conf.default ]  || cp /etc/resolv.conf /etc/resolv.conf.default
728
	cat <<EOF > /etc/resolv.conf
729
# Basic resolv.conf : ALCASAR ask its local DNS servers (unbound)
730
search $DOMAIN
731
nameserver 127.0.0.1
732
EOF
2552 rexy 733
# write hosts.allow & hosts.deny
1 root 734
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
735
	cat <<EOF > /etc/hosts.allow
736
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
604 richard 737
sshd: ALL
1 root 738
ntpd: $PRIVATE_NETWORK_SHORT
739
EOF
740
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
741
	cat <<EOF > /etc/hosts.deny
742
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
743
EOF
790 richard 744
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
860 richard 745
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
1069 richard 746
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
790 richard 747
# load conntrack ftp module
748
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
1705 richard 749
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
1159 crox53 750
# load ipt_NETFLOW module
751
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
1513 richard 752
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
2937 rexy 753
	cp /lib/systemd/system/iptables.service /etc/systemd/system/iptables.service
754
	$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /etc/systemd/system/iptables.service
2688 lucas.echa 755
	[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
756
	$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
2956 rexy 757
# create the alcasar-network unit
758
	cat << EOF > /etc/systemd/system/alcasar-network.service
759
#  This file is part of systemd.
2454 tom.houday 760
#
2956 rexy 761
#  systemd is free software; you can redistribute it and/or modify it
762
#  under the terms of the GNU General Public License as published by
763
#  the Free Software Foundation; either version 2 of the License, or
764
#  (at your option) any later version.
765
 
766
# This unit starts alcasar-network.sh script.
767
[Unit]
768
Description=alcasar-network.sh execution
769
After=network.target iptables.service
770
 
771
[Service]
772
Type=oneshot
773
RemainAfterExit=yes
774
ExecStart=$DIR_DEST_BIN/alcasar-network.sh
775
ExecStop=$DIR_DEST_BIN/alcasar-network.sh
776
TimeoutSec=0
777
 
778
[Install]
779
WantedBy=multi-user.target
780
EOF
781
	/usr/bin/systemctl daemon-reload
782
 
783
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is started at the end of this script in order not to cut network flow in case of using ssh
2724 rexy 784
} # End of network()
1 root 785
 
2763 rexy 786
##################################################################
2990 rexy 787
##                           "CA"                               ##
3230 rexy 788
## - Creating the CA and the server certificate (httpd)         ##
2763 rexy 789
##################################################################
790
CA()
791
{
792
	$DIR_DEST_BIN/alcasar-CA.sh
2814 rexy 793
	chmod 755 /etc/pki/
2801 rexy 794
	chown root:apache /etc/pki/CA; chmod 750 /etc/pki/CA
2821 rexy 795
	chown root:apache /etc/pki/CA/alcasar-ca.crt; chmod 640 /etc/pki/CA/alcasar-ca.crt
3298 rexy 796
	chown root:root /etc/pki/CA/private /etc/pki/tls/private
797
	chmod 700 /etc/pki/CA/private /etc/pki/tls/private
798
	chmod 600 /etc/pki/CA/private/* /etc/pki/tls/private/*
3170 rexy 799
	chmod 644 /etc/pki/tls/certs/*
2763 rexy 800
} # End of CA()
801
 
2990 rexy 802
######################################################
803
##                       "ACC"                      ##
804
## - copy ALCASAR Control Center (ACC) files        ##
3230 rexy 805
## - configuration of the web server (Apache)       ##
2990 rexy 806
## - creation of the first ACC admin account        ##
807
## - secure the ACC access                          ##
808
######################################################
2724 rexy 809
ACC()
1 root 810
{
811
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
812
	mkdir $DIR_WEB
1833 richard 813
# Copy & adapt ACC files
316 richard 814
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
3240 rexy 815
	ln $DIR_WEB/images/favicon-48.ico $DIR_WEB/favicon.ico
316 richard 816
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
2815 rexy 817
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/welcome.php
818
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/welcome.php
819
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/welcome.php
3135 rexy 820
	$SED "s?^\$csrf_key = .*?\$csrf_key = \"$csrfkey\"\;?g" $DIR_ACC/manager/htdocs/activity.php
5 franck 821
	chown -R apache:apache $DIR_WEB/*
1833 richard 822
# copy & adapt "freeradius-web" files
823
	cp -rf $DIR_CONF/freeradius-web/ /etc/
824
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
825
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
826
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
827
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
828
	cat <<EOF > /etc/freeradius-web/naslist.conf
829
nas1_name: alcasar-$ORGANISME
830
nas1_model: Network Access Controler
831
nas1_ip: $PRIVATE_IP
832
nas1_port_num: 0
833
nas1_community: public
834
EOF
835
	chown -R apache:apache /etc/freeradius-web/
836
# create the log & backup structure :
1489 richard 837
# - base = users database
838
# - archive = tarball of "base + http firewall + netflow"
1833 richard 839
# - security = watchdog log
2829 rexy 840
# - conf_file = archive conf file (usefull in updating process)
2887 rexy 841
	for i in base archive security activity_report iot_captures;
1 root 842
	do
843
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
844
	done
5 franck 845
	chown -R root:apache $DIR_SAVE
1833 richard 846
# Configuring & securing php
2937 rexy 847
	[ -e /etc/php.d/05_date.ini.default ] || cp /etc/php.d/05_date.ini /etc/php.d/05_date.ini.default
2887 rexy 848
	timezone=`timedatectl show --property=Timezone|cut -d"=" -f2`
849
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.d/05_date.ini
71 richard 850
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
411 richard 851
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
852
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
2397 tom.houday 853
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
854
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
71 richard 855
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
856
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
2397 tom.houday 857
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
3230 rexy 858
# Configuring & securing Apache
790 richard 859
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
3230 rexy 860
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
861
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
862
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
863
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
864
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
865
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
866
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
867
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
868
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
869
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
870
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
3240 rexy 871
	$SED "s?^#LoadModule rewrite_module.*?LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
3230 rexy 872
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
873
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
874
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
875
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
876
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
877
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
878
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
879
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
880
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
3252 rexy 881
	[ -e /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf.default ] || cp /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf.default
882
	$SED "s?^    SSLCertificateFile.*?    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt?g" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
883
	$SED "s?^    SSLCertificateKeyFile.*?    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key?g" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
3271 rexy 884
	$SED "/^    SSLCertificateKeyFile/a\    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.pem" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
3230 rexy 885
# Error page management
886
	[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
887
	cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
888
Alias /error/ "/var/www/html/"
889
<Directory "/usr/share/httpd/error">
890
    AllowOverride None
891
    Options IncludesNoExec
892
    AddOutputFilter Includes html
893
    AddHandler type-map var
894
    Require all granted
895
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
896
    ForceLanguagePriority Prefer Fallback
897
</Directory>
898
ErrorDocument 400 /error/error.php?error=400
899
ErrorDocument 401 /error/error.php?error=401
900
ErrorDocument 403 /error/error.php?error=403
901
ErrorDocument 404 /error/index.php
902
ErrorDocument 405 /error/error.php?error=405
903
ErrorDocument 408 /error/error.php?error=408
904
ErrorDocument 410 /error/error.php?error=410
905
ErrorDocument 411 /error/error.php?error=411
906
ErrorDocument 412 /error/error.php?error=412
907
ErrorDocument 413 /error/error.php?error=413
908
ErrorDocument 414 /error/error.php?error=414
909
ErrorDocument 415 /error/error.php?error=415
910
ErrorDocument 500 /error/error.php?error=500
911
ErrorDocument 501 /error/error.php?error=501
912
ErrorDocument 502 /error/error.php?error=502
913
ErrorDocument 503 /error/error.php?error=503
914
ErrorDocument 506 /error/error.php?error=506
915
EOF
916
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
917
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
918
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
919
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
920
</body>
921
</html>
922
EOF
923
# ACC partitioning
924
	rm -f /etc/httpd/conf/vhosts.d/alcasar*
925
	cat <<EOF > /etc/httpd/conf/vhosts.d/alcasar.conf
926
<Directory $DIR_WEB>
927
        AllowOverride None
928
        Order deny,allow
929
        Deny from all
930
        Allow from 127.0.0.1
931
        Allow from $PRIVATE_NETWORK_MASK
932
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
933
</Directory>
934
<Directory $DIR_WEB/certs>
935
        AddType application/x-x509-ca-cert crt
936
</Directory>
937
<Directory $DIR_ACC>
938
        SSLRequireSSL
939
        AllowOverride None
940
        Order deny,allow
941
        Deny from all
942
        Allow from 127.0.0.1
943
        Allow from $PRIVATE_NETWORK_MASK
944
        require valid-user
945
        AuthType digest
946
        AuthName "ALCASAR Control Center (ACC)"
947
        AuthDigestDomain $HOSTNAME.$DOMAIN
948
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
949
        AuthUserFile $DIR_DEST_ETC/digest/key_all
950
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
951
</Directory>
952
<Directory $DIR_ACC/admin>
953
        SSLRequireSSL
954
        AllowOverride None
955
        Order deny,allow
956
        Deny from all
957
        Allow from 127.0.0.1
958
        Allow from $PRIVATE_NETWORK_MASK
959
        require valid-user
960
        AuthType digest
961
        AuthName "ALCASAR Control Center (ACC)"
962
        AuthDigestDomain $HOSTNAME.$DOMAIN
963
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
964
        AuthUserFile $DIR_DEST_ETC/digest/key_admin
965
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
966
</Directory>
967
<Directory $DIR_ACC/manager>
968
        SSLRequireSSL
969
        AllowOverride None
970
        Order deny,allow
971
        Deny from all
972
        Allow from 127.0.0.1
973
        Allow from $PRIVATE_NETWORK_MASK
974
        require valid-user
975
        AuthType digest
976
        AuthName "ALCASAR Control Center (ACC)"
977
        AuthDigestDomain $HOSTNAME.$DOMAIN
978
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
979
        AuthUserFile $DIR_DEST_ETC/digest/key_manager
980
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
981
</Directory>
3240 rexy 982
<Directory $DIR_ACC/manager/nfsen>
983
        AllowOverride None
984
        <IfModule mod_rewrite.c>
985
                RewriteEngine On
986
                RewriteCond %{REQUEST_FILENAME} !-f
987
                RewriteCond %{REQUEST_FILENAME} !-d
3247 rexy 988
                RewriteRule ^api/(.*)$ backend/index.php?request=\$1 [QSA,NC,L]
3240 rexy 989
                RewriteRule ^$ frontend [L]
990
        </IfModule>
991
</Directory>
3230 rexy 992
<Directory $DIR_ACC/backup>
993
        SSLRequireSSL
994
        AllowOverride None
995
        Order deny,allow
996
        Deny from all
997
        Allow from 127.0.0.1
998
        Allow from $PRIVATE_NETWORK_MASK
999
        require valid-user
1000
        AuthType digest
1001
        AuthName "ALCASAR Control Center (ACC)"
1002
        AuthDigestDomain $HOSTNAME.$DOMAIN
1003
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
1004
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
1005
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1006
</Directory>
1007
Alias /save/ "$DIR_SAVE/"
1008
<Directory $DIR_SAVE>
1009
        SSLRequireSSL
1010
        Options Indexes
1011
        Order deny,allow
1012
        Deny from all
1013
        Allow from 127.0.0.1
1014
        Allow from $PRIVATE_NETWORK_MASK
1015
        require valid-user
1016
        AuthType digest
1017
        AuthName "ALCASAR Control Center (ACC)"
1018
        AuthDigestDomain $HOSTNAME.$DOMAIN
1019
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
1020
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1021
</Directory>
1022
EOF
2552 rexy 1023
# Creation of the first account (in 'admin' profile)
2293 tom.houday 1024
	if [ "$mode" = "install" ]
2688 lucas.echa 1025
	then
1026
		header_install
1268 richard 1027
# Creation of keys file for the admin account ("admin")
2688 lucas.echa 1028
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1029
		mkdir -p $DIR_DEST_ETC/digest
1030
		chmod 755 $DIR_DEST_ETC/digest
2737 rexy 1031
		if [ $Lang == "fr" ]
2760 lucas.echa 1032
			then echo "Création du premier compte administrateur : "
1033
			else echo "Creation of the first admin account : "
2737 rexy 1034
		fi
2688 lucas.echa 1035
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
1036
		do
1037
			$DIR_DEST_BIN/alcasar-profil.sh --add admin
1038
		done
2293 tom.houday 1039
	fi
3252 rexy 1040
# Link CAcerts in ACC
2818 rexy 1041
	[ -d /var/www/html/certs ] || mkdir /var/www/html/certs
1042
	ln -s /etc/pki/CA/alcasar-ca.crt /var/www/html/certs/certificat_alcasar_ca.crt
3230 rexy 1043
# Run Apache after coova (in order waiting tun0 to be up)
1044
	cp /lib/systemd/system/httpd.service /etc/systemd/system/httpd.service
1045
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /etc/systemd/system/httpd.service
2293 tom.houday 1046
	# Log file for ACC access imputability
2887 rexy 1047
	[ -e $DIR_SAVE/security/acc_access.log ] || touch $DIR_SAVE/security/acc_access.log
1048
	chown root:apache $DIR_SAVE/security/acc_access.log
1049
	chmod 664 $DIR_SAVE/security/acc_access.log
2724 rexy 1050
} # End of ACC()
1 root 1051
 
2552 rexy 1052
#############################################################
2990 rexy 1053
##                     "time_server"                       ##
2552 rexy 1054
## - Configuring NTP server                                ##
1055
#############################################################
2724 rexy 1056
time_server()
1837 richard 1057
{
3192 rexy 1058
[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
1059
$SED "s?^pool.*?pool fr.pool.ntp.org iburst?g" /etc/ntp.conf
3193 rexy 1060
echo "interface ignore wildcard" >> /etc/ntp.conf
1061
echo "interface listen lo" >> /etc/ntp.conf
3197 rexy 1062
echo "interface listen tun0" >> /etc/ntp.conf
1837 richard 1063
# Synchronize now
3192 rexy 1064
	ntpdate fr.pool.ntp.org &
3193 rexy 1065
sleep 2 # wait for time server responce
2724 rexy 1066
} # End of time_server()
1837 richard 1067
 
2541 rexy 1068
#####################################################################
2990 rexy 1069
##                           "init_db"                             ##
3273 rexy 1070
## - MariaDb initialization                                        ##
2541 rexy 1071
## - Set admin (root) password                                     ##
1072
## - Remove unused users & databases                               ##
1073
## - Radius database creation                                      ##
1074
## - Copy of accounting tables (mtotacct, totacct) & userinfo      ##
1075
#####################################################################
2724 rexy 1076
init_db()
1 root 1077
{
3269 rexy 1078
	if [ "`systemctl is-active mariadb`" == "active" ]
1990 richard 1079
	then
3269 rexy 1080
		systemctl stop mariadb
1990 richard 1081
	fi
3272 rexy 1082
	if [ "`systemctl is-active mysqld`" == "active" ]
1083
	then
1084
		systemctl stop mysqld
1085
	fi
1355 richard 1086
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1 root 1087
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1979 richard 1088
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
3269 rexy 1089
	[ -e /etc/my.cnf.d/server.cnf.default ] || cp /etc/my.cnf.d/server.cnf /etc/my.cnf.d/server.cnf.default
1090
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf.d/server.cnf
1091
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf.d/server.cnf
1092
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf.d/server.cnf  # accentuated user names are allowed
3309 rexy 1093
	SRV_ID=`cat /dev/urandom | tr -dc "0-9" | head -c 9` # SRV_ID must be < 2^32 -1
1094
	$SED "s?^server-id.*?server-id=$SRV_ID?g" /etc/my.cnf.d/server.cnf # Be sure not to have same server_id (need for replication architecture)
3272 rexy 1095
	# Create our own systemd unit
1096
	cp /lib/systemd/system/mysqld.service /etc/systemd/system/mariadb.service
1097
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/mariadbd?g" /etc/systemd/system/mariadb.service
2416 richard 1098
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
3272 rexy 1099
	[ ! -e /usr/bin/mariadb_install_db ] && ln -s /usr/bin/mariadb-install-db /usr/bin/mariadb_install_db # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
3273 rexy 1100
	[ ! -e /usr/sbin/mysqld-prepare-db-dir ] && ln -s /usr/sbin/mariadb-prepare-db-dir /usr/sbin/mysqld-prepare-db-dir # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
3272 rexy 1101
	/usr/bin/systemctl start mariadb
1963 richard 1102
	nb_round=1
1981 richard 1103
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1963 richard 1104
	do
1105
		nb_round=`expr $nb_round + 1`
1106
		sleep 2
1107
	done
1981 richard 1108
	if [ ! -S /var/lib/mysql/mysql.sock ]
1963 richard 1109
	then
3272 rexy 1110
		if [ $Lang == "fr" ]
1111
			then echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1112
			else echo "Problem: the 'MariaDB' database didn't start!"
1113
		fi
1963 richard 1114
		exit
1955 richard 1115
	fi
1355 richard 1116
# Secure the server
3269 rexy 1117
	/usr/bin/mariadb --execute "GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$dbpwd';"
1118
	SQL="/usr/bin/mariadb -uroot -p$dbpwd --execute"
1119
	$SQL "DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1120
	$SQL "CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;"
615 richard 1121
# Create 'radius' database
3269 rexy 1122
	$SQL "CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
615 richard 1123
# Add an empty radius database structure
3269 rexy 1124
	/usr/bin/mariadb -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
3272 rexy 1125
	# modify the start script in order to close accounting connexion when the system is comming down or up
3269 rexy 1126
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mariadb.sh -acct_stop" /etc/systemd/system/mariadb.service
1127
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mariadb.sh -acct_stop" /etc/systemd/system/mariadb.service
2416 richard 1128
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
3272 rexy 1129
	/usr/bin/systemctl daemon-reload
1130
	/usr/bin/systemctl restart mariadb
2724 rexy 1131
} # End of init_db()
1 root 1132
 
2423 richard 1133
###################################################################
2990 rexy 1134
##                           "freeradius"                        ##
2423 richard 1135
## - Set the configuration files                                 ##
1136
## - Set the shared secret between coova-chilli and freeradius   ##
3269 rexy 1137
## - Adapt the MariaDB conf file and counters                      ##
2423 richard 1138
###################################################################
2724 rexy 1139
freeradius()
1 root 1140
{
1800 richard 1141
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1 root 1142
	chown -R radius:radius /etc/raddb
1143
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
2420 richard 1144
# Set radius global parameters (radius.conf)
1 root 1145
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1146
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1147
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
2420 richard 1148
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1149
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
2728 rexy 1150
# Add ALCASAR & Coovachilli dictionaries
1151
	[ -e /etc/raddb/dictionary.default ] || cp /etc/raddb/dictionary /etc/raddb/dictionary.default
2730 rexy 1152
	cp $DIR_CONF/radius/dictionary.alcasar /etc/raddb/
1153
	echo '$INCLUDE dictionary.alcasar' > /etc/raddb/dictionary
1154
	cp /usr/share/doc/coova-chilli/dictionary.coovachilli /etc/raddb/
1155
	echo '$INCLUDE dictionary.coovachilli' >> /etc/raddb/dictionary
2420 richard 1156
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1 root 1157
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1158
	cat << EOF > /etc/raddb/clients.conf
2438 richard 1159
client localhost {
1160
	ipaddr = 127.0.0.1
1 root 1161
	secret = $secretradius
2438 richard 1162
	shortname = chilli
2454 tom.houday 1163
	nas_type = other
1 root 1164
}
1165
EOF
2758 rexy 1166
# Set Virtual server
1167
    # Remvoveing all except "alcasar virtual site")
1168
	# INFO : To enable 802.1X, add the "innser-tunnel" virtual server (link in sites-enabled)  Change the firewall rules to allow "radius" extern connections.
2467 richard 1169
	cp $DIR_CONF/radius/alcasar /etc/raddb/sites-available/alcasar
1170
	cp $DIR_CONF/radius/alcasar-with-ldap /etc/raddb/sites-available/alcasar-with-ldap
1171
	chown radius:apache /etc/raddb/sites-available/alcasar*
1172
	chmod 660 /etc/raddb/sites-available/alcasar*
2758 rexy 1173
	rm -f /etc/raddb/sites-enabled/*
2420 richard 1174
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
2454 tom.houday 1175
# Set modules
2728 rexy 1176
	# Add custom LDAP "available module"
2758 rexy 1177
	# INFO : To enable 802.1X, add the "eap" module and verify access to the keys (/etc/pki/tls/private/radius.pem). Change the firewall rules to allow "radius" extern connections.
2465 richard 1178
	cp -f $DIR_CONF/radius/ldap-alcasar /etc/raddb/mods-available/
1179
	chown -R radius:radius /etc/raddb/mods-available/ldap-alcasar
2728 rexy 1180
	# Set only usefull modules for ALCASAR (! the module 'ldap-alcasar' is enabled only via ACC)
2454 tom.houday 1181
	rm -rf  /etc/raddb/mods-enabled/*
2615 tom.houday 1182
	for mods in sql sqlcounter attr_filter expiration logintime pap expr always
2454 tom.houday 1183
	do
1184
		ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1185
	done
2758 rexy 1186
# Configure SQL module
2420 richard 1187
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
2423 richard 1188
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1189
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
2420 richard 1190
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
2423 richard 1191
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1192
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1193
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1194
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
2758 rexy 1195
	# no TLS encryption on 127.0.0.1
2763 rexy 1196
	$SED "s?^[\t ]*ca_file =.*?#&?g" /etc/raddb/mods-available/sql
1197
	$SED "s?^[\t ]*ca_path =.*?#&?g" /etc/raddb/mods-available/sql
1198
	$SED "s?^[\t ]*certificate_file =.*?#&?g" /etc/raddb/mods-available/sql
1199
	$SED "s?^[\t ]*private_key_file =.*?#&?g" /etc/raddb/mods-available/sql
1200
	$SED "s?^[\t ]*cipher =.*?#&?g" /etc/raddb/mods-available/sql
1201
	$SED "s?^[\t ]*tls_required =.*?tls_required = no?g" /etc/raddb/mods-available/sql
2454 tom.houday 1202
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.
2420 richard 1203
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1204
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1205
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
2421 richard 1206
# sqlcounter modifications
2470 richard 1207
	[ -e /etc/raddb/mods-available/sqlcounter.default ] || cp /etc/raddb/mods-available/sqlcounter /etc/raddb/mods-available/sqlcounter.default
1208
	cp -f $DIR_CONF/radius/sqlcounter /etc/raddb/mods-available/sqlcounter
1209
	chown -R radius:radius /etc/raddb/mods-available/sqlcounter
3269 rexy 1210
# make certain that mariaDB is up before freeradius start
2937 rexy 1211
	cp /lib/systemd/system/radiusd.service /etc/systemd/system/radiusd.service
3269 rexy 1212
	$SED "s?^After=.*?After=syslog.target network.target mariadb.service?g" /etc/systemd/system/radiusd.service
1574 richard 1213
	/usr/bin/systemctl daemon-reload
2597 tom.houday 1214
# Allow apache to change some conf files (ie : ldap on/off)
1215
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2770 rexy 1216
	chmod 750 /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2724 rexy 1217
} # End of freeradius()
1 root 1218
 
2423 richard 1219
#############################################################################
2990 rexy 1220
##                                "chilli"                                 ##
2423 richard 1221
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1222
## - Adapt the authentication web page (intercept.php)                     ##
1223
#############################################################################
2724 rexy 1224
chilli()
1 root 1225
{
1370 richard 1226
# chilli unit for systemd
2937 rexy 1227
	cat << EOF > /etc/systemd/system/chilli.service
1372 richard 1228
#  This file is part of systemd.
1229
#
1230
#  systemd is free software; you can redistribute it and/or modify it
1231
#  under the terms of the GNU General Public License as published by
1232
#  the Free Software Foundation; either version 2 of the License, or
1233
#  (at your option) any later version.
2771 rexy 1234
 
1235
# This unit launches coova-chilli a captive portal
1370 richard 1236
[Unit]
1237
Description=chilli is a captive portal daemon
1238
After=network.target
1239
 
1240
[Service]
1379 richard 1241
Type=forking
1370 richard 1242
ExecStart=/usr/libexec/chilli start
1243
ExecStop=/usr/libexec/chilli stop
1244
ExecReload=/usr/libexec/chilli reload
2775 rexy 1245
PIDFile=/run/chilli.pid
1370 richard 1246
 
1247
[Install]
1248
WantedBy=multi-user.target
1249
EOF
799 richard 1250
# init file creation
1370 richard 1251
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1801 richard 1252
	cat <<EOF > /etc/init.d/chilli
799 richard 1253
#!/bin/sh
1254
#
1255
# chilli CoovaChilli init
1256
#
1257
# chkconfig: 2345 65 35
1258
# description: CoovaChilli
1259
### BEGIN INIT INFO
1260
# Provides:       chilli
2454 tom.houday 1261
# Required-Start: network
1262
# Should-Start:
799 richard 1263
# Required-Stop:  network
2454 tom.houday 1264
# Should-Stop:
799 richard 1265
# Default-Start:  2 3 5
1266
# Default-Stop:
1267
# Description:    CoovaChilli access controller
1268
### END INIT INFO
1269
 
1270
[ -f /usr/sbin/chilli ] || exit 0
1271
. /etc/init.d/functions
1272
CONFIG=/etc/chilli.conf
2775 rexy 1273
pidfile=/run/chilli.pid
799 richard 1274
[ -f \$CONFIG ] || {
2394 tom.houday 1275
	echo "\$CONFIG Not found"
1276
	exit 0
799 richard 1277
}
2882 rexy 1278
current_users_file="/tmp/current_users.txt"	# file containing active users
799 richard 1279
RETVAL=0
1280
prog="chilli"
1281
case \$1 in
2394 tom.houday 1282
	start)
2454 tom.houday 1283
		if [ -f \$pidfile ] ; then
2394 tom.houday 1284
			gprintf "chilli is already running"
1285
		else
1286
			gprintf "Starting \$prog: "
2884 rexy 1287
			echo '' > \$current_users_file && chown root:apache \$current_users_file && chmod 660 \$current_users_file
2775 rexy 1288
			rm -f /run/chilli* # cleaning
2394 tom.houday 1289
			/usr/sbin/modprobe tun >/dev/null 2>&1
1290
			echo 1 > /proc/sys/net/ipv4/ip_forward
1291
			[ -e /dev/net/tun ] || {
2454 tom.houday 1292
				(cd /dev;
1293
				mkdir net;
1294
				cd net;
2394 tom.houday 1295
				mknod tun c 10 200)
1296
			}
1297
			ifconfig $INTIF 0.0.0.0
1298
			/usr/sbin/ethtool -K $INTIF gro off
1299
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1300
			RETVAL=\$?
1301
		fi
1302
		;;
799 richard 1303
 
2394 tom.houday 1304
	reload)
1305
		killall -HUP chilli
1306
		;;
799 richard 1307
 
2394 tom.houday 1308
	restart)
1309
		\$0 stop
1310
		sleep 2
1311
		\$0 start
1312
		;;
799 richard 1313
 
2394 tom.houday 1314
	status)
1315
		status chilli
1316
		RETVAL=0
1317
		;;
1318
 
1319
	stop)
2454 tom.houday 1320
		if [ -f \$pidfile ] ; then
2394 tom.houday 1321
			gprintf "Shutting down \$prog: "
1322
			killproc /usr/sbin/chilli
1323
			RETVAL=\$?
1324
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1325
			[ -e \$current_users_file ] && rm -f \$current_users_file
2454 tom.houday 1326
		else
2394 tom.houday 1327
			gprintf "chilli is not running"
1328
		fi
1329
		;;
1330
 
1331
	*)
1332
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1333
		exit 1
799 richard 1334
esac
1335
echo
1336
EOF
2324 tom.houday 1337
	chmod a+x /etc/init.d/chilli
1338
	ln -s /etc/init.d/chilli /usr/libexec/chilli
799 richard 1339
# conf file creation
346 richard 1340
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
2016 raphael.pi 1341
	#NTP Option configuration for DHCP
2032 richard 1342
	#DHCP Options : rfc2132
1343
		#dhcp option value will be convert in hexa.
1344
		#NTP option (or 'option 42') is like :
2454 tom.houday 1345
		#
2032 richard 1346
		#    Code   Len         Address 1               Address 2
1347
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1348
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1349
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1350
		#
1351
		#Code : 42 => 2a
1352
		#Len : 4 => 04
2688 lucas.echa 1353
	PRIVATE_IP_HEXA=$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f1)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f2)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f3)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f4)")
346 richard 1354
	cat <<EOF > /etc/chilli.conf
1355
# coova config for ALCASAR
2775 rexy 1356
cmdsocket	/run/chilli.sock
1336 richard 1357
unixipc		chilli.$INTIF.ipc
2775 rexy 1358
pidfile		/run/chilli.pid
346 richard 1359
net		$PRIVATE_NETWORK_MASK
595 richard 1360
dhcpif		$INTIF
841 richard 1361
ethers		$DIR_DEST_ETC/alcasar-ethers
861 richard 1362
#nodynip
865 richard 1363
#statip
1364
dynip		$PRIVATE_NETWORK_MASK
1249 richard 1365
domain		$DOMAIN
355 richard 1366
dns1		$PRIVATE_IP
1367
dns2		$PRIVATE_IP
346 richard 1368
uamlisten	$PRIVATE_IP
503 richard 1369
uamport		3990
2370 tom.houday 1370
uamuiport	3991
837 richard 1371
macauth
1372
macpasswd	password
1697 richard 1373
strictmacauth
1243 richard 1374
locationname	$HOSTNAME.$DOMAIN
346 richard 1375
radiusserver1	127.0.0.1
1376
radiusserver2	127.0.0.1
1377
radiussecret	$secretradius
1378
radiusauthport	1812
1379
radiusacctport	1813
2818 rexy 1380
uamserver	http://$HOSTNAME.$DOMAIN/intercept.php
2374 tom.houday 1381
redirurl
1243 richard 1382
radiusnasid	$HOSTNAME.$DOMAIN
346 richard 1383
uamsecret	$secretuam
1249 richard 1384
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
346 richard 1385
coaport		3799
1379 richard 1386
conup		$DIR_DEST_BIN/alcasar-conup.sh
1387
condown		$DIR_DEST_BIN/alcasar-condown.sh
2594 tom.houday 1388
macup		$DIR_DEST_BIN/alcasar-macup.sh
503 richard 1389
include		$DIR_DEST_ETC/alcasar-uamallowed
1390
include		$DIR_DEST_ETC/alcasar-uamdomain
2016 raphael.pi 1391
dhcpopt		2a04$PRIVATE_IP_HEXA
1613 franck 1392
#dhcpgateway		none
1393
#dhcprelayagent		none
1610 franck 1394
#dhcpgatewayport	none
2234 richard 1395
sslkeyfile	/etc/pki/tls/private/alcasar.key
1396
sslcertfile	/etc/pki/tls/certs/alcasar.crt
2922 rexy 1397
sslcafile	/etc/pki/tls/certs/server-chain.pem
2818 rexy 1398
#redirssl
1399
#uamuissl
346 richard 1400
EOF
2274 richard 1401
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
977 richard 1402
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
2274 richard 1403
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
840 richard 1404
# create files for trusted domains and urls
1148 crox53 1405
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
503 richard 1406
	chown root:apache $DIR_DEST_ETC/alcasar-*
1407
	chmod 660 $DIR_DEST_ETC/alcasar-*
847 richard 1408
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
526 stephane 1409
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
796 richard 1410
# user 'chilli' creation (in order to run conup/off and up/down scripts
2396 tom.houday 1411
	chilli_exist=`grep -c ^chilli: /etc/passwd`
796 richard 1412
	if [ "$chilli_exist" == "1" ]
1413
	then
2454 tom.houday 1414
		userdel -r chilli 2>/dev/null
796 richard 1415
	fi
1416
	groupadd -f chilli
1417
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
2724 rexy 1418
}  # End of chilli()
1349 richard 1419
 
2541 rexy 1420
################################################################
2990 rexy 1421
##                        "e2guardian"                        ##
3193 rexy 1422
## - Set the parameters of this HTTP proxy (as controler)     ##
2541 rexy 1423
################################################################
2724 rexy 1424
e2guardian()
1 root 1425
{
2758 rexy 1426
# Adapt systemd unit
2937 rexy 1427
	cp /lib/systemd/system/e2guardian.service /etc/systemd/system/e2guardian.service
1428
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/e2guardian -c /etc/e2guardian/e2guardian.conf?g" /etc/systemd/system/e2guardian.service
3177 rexy 1429
	$SED "s?^After=.*?After=network-online.target chilli.service?g" /etc/systemd/system/e2guardian.service
1430
	$SED "/^PIDFile=/d" /etc/systemd/system/e2guardian.service
1431
 
2937 rexy 1432
# Adapt the main conf file
3197 rexy 1433
	[ -e $DIR_E2G/e2guardian.conf.default ] || cp $DIR_E2G/e2guardian.conf $DIR_E2G/e2guardian.conf.default
1293 richard 1434
# French deny HTML page
3197 rexy 1435
	$SED "s?^language =.*?language = 'french'?g" $DIR_E2G/e2guardian.conf
3200 rexy 1436
# Listen & loop prevention on loopback
3197 rexy 1437
	$SED "s?^#checkip = 127.0.0.1.*?checkip = 127.0.0.1?g" $DIR_E2G/e2guardian.conf
3238 rexy 1438
# 2 filtergroups (8080 & 8081)
3197 rexy 1439
	$SED "s?^#filtergroups =.*?filtergroups = 2?g" $DIR_E2G/e2guardian.conf
3193 rexy 1440
# Listen on LAN only
3197 rexy 1441
	$SED "s?^#filterip =.*?filterip = $PRIVATE_IP?g" $DIR_E2G/e2guardian.conf
3193 rexy 1442
# Listen on 8080 (group1 : BL users on HTTP)
3238 rexy 1443
	$SED "s?^#filterports = 8080:8081.*?filterports = 8080:8081?g" $DIR_E2G/e2guardian.conf
3193 rexy 1444
# Listen on 8081 (group2 : previously AV users --> to be redefine)
3197 rexy 1445
#	$SED "/^filterip = $PRIVATE_IP/a filterip = $PRIVATE_IP" $DIR_E2G/e2guardian.conf
1446
	$SED "s?^#filterports = 8081.*?filterports = 8081?g" $DIR_E2G/e2guardian.conf
3193 rexy 1447
# for now we don't listen transparently on 8443 (HTTPS) (only in future version)
3197 rexy 1448
	$SED "s?^transparenthttpsport =.*?#transparenthttpsport = 8443?g" $DIR_E2G/e2guardian.conf
1293 richard 1449
# Don't log
3197 rexy 1450
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_E2G/e2guardian.conf
2775 rexy 1451
# Disable HTML content control (weighted & banned)
3197 rexy 1452
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_E2G/e2guardian.conf
2840 rexy 1453
# Enable authport plugin
3197 rexy 1454
	$SED "s?^#authplugin = '/etc/e2guardian/authplugins/port.conf'?authplugin = '/etc/e2guardian/authplugins/port.conf'?g" $DIR_E2G/e2guardian.conf
1455
	$SED "s?^#mapauthtoports =.*?mapauthtoports = off?g" $DIR_E2G/e2guardian.conf
3193 rexy 1456
	# !!! Set Max RAM cache to 10Mb (for antimalware/EDR)
3197 rexy 1457
	#$SED "s?^maxcontentramcachescansize =.*?maxcontentramcachescansize = 10240?g" $DIR_E2G/e2guardian.conf
3193 rexy 1458
	# !!! Set Max file size cache to 20Mb (for antimalware/EDR)
3197 rexy 1459
	#$SED "s?^maxcontentfilecachescansize =.*?maxcontentfilecachescansize = 20480?g" $DIR_E2G/e2guardian.conf
2841 rexy 1460
 
2867 rexy 1461
# copy & adapt HTML templates
2866 rexy 1462
	cp $DIR_CONF/alcasar-e2g-fr.html /usr/share/e2guardian/languages/french/alcasar-e2g.html
1463
	cp $DIR_CONF/alcasar-e2g-en.html /usr/share/e2guardian/languages/ukenglish/alcasar-e2g.html
2867 rexy 1464
	$SED "s?\/\/[a-z.]*\/?\/\/$HOSTNAME.$DOMAIN\/?g" /usr/share/e2guardian/languages/french/alcasar-e2g.html
1465
	$SED "s?\/\/[a-z.]*\/?\/\/$HOSTNAME.$DOMAIN\/?g" /usr/share/e2guardian/languages/ukenglish/alcasar-e2g.html
2866 rexy 1466
 
3193 rexy 1467
###### ALCASAR filtering for group1 (blacklisted_users) ####
1468
# Adapt group1 conf file
3197 rexy 1469
	[ -e $DIR_E2G/e2guardianf1.conf.default ] || cp $DIR_E2G/e2guardianf1.conf $DIR_E2G/e2guardianf1.conf.default
3200 rexy 1470
	$SED "s?^#reportinglevel =.*?reportinglevel = 3?g" $DIR_E2G/e2guardianf1.conf
1471
	$SED "s?^#groupname =.*?groupname = 'blacklisted_users'?g" $DIR_E2G/e2guardianf1.conf
1472
	$SED "s?^#htmltemplate =.*?htmltemplate = 'alcasar-e2g.html'?g" $DIR_E2G/e2guardianf1.conf
1473
	$SED "s?^\.Define LISTDIR.*?\.Define LISTDIR <$DIR_E2G/lists/group1>?g" $DIR_E2G/e2guardianf1.conf
3197 rexy 1474
	DIR_E2G_GROUP1="$DIR_E2G/lists/group1"
1475
	cp -r $DIR_E2G/lists/example.group $DIR_E2G_GROUP1
3243 rexy 1476
 
2840 rexy 1477
# RAZ bannedphraselist
3197 rexy 1478
	$SED "s?^[^#]?#&?g" $DIR_E2G_GROUP1/bannedphraselist # (comment what is not)
2519 rexy 1479
# Disable URL control with regex
3197 rexy 1480
	$SED "s?^[^#]?#&?g" $DIR_E2G_GROUP1/bannedregexpurllist # (comment what is not)
2758 rexy 1481
# Dont filtering files by extension or mime-type (empty list)
3197 rexy 1482
	> $DIR_E2G_GROUP1/bannedextensionlist
1483
	> $DIR_E2G_GROUP1/bannedmimetypelist
2758 rexy 1484
# Creation of ALCASAR banned site list
3197 rexy 1485
	cat <<EOF > $DIR_E2G_GROUP1/greysitelist
2775 rexy 1486
# E2guardian filter config for ALCASAR
1487
# In ALCASAR E2guardian filters only URLs (domains are filtered with unbound)
2758 rexy 1488
# block all SSL and CONNECT tunnels
1489
**s
1490
# block all SSL and CONNECT tunnels specified only as an IP
1491
*ips
1492
# block all sites specified only by an IP
1493
*ip
1494
EOF
3195 rexy 1495
# Creation of file for banned URLs (filled later with Toulouse BL --> see BL function)
3197 rexy 1496
	cat <<EOF > $DIR_E2G_GROUP1/bannedurllist
3193 rexy 1497
# E2guardian URL filter config for ALCASAR
2758 rexy 1498
EOF
3195 rexy 1499
# Creation of files for rehabilited domains
3197 rexy 1500
	> $DIR_E2G_GROUP1/exceptionsitelist
3195 rexy 1501
# Creation of files for rehabilited IP
3243 rexy 1502
	[ -e $DIR_E2G_GROUP1/exceptionsiteiplist.default ] || mv $DIR_E2G_GROUP1/exceptionsiteiplist $DIR_E2G_GROUP1/exceptionsiteiplist.default
1503
	> $DIR_E2G_GROUP1/exceptionsiteiplist
3193 rexy 1504
# Create & adapt group2 conf file (av + av_wl)
3197 rexy 1505
	cp $DIR_E2G/e2guardianf1.conf.default $DIR_E2G/e2guardianf2.conf
1506
	$SED "s?^#reportinglevel =.*?reportinglevel = 3?g" $DIR_E2G/e2guardianf2.conf
1507
	$SED "s?^#groupname =.*?groupname = 'antimalware + whitelested users'?g" $DIR_E2G/e2guardianf2.conf
2775 rexy 1508
# create log folder
3193 rexy 1509
	mkdir -p /var/log/e2guardian
2775 rexy 1510
	chown -R e2guardian /etc/e2guardian /var/log/e2guardian
2724 rexy 1511
} # End of e2guardian()
1 root 1512
 
2724 rexy 1513
##############################################################
2990 rexy 1514
##                        "ulogd"                           ##
2724 rexy 1515
## - Ulog config for multi-log files                        ##
1516
##############################################################
1517
ulogd()
476 richard 1518
{
1519
# Three instances of ulogd (three different logfiles)
1520
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
478 richard 1521
	nl=1
1358 richard 1522
	for log_type in traceability ssh ext-access
478 richard 1523
	do
2937 rexy 1524
		cp -f /lib/systemd/system/ulogd.service /etc/systemd/system/ulogd-$log_type.service
1369 richard 1525
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1375 richard 1526
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1704 richard 1527
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
478 richard 1528
		cat << EOF >> /etc/ulogd-$log_type.conf
1452 richard 1529
[emu1]
478 richard 1530
file="/var/log/firewall/$log_type.log"
1531
sync=1
1532
EOF
2938 rexy 1533
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /etc/systemd/system/ulogd-$log_type.service
478 richard 1534
		nl=`expr $nl + 1`
1535
	done
476 richard 1536
	chown -R root:apache /var/log/firewall
1537
	chmod 750 /var/log/firewall
1538
	chmod 640 /var/log/firewall/*
2724 rexy 1539
}  # End of ulogd()
476 richard 1540
 
1159 crox53 1541
##########################################################
2990 rexy 1542
##                     "nfsen"                          ##
2771 rexy 1543
## - configure NetFlow collector (nfcapd)               ##
1544
## - configure NetFlow grapher (nfsen-ng)               ##
1159 crox53 1545
##########################################################
1389 richard 1546
nfsen()
1 root 1547
{
2772 rexy 1548
	groupadd -f nfcapd
2868 rexy 1549
	id -u nfcapd >/dev/null 2>&1 || useradd -r -g nfcapd -s /bin/false -c "system user for nfcapd" nfcapd
2771 rexy 1550
# nfcapd unit for systemd
2937 rexy 1551
	cat << EOF > /etc/systemd/system/nfcapd.service
1372 richard 1552
#  This file is part of systemd.
1553
#
1554
#  systemd is free software; you can redistribute it and/or modify it
1555
#  under the terms of the GNU General Public License as published by
1556
#  the Free Software Foundation; either version 2 of the License, or
1557
#  (at your option) any later version.
1558
 
2771 rexy 1559
# This unit launches nfcapd (a Netflow collector).
1372 richard 1560
[Unit]
2771 rexy 1561
Description=Netflow Capture Daemon
1562
After=network-online.target iptables.service
1372 richard 1563
 
1564
[Service]
3079 rexy 1565
Type=simple
3242 rexy 1566
ExecStartPre=/bin/mkdir -p /run/nfcapd
1567
ExecStartPre=/bin/chown nfcapd:nfcapd /run/nfcapd
2771 rexy 1568
PIDFile=/run/nfcapd/nfcapd.pid
3292 rexy 1569
ExecStart=/usr/bin/nfcapd -b 127.0.0.1 -p 2055 -u nfcapd -g nfcapd -B 200000 -t 300 -S 1 -z -P /run/nfcapd/nfcapd.pid -I alcasar_netflow -w /var/log/nfsen/profiles-data/live/alcasar_netflow
2771 rexy 1570
ExecReload=/bin/kill -HUP $MAINPID
1372 richard 1571
 
1572
[Install]
1573
WantedBy=multi-user.target
1574
EOF
2825 rexy 1575
    [ -d /var/log/nfsen/profiles-data/live/alcasar_netflow ] || mkdir -p /var/log/nfsen/profiles-data/live/alcasar_netflow
3240 rexy 1576
    touch /var/log/nfsen/profiles-data/live/alcasar_netflow/.nfstat
3242 rexy 1577
    chown -R nfcapd:nfcapd /var/log/nfsen
3240 rexy 1578
# nfsen-ng
3248 rexy 1579
# initializing and populating the RRD database (see if it should be usefull)
1580
#su - apache --shell=/bin/bash -c '/var/www/html/acc/manager/nfsen/backend/cli.php -f -p -ps import'
1581
# nfsen-ng unit for systemd
1582
	cat << EOF > /etc/systemd/system/nfsen-ng.service
1583
#  This file is part of systemd.
1584
#
1585
#  systemd is free software; you can redistribute it and/or modify it
1586
#  under the terms of the GNU General Public License as published by
1587
#  the Free Software Foundation; either version 2 of the License, or
1588
#  (at your option) any later version.
3240 rexy 1589
 
3248 rexy 1590
# This unit launches nfsen-ng (a Netflow grapher).
1591
[Unit]
1592
Description=nfsen-ng daemon (netflow grapher)
1593
After=network-online.target
1594
 
1595
[Service]
1596
Type=simple
1597
User=apache
1598
Group=apache
1599
PIDFile=/var/www/html/acc/manager/nfsen/backend/nfsen-ng.pid
1600
WorkingDirectory=/var/www/html/acc/manager/nfsen/backend/
1601
ExecStart=/usr/bin/php /var/www/html/acc/manager/nfsen/backend/listen.php
1602
 
1603
[Install]
1604
WantedBy=multi-user.target
1605
EOF
1606
 
2724 rexy 1607
} # End of nfsen()
1 root 1608
 
2552 rexy 1609
###########################################################
2990 rexy 1610
##                       "vnstat"                        ##
2809 rexy 1611
## - Initialization of vnstat and vnstat-dashboard       ##
2552 rexy 1612
###########################################################
2724 rexy 1613
vnstat()
1541 richard 1614
{
2990 rexy 1615
# vnstat
2933 rexy 1616
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
2589 rexy 1617
	$SED "s?^Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
2688 lucas.echa 1618
	$SED "s?^DatabaseDir.*?DatabaseDir /var/log/vnstat?g" /etc/vnstat.conf
2933 rexy 1619
	$SED "s?^MaxBandwidth.*?MaxBandwidth 10000?g" /etc/vnstat.conf
2990 rexy 1620
# vnstat-dashboard
2933 rexy 1621
	$SED "s?^\$thisInterface.*?\$thisInterface = \"$EXTIF\";?" $DIR_ACC/manager/vnstat/index.php
2937 rexy 1622
	cp /lib/systemd/system/vnstat.service /etc/systemd/system/vnstat.service
3077 rexy 1623
	$SED "s?^ReadWritePaths=.*?ReadWritePaths=/var/log?g" /etc/systemd/system/vnstat.service
2724 rexy 1624
} # End of vnstat()
2281 tom.houday 1625
 
2724 rexy 1626
#########################################################
2990 rexy 1627
##                     "unbound"                       ##
2724 rexy 1628
## - create the conf files for 4 unbound services      ##
1629
## - create the systemd files for 4 unbound services   ##
1630
#########################################################
2688 lucas.echa 1631
unbound ()
1632
{
1633
	[ -d /etc/unbound/conf.d ] || mkdir -p /etc/unbound/conf.d
1634
	[ -d /etc/unbound/conf.d/common ] || mkdir /etc/unbound/conf.d/common
1635
	[ -d /etc/unbound/conf.d/common/local-forward ] || mkdir /etc/unbound/conf.d/common/local-forward
1636
	[ -d /etc/unbound/conf.d/common/local-dns ] || mkdir /etc/unbound/conf.d/common/local-dns
1637
	[ -d /etc/unbound/conf.d/forward ] || mkdir /etc/unbound/conf.d/forward
1638
	[ -d /etc/unbound/conf.d/blacklist ] || mkdir /etc/unbound/conf.d/blacklist
1639
	[ -d /etc/unbound/conf.d/whitelist ] || mkdir /etc/unbound/conf.d/whitelist
1640
	[ -d /etc/unbound/conf.d/blackhole ] || mkdir /etc/unbound/conf.d/blackhole
2833 rexy 1641
	[ -d /var/log/unbound ] || mkdir /var/log/unbound
1642
	chown unbound:unbound /var/log/unbound
2688 lucas.echa 1643
	[ -e /etc/unbound/unbound.conf.default ] || cp /etc/unbound/unbound.conf /etc/unbound/unbound.conf.default
1644
 
2724 rexy 1645
# Forward zone configuration file for all unbound dns servers
2688 lucas.echa 1646
	cat << EOF > /etc/unbound/conf.d/common/forward-zone.conf
1647
forward-zone:
1648
	name: "."
1649
	forward-addr: $DNS1
1650
	forward-addr: $DNS2
1472 richard 1651
EOF
1652
 
2724 rexy 1653
# Custom configuration file for manual DNS configuration
2688 lucas.echa 1654
	cat << EOF > /etc/unbound/conf.d/common/local-forward/custom.conf
1655
## Ajouter un bloc pour chaque nom de domaine géré par un autre seveur DNS
1656
## Add one block for each domain name managed by an other DNS server
1657
##
1658
## Example:
1659
##
1660
## server:
1661
##     local-zone: "<your_domain>." transparent
1662
## forward-zone:
1663
##     name: "<your_domain>."
1664
##     forward-addr: <@IP_domain_server>
1665
##
2558 rexy 1666
EOF
1667
 
2724 rexy 1668
# Configuration file of ALCASAR main domains for $INTIF
2688 lucas.echa 1669
	cat << EOF > /etc/unbound/conf.d/common/local-dns/${INTIF}.conf
1670
server:
1671
	local-data: "$HOSTNAME.$DOMAIN A $PRIVATE_IP"
2831 rexy 1672
	local-data-ptr: "$PRIVATE_IP $HOSTNAME.$DOMAIN"
2688 lucas.echa 1673
EOF
1674
 
2724 rexy 1675
# Configuration file for lo of forward unbound
2688 lucas.echa 1676
	cat << EOF > /etc/unbound/conf.d/forward/iface.lo.conf
1677
server:
1678
	interface: 127.0.0.1@53
1679
	access-control-view: 127.0.0.1/8 lo
1680
view:
1681
	name: "lo"
2864 rexy 1682
	local-data: "$HOSTNAME A 127.0.0.1"
2688 lucas.echa 1683
	local-data: "$HOSTNAME.$DOMAIN A 127.0.0.1"
2864 rexy 1684
	local-data-ptr: "127.0.0.1 $HOSTNAME.$DOMAIN"
2688 lucas.echa 1685
	view-first: yes
1686
EOF
1687
 
2724 rexy 1688
# Configuration file for $INTIF of forward unbound
2688 lucas.echa 1689
	cat << EOF > /etc/unbound/conf.d/forward/iface.${INTIF}.conf
1690
server:
1691
	interface: ${PRIVATE_IP}@53
1692
	access-control-view: $PRIVATE_NETWORK_MASK $INTIF
1693
view:
1694
	name: "$INTIF"
1695
	view-first: yes
1696
EOF
1697
 
2831 rexy 1698
# Configuration file for main unbound
2688 lucas.echa 1699
	cat << EOF > /etc/unbound/unbound.conf
1700
server:
1701
	verbosity: 1
1702
	hide-version: yes
1703
	hide-identity: yes
1704
	do-ip6: no
1705
	include: /etc/unbound/conf.d/common/forward-zone.conf
1706
	include: /etc/unbound/conf.d/common/local-forward/*
1707
	include: /etc/unbound/conf.d/common/local-dns/*
1708
	include: /etc/unbound/conf.d/forward/*
1709
EOF
1710
 
2724 rexy 1711
# Configuration file for $INTIF of blacklist unbound
2688 lucas.echa 1712
	cat << EOF > /etc/unbound/conf.d/blacklist/iface.${INTIF}.conf
1713
server:
1714
	interface: ${PRIVATE_IP}@54
1715
	access-control: $PRIVATE_IP_MASK allow
1716
	access-control-tag: $PRIVATE_IP_MASK "blacklist"
1717
	access-control-tag-action: $PRIVATE_IP_MASK "blacklist" redirect
1718
	access-control-tag-data: $PRIVATE_IP_MASK "blacklist" "A $PRIVATE_IP"
1719
EOF
1720
 
2724 rexy 1721
# Configuration file for blacklist unbound
2688 lucas.echa 1722
	cat << EOF > /etc/unbound/unbound-blacklist.conf
1723
server:
1724
	verbosity: 1
1725
	hide-version: yes
1726
	hide-identity: yes
1727
	do-ip6: no
1728
	logfile: "/var/log/unbound/unbound-blacklist.log"
1729
	chroot: ""
1730
	define-tag: "blacklist"
1731
	log-local-actions: yes
1732
	include: /etc/unbound/conf.d/common/forward-zone.conf
1733
	include: /etc/unbound/conf.d/common/local-forward/*
1734
	include: /etc/unbound/conf.d/common/local-dns/*
1735
	include: /etc/unbound/conf.d/blacklist/*
1736
	include: /usr/local/share/unbound-bl-enabled/*
1737
EOF
1738
 
2724 rexy 1739
# Configuration file for $INTIF of whitelist unbound
2688 lucas.echa 1740
	cat << EOF > /etc/unbound/conf.d/whitelist/iface.${INTIF}.conf
1741
server:
1742
	interface: ${PRIVATE_IP}@55
1743
	access-control: $PRIVATE_IP_MASK allow
1744
	access-control-tag: $PRIVATE_IP_MASK "whitelist"
1745
	access-control-tag-action: $PRIVATE_IP_MASK "whitelist" redirect
1746
	access-control-tag-data: $PRIVATE_IP_MASK "whitelist" "A $PRIVATE_IP"
1747
EOF
1748
 
2724 rexy 1749
# Configuration file for whitelist unbound
2688 lucas.echa 1750
	cat << EOF > /etc/unbound/unbound-whitelist.conf
1751
server:
3099 rexy 1752
	module-config: "ipset validator iterator"
2688 lucas.echa 1753
	verbosity: 1
1754
	hide-version: yes
1755
	hide-identity: yes
1756
	do-ip6: no
1757
	do-not-query-localhost: no
1758
	define-tag: "whitelist"
1759
	local-zone: "." transparent
1760
	local-zone-tag: "." "whitelist"
3099 rexy 1761
	include: /etc/unbound/conf.d/common/forward-zone.conf
2861 rexy 1762
	include: /etc/unbound/conf.d/common/local-forward/*
1763
	include: /etc/unbound/conf.d/common/local-dns/*
1764
	include: /etc/unbound/conf.d/whitelist/*
2688 lucas.echa 1765
	include: /usr/local/share/unbound-wl-enabled/*
3099 rexy 1766
	username: ""
1767
ipset:
1768
	name-v4: "wl_ip_allowed"
2688 lucas.echa 1769
EOF
1770
 
2724 rexy 1771
# Configuration file for $INTIF of blackhole unbound
2688 lucas.echa 1772
	cat << EOF > /etc/unbound/conf.d/blackhole/iface.${INTIF}.conf
1773
server:
1774
	interface: ${PRIVATE_IP}@56
1775
	access-control-view: $PRIVATE_NETWORK_MASK $INTIF
1776
view:
1777
	name: "$INTIF"
1778
	local-zone: "." redirect
1779
	local-data: ". A $PRIVATE_IP"
1780
EOF
1781
 
2724 rexy 1782
# Configuration file for blackhole unbound
2688 lucas.echa 1783
	cat << EOF > /etc/unbound/unbound-blackhole.conf
1784
server:
1785
	verbosity: 1
1786
	hide-version: yes
1787
	hide-identity: yes
1788
	do-ip6: no
2861 rexy 1789
	include: /etc/unbound/conf.d/common/local-forward/*
1790
	include: /etc/unbound/conf.d/common/local-dns/*
2688 lucas.echa 1791
	include: /etc/unbound/conf.d/blackhole/*
1792
EOF
3257 rexy 1793
 
1794
# Add the safesearch conf file to blacklist & whitelist
1795
	cp $DIR_CONF/safe-searching /etc/unbound/conf.d/blacklist/
1796
	cp $DIR_CONF/safe-searching /etc/unbound/conf.d/whitelist/
1797
 
1798
# Adapt systemd unit for the 4 instances of unbound
2937 rexy 1799
	cp /lib/systemd/system/unbound.service /etc/systemd/system/unbound.service
1800
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/unbound -d -c /etc/unbound/unbound.conf?g" /etc/systemd/system/unbound.service
1801
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /etc/systemd/system/unbound.service
3177 rexy 1802
	$SED "/^PIDFile=/d" /etc/systemd/system/unbound.service
2688 lucas.echa 1803
	for list in blacklist blackhole whitelist
1474 richard 1804
	do
3177 rexy 1805
		cp -f /etc/systemd/system/unbound.service /etc/systemd/system/unbound-$list.service
2937 rexy 1806
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/unbound -d -c /etc/unbound/unbound-$list.conf?g" /etc/systemd/system/unbound-$list.service
1474 richard 1807
	done
2724 rexy 1808
} # End of unbound()
2688 lucas.echa 1809
 
2689 lucas.echa 1810
##################################################
2990 rexy 1811
##                   "dhcpd"                    ##
2689 lucas.echa 1812
##################################################
2724 rexy 1813
dhcpd()
2689 lucas.echa 1814
{
1815
	[ -e /etc/dhcpd.conf.default ] || cp /etc/dhcpd.conf /etc/dhcpd.conf.default
1816
	cat <<EOF > /etc/dhcpd.conf
1817
ddns-update-style none;
1818
subnet $PRIVATE_NETWORK netmask $PRIVATE_NETMASK {
1819
	option routers $PRIVATE_IP;
1820
	option subnet-mask $PRIVATE_NETMASK;
1821
	option domain-name-servers $PRIVATE_IP;
1822
	range dynamic-bootp $PRIVATE_SECOND_IP $PRIVATE_LAST_IP;
1823
	default-lease-time 21600;
1824
	max-lease-time 43200;
1825
}
1826
EOF
3238 rexy 1827
chown -R dhcpd:dhcpd /var/lib/dhcpd
2724 rexy 1828
} # End of dhcpd()
2689 lucas.echa 1829
 
2552 rexy 1830
##########################################################
2990 rexy 1831
##                         "BL"                         ##
2769 rexy 1832
## - copy & adapt Toulouse BL to ALCASAR architecture   ##
2688 lucas.echa 1833
##     - domain names for unbound-bl & unbound-wl       ##
2552 rexy 1834
##     - URLs for E²guardian                            ##
1835
##     - IPs for NetFilter                              ##
2769 rexy 1836
## - copy additional BLs (TOR + Ultrasurf + C&C)        ##
2552 rexy 1837
##########################################################
2724 rexy 1838
BL()
308 richard 1839
{
2990 rexy 1840
# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
3197 rexy 1841
	rm -rf $DIR_E2G/lists/blacklists
1930 richard 1842
	mkdir -p /tmp/blacklists
1938 richard 1843
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
2769 rexy 1844
# creation of the additional BL and WL categorie named "ossi" (for domain names & ip only)
3197 rexy 1845
	mkdir -p $DIR_E2G/lists/blacklists/ossi-bl
1846
	touch $DIR_E2G/lists/blacklists/ossi-bl/domains
1957 richard 1847
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
3197 rexy 1848
	mkdir -p $DIR_E2G/lists/blacklists/ossi-wl
1849
	touch $DIR_E2G/lists/blacklists/ossi-wl/domains
1957 richard 1850
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
2769 rexy 1851
# add additional BL files
2770 rexy 1852
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklists")
1957 richard 1853
	do
3197 rexy 1854
		mkdir $DIR_E2G/lists/blacklists/ossi-bl-$x
1855
		cp $DIR_BLACKLIST/$x  $DIR_E2G/lists/blacklists/ossi-bl-$x/domains
1957 richard 1856
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1857
	done
3197 rexy 1858
	chown -R e2guardian:apache $DIR_E2G
1957 richard 1859
	chown -R root:apache $DIR_DEST_SHARE
3197 rexy 1860
	chmod -R g+rw $DIR_E2G $DIR_DEST_SHARE
1927 richard 1861
# adapt the Toulouse BL to ALCASAR architecture
1957 richard 1862
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1925 richard 1863
# enable the default categories
1957 richard 1864
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
2560 rexy 1865
	rm -rf /tmp/blacklists
2724 rexy 1866
} # End of BL()
219 jeremy 1867
 
2552 rexy 1868
#######################################################
2990 rexy 1869
##                    "cron"                         ##
2552 rexy 1870
## - write all cron & anacron files                  ##
1871
#######################################################
2724 rexy 1872
cron()
1 root 1873
{
2640 rexy 1874
# 'crontab' with standard cron at midnight instead of 4:0 am (default)
1 root 1875
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1876
	cat <<EOF > /etc/crontab
1828 richard 1877
SHELL=/usr/bin/bash
2640 rexy 1878
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1 root 1879
MAILTO=root
1880
HOME=/
1881
 
1882
# run-parts
1883
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1884
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1885
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1886
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1887
EOF
1888
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1889
	cat <<EOF >> /etc/anacrontab
3269 rexy 1890
7	8	cron.MariaDBDump	nice /etc/cron.d/alcasar-mariadb
2454 tom.houday 1891
7	10	cron.logExport		nice /etc/cron.d/alcasar-archive
1 root 1892
EOF
3269 rexy 1893
	cat <<EOF > /etc/cron.d/alcasar-mariadb
2640 rexy 1894
# Verify, repair and export users database (every monday at 4:45 am)
3269 rexy 1895
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mariadb.sh --dump
2640 rexy 1896
# Remove users whose expiration date is exceeded for more more than 7 days (every Monday at 4:40 am)
3269 rexy 1897
40 4 * * * root $DIR_DEST_BIN/alcasar-mariadb.sh --expire_user 2>&1 >/dev/null
1 root 1898
EOF
952 franck 1899
	cat <<EOF > /etc/cron.d/alcasar-archive
2640 rexy 1900
# Archiving logs (traceability & users database) (every Monday at 5:35 am)
952 franck 1901
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1902
EOF
2454 tom.houday 1903
	cat <<EOF > /etc/cron.d/alcasar-ticket-clean
2640 rexy 1904
# Remove password files (created when importing users by CSV files) and user's PDF voucher (every hours at 30')
1566 richard 1905
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
168 franck 1906
EOF
2454 tom.houday 1907
	cat <<EOF > /etc/cron.d/alcasar-distrib-updates
2967 rexy 1908
# Update the system and reboot if needed (everyday at 3:30 am)
1909
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1 ; /usr/local/bin/alcasar-daemon.sh -after-update
722 franck 1910
EOF
2454 tom.houday 1911
	cat <<EOF > /etc/cron.d/alcasar-connections-stats
1808 richard 1912
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
2640 rexy 1913
# 'alcasar-tot_stats' : aggregate the daily connections of users and write it in the table 'totacct' (everyday at 1:01 pm)
1914
# 'alcasar-monthly_tot_stat' : aggregate the monthly connections of users and write it in table 'mtotacct' (everyday at 1h05 pm)
1915
# 'alcasar-truncate_raddact' : remove the user' session log older than 365 days (applying French law : "LCEN") (every month, the first at 01:10 pm)
1916
# 'alcasar-clean_radacct' : close the sessions openned for more than 30 days (every month, the first at 01:15 pm)
1917
# 'alcasar-activity_report.sh' : generate an activity report in PDF (every sunday at 5:35 pm)
1808 richard 1918
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1919
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1920
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1921
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
2009 raphael.pi 1922
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1 root 1923
EOF
2454 tom.houday 1924
	cat <<EOF > /etc/cron.d/alcasar-watchdog
2640 rexy 1925
# 'alcasar-watchdog.sh' : run the "watchdog" (every 10')
3099 rexy 1926
# 'alcasar-flush_ipset_wl.sh' : empty the IPSET of the whitelisted IP loaded dynamically with unbound-whitelist hook (every sunday at 0:05 am)
2886 rexy 1927
# 'alcasar-watchdog.sh --disconnect-permanent-users' : disconnect users with attribute "Alcasar-Status-Page-Must-Stay-Open" (daily --> see "cron.daily")
2640 rexy 1928
# 'alcasar-watchdog-hl.sh' : (optionnaly) remove the IP 0.0.0.0 from chilli cache memory
2395 tom.houday 1929
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1905 raphael.pi 1930
 
2886 rexy 1931
@daily root $DIR_DEST_BIN/alcasar-watchdog.sh --disconnect-permanent-users > /dev/null 2>&1
2228 franck 1932
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1 root 1933
EOF
2454 tom.houday 1934
	cat <<EOF > /etc/cron.d/alcasar-daemon-watchdog
2886 rexy 1935
# start dead daemons (after boot process and every 20')
1851 franck 1936
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
2886 rexy 1937
*/20 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
808 franck 1938
EOF
2454 tom.houday 1939
	cat <<EOF > /etc/cron.d/alcasar-rsync-bl
2769 rexy 1940
# Automatic update the BL (every 12 hours). The enabled categories are listed in '/usr/local/etc/update_cat.conf' (no sync if empty).
1941
 
1874 raphael.pi 1942
EOF
2769 rexy 1943
	cat <<EOF > /etc/cron.d/alcasar-rsync-ossi_bl
1944
# Automatic update the OSSI BLs (every 12 hours) by running the custom update scripts specified in '/usr/local/etc/update_ossi_cat.conf'.
1945
 
1946
EOF
2304 tom.houday 1947
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
2640 rexy 1948
# Automatic renew the Let's Encrypt certificate (daily --> see "cron.daily")
2304 tom.houday 1949
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1950
EOF
2771 rexy 1951
	cat <<EOF > /etc/cron.d/alcasar-nfcapd-expire
2886 rexy 1952
# Remove netflow files older than one year (daily --> see "cron.daily")
2825 rexy 1953
@daily root /usr/bin/nfexpire -e /var/log/nfsen/profiles-data/live/alcasar_netflow -t 365d
2771 rexy 1954
EOF
1808 richard 1955
# removing the users crons
522 richard 1956
	rm -f /var/spool/cron/*
2724 rexy 1957
} # End of cron()
1 root 1958
 
2867 rexy 1959
########################################################################
2990 rexy 1960
##                              "Fail2Ban"                            ##
2867 rexy 1961
##- Adapt conf file to ALCASAR                                        ##
3231 rexy 1962
##- Secure items : SSH, intercept & ACC brute-Force + evasive + pwd   ##
2867 rexy 1963
########################################################################
1163 crox53 1964
fail2ban()
1965
{
2868 rexy 1966
# adapt fail2ban to Mageia (fedora like) & ALCASAR behaviour
2990 rexy 1967
	[ -e /etc/fail2ban/jail.conf.default ] || cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.conf.default
3191 rexy 1968
	$SED "s?^before =.*?before = paths-mageia.conf?g" /etc/fail2ban/jail.conf
2867 rexy 1969
 
1970
# add 5 jails and their filters
3231 rexy 1971
## sshd : Ban after 5 failed attempts (ie. brute-force). This "jail" uses the default "sshd" f2b filter.
2990 rexy 1972
	cat << EOF > /etc/fail2ban/jail.d/01-alcasar_sshd.conf
2867 rexy 1973
[sshd]
1974
enabled = true
1975
#enabled  = false
3231 rexy 1976
maxretry = 5
2868 rexy 1977
bantime = 3m
3231 rexy 1978
findtime = 3m
2867 rexy 1979
EOF
1980
 
3231 rexy 1981
## alcasar_httpd-auth : Ban after 3 failed attempts on ACC. This "jail" uses the default "apache-auth" f2b filter.
1982
	cat << EOF > /etc/fail2ban/jail.d/02-alcasar_httpd-auth.conf
1983
[apache-auth]
1984
enabled = true
2867 rexy 1985
#enabled  = false
3231 rexy 1986
maxretry = 3
1987
bantime = 3m
1988
findtime = 3m
1989
EOF
2867 rexy 1990
 
1991
## mod-evasive : Ban after 3 failed retrieve page attempts (ie : unknown page)
2990 rexy 1992
	cat << EOF > /etc/fail2ban/jail.d/03-alcasar_mod-evasive.conf
2867 rexy 1993
[alcasar_mod-evasive]
3231 rexy 1994
enabled = true
1995
#enabled = false
2867 rexy 1996
backend = auto
1997
filter = alcasar_mod-evasive
1998
action = iptables-allports[name=alcasar_mod-evasive]
3231 rexy 1999
logpath = /var/log/httpd/access_log
2867 rexy 2000
maxretry = 3
2868 rexy 2001
bantime = 3m
2002
findtime = 3m
2867 rexy 2003
EOF
2990 rexy 2004
	cat << EOF > /etc/fail2ban/filter.d/alcasar_mod-evasive.conf
2867 rexy 2005
[Definition]
2006
failregex =  <HOST> .+\] "[^"]+" 403
2007
ignoreregex =
2008
EOF
2009
 
2010
### alcasar_intercept : ban after 5 failed user login attemps on intercept.php
2990 rexy 2011
	cat << EOF > /etc/fail2ban/jail.d/04-alcasar_intercept.conf
2867 rexy 2012
[alcasar_intercept]
2013
enabled = true
2014
#enabled = false
2015
backend = auto
2016
filter = alcasar_intercept
2017
action = iptables-allports[name=alcasar_intercept]
3231 rexy 2018
logpath = /var/log/httpd/access_log
2867 rexy 2019
maxretry = 5
2868 rexy 2020
bantime = 3m
2021
findtime = 3m
2022
EOF
2990 rexy 2023
	cat << EOF > /etc/fail2ban/filter.d/alcasar_intercept.conf
2867 rexy 2024
[Definition]
2025
failregex = <HOST> .* \"GET \/intercept\.php\?res=failed\&reason=reject
2026
ignoreregex =
2027
EOF
2028
 
2029
## alcasar_change-pwd : ban after 5 failed user change password attempts
2990 rexy 2030
	cat << EOF > /etc/fail2ban/jail.d/05-alcasar_change-pwd.conf
2867 rexy 2031
[alcasar_change-pwd]
2032
enabled = true
2033
#enabled = false
2034
backend = auto
2035
filter = alcasar_change-pwd
2036
action = iptables-allports[name=alcasar_change-pwd]
3231 rexy 2037
logpath = /var/log/httpd/access_log
2867 rexy 2038
maxretry = 5
2868 rexy 2039
bantime = 3m
2040
findtime = 3m
2867 rexy 2041
EOF
2990 rexy 2042
	cat << EOF > /etc/fail2ban/filter.d/alcasar_change-pwd.conf
2867 rexy 2043
[Definition]
2044
failregex = <HOST> .* \"POST \/password\.php
2045
ignoreregex =
2046
EOF
2047
 
2840 rexy 2048
# allow reading of 2 log files (fail2ban & watchdog).
2744 rexy 2049
	[ -e /var/log/fail2ban.log ] || /usr/bin/touch /var/log/fail2ban.log
2887 rexy 2050
	[ -e $DIR_SAVE/security/watchdog.log ] || /usr/bin/touch $DIR_SAVE/security/watchdog.log
1165 crox53 2051
	chmod 644 /var/log/fail2ban.log
2887 rexy 2052
	chmod 644 $DIR_SAVE/security/watchdog.log
1418 richard 2053
	/usr/bin/touch /var/log/auth.log
1515 richard 2054
# fail2ban unit
2990 rexy 2055
	cp /lib/systemd/system/fail2ban.service /etc/systemd/system/fail2ban.service
2056
	$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /etc/systemd/system/fail2ban.service
2057
	$SED '/Type=/a\PIDFile=/run/fail2ban/fail2ban.pid' /etc/systemd/system/fail2ban.service
3230 rexy 2058
	$SED '/After=*/c After=syslog.target network.target httpd.service' /etc/systemd/system/fail2ban.service
2724 rexy 2059
} # End of fail2ban()
1163 crox53 2060
 
2990 rexy 2061
########################################################
2062
##                  "gammu_smsd"                      ##
2063
## - Creating of SMS management database              ##
2064
## - Write the gammu a gammu_smsd conf files          ##
2065
########################################################
1376 richard 2066
gammu_smsd()
2067
{
2601 tom.houday 2068
# Create 'gammu' system user
2069
	groupadd -f gammu_smsd
2868 rexy 2070
	useradd -r -g gammu_smsd -s /bin/false -c "system user for gammu_smsd" gammu_smsd
2601 tom.houday 2071
	usermod -a -G dialout gammu_smsd
2072
 
2073
# Create 'gammu' database
3269 rexy 2074
	SQL="/usr/bin/mariadb -uroot -p$dbpwd --execute"
2075
	$SQL "CREATE DATABASE IF NOT EXISTS $DB_GAMMU; GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd'; FLUSH PRIVILEGES;"
1376 richard 2076
# Add a gammu database structure
3269 rexy 2077
	/usr/bin/mariadb -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1376 richard 2078
 
2552 rexy 2079
# Config file for the gammu_smsd daemon & gammu (ttyUSB0 as default com port)
2601 tom.houday 2080
	cat << EOF > /etc/gammurc
2552 rexy 2081
[gammu]
2082
device = /dev/ttyUSB0
2083
connection = at115200
2084
EOF
2085
 
2601 tom.houday 2086
	cat << EOF > /etc/gammu_smsd_conf
1376 richard 2087
[gammu]
2088
port = /dev/ttyUSB0
2089
connection = at115200
2090
 
2091
[smsd]
2092
PIN = 1234
2093
logfile = /var/log/gammu-smsd/gammu-smsd.log
2094
logformat = textall
2095
debuglevel = 0
2096
 
2097
service = sql
2098
driver = native_mysql
2099
user = $DB_USER
2100
password = $radiuspwd
2101
pc = localhost
2102
database = $DB_GAMMU
2103
 
2631 rexy 2104
RunOnReceive = sudo $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1376 richard 2105
 
2106
StatusFrequency = 30
1380 richard 2107
;LoopSleep = 2
1376 richard 2108
 
2109
;ResetFrequency = 300
2110
;HardResetFrequency = 120
2111
 
2454 tom.houday 2112
CheckSecurity = 1
1376 richard 2113
CheckSignal = 1
2114
CheckBattery = 0
2115
EOF
2601 tom.houday 2116
	chmod 755 /etc/gammu_smsd_conf /etc/gammurc
1376 richard 2117
 
2601 tom.houday 2118
# Create the systemd unit
2937 rexy 2119
	cat << EOF > /etc/systemd/system/gammu-smsd.service
2601 tom.houday 2120
[Unit]
2121
Description=SMS daemon for Gammu
2122
Documentation=man:gammu-smsd(1)
3269 rexy 2123
After=network.target mariadb.service
1376 richard 2124
 
2601 tom.houday 2125
[Service]
2126
Type=forking
2775 rexy 2127
ExecStart=/usr/bin/gammu-smsd --config /etc/gammu_smsd_conf --user=gammu_smsd --group=gammu_smsd --pid=/run/gammu-smsd.pid --daemon
2601 tom.houday 2128
ExecReload=/bin/kill -HUP $MAINPID
2775 rexy 2129
ExecStopPost=/bin/rm -f /run/gammu-smsd.pid
2130
PIDFile=/run/gammu-smsd.pid
2601 tom.houday 2131
 
2132
[Install]
2133
WantedBy=multi-user.target
2134
EOF
2135
 
2314 richard 2136
# Log folder for gammu-smsd
2772 rexy 2137
	[ -d /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
2601 tom.houday 2138
	chmod 755 /var/log/gammu-smsd
1376 richard 2139
 
2552 rexy 2140
# Udev rule for Modeswitch (switch from "mass_storage" mode to "ttyUSB" modem) needed with some Huawei MODEM (idVendor: 12d1)
2141
# normally not needed now since modeswitch is managed by udev (see Mageia RPM)
2542 rexy 2142
#cat << EOF > /lib/udev/rules.d/66-huawei.rules
2143
#KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
2144
#EOF
2552 rexy 2145
# Udev rule for fixing the enumeration of ttyUSB port on some MODEM (when they switch randomly the order of their ports at boot time)
2146
# example : http://hintshop.ludvig.co.nz/show/persistent-names-usb-serial-devices/
2147
 
2724 rexy 2148
} # End of gammu_smsd()
1376 richard 2149
 
2990 rexy 2150
########################################################
2151
##                      "msec"                        ##
2152
## - Apply the "fileserver" security level            ##
2153
## - remove the "system request" for rebooting        ##
2154
## - Fix several file permissions                     ##
2155
########################################################
2202 richard 2156
msec()
2157
{
2158
 
2159
# Apply fileserver security level
2990 rexy 2160
	[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
2161
	echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
2202 richard 2162
 
2203 richard 2163
# Set permissions monitoring and enforcement
2202 richard 2164
cat <<EOF > /etc/security/msec/perm.local
2801 rexy 2165
/var/log/firewall/                      root.apache     750
2202 richard 2166
/var/log/firewall/*                     root.apache     640
2167
/etc/security/msec/perm.local           root.root       640
2168
/etc/security/msec/level.local          root.root       640
2169
/etc/freeradius-web                     root.apache     750
2170
/etc/freeradius-web/admin.conf          root.apache     640
2420 richard 2171
/etc/raddb/client.conf                  radius.radius   640
2172
/etc/raddb/radius.conf                  radius.radius   640
2173
/etc/raddb/mods-available/ldap          radius.apache   660
2202 richard 2174
/etc/raddb/sites-available/alcasar      radius.apache   660
2863 rexy 2175
/etc/pki/CA/                            root.apache     750 force
2176
/etc/pki/CA/*                           root.apache     640 force 
2177
/etc/pki/CA/private/                    root.root       700 force
2178
/etc/pki/CA/private/*                   root.root       600 force
2179
/etc/pki/tls/private/                   root.apache     750 force
2180
/etc/pki/tls/private/*                  root.apache     640 force
2202 richard 2181
EOF
2454 tom.houday 2182
# apply now hourly & daily checks
2990 rexy 2183
	/usr/sbin/msec
2184
	/etc/cron.weekly/msec
2202 richard 2185
 
2724 rexy 2186
} # End of msec()
2202 richard 2187
 
2188
##################################################################
2552 rexy 2189
##                   Fonction "letsencrypt"                     ##
2190
## - Install Let's Encrypt client                               ##
2191
## - Prepare Let's Encrypt ALCASAR configuration file           ##
2304 tom.houday 2192
##################################################################
2193
letsencrypt()
2194
{
3170 rexy 2195
	acmesh_installDir="/opt/acme.sh"
2196
	acmesh_confDir="/usr/local/etc/letsencrypt"
2197
	acmesh_userAgent="ALCASAR"
2990 rexy 2198
# Remove potential old installers
2586 tom.houday 2199
	rm -rf /tmp/acme.sh-*
3170 rexy 2200
	[ -d $acmesh_confDir ] && rm -rf $acmesh_confDir
2990 rexy 2201
# Extract acme.sh
2304 tom.houday 2202
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2203
	pwdInstall=$(pwd)
3169 rexy 2204
	cd /tmp/acme.sh-* || { echo "Unable to find tmp ACME directory"; exit 1; }
3170 rexy 2205
	mkdir $acmesh_confDir ; chown root:apache $acmesh_confDir ; chmod 440 $acmesh_confDir
2206
	mkdir $acmesh_confDir/{data,certs,ca} ; chown root:apache $acmesh_confDir/{data,certs,ca} ; chmod 440 $acmesh_confDir/{data,certs,ca}
2990 rexy 2207
# Install acme.sh
2304 tom.houday 2208
	./acme.sh --install \
2209
		--home $acmesh_installDir \
2210
		--config-home $acmesh_confDir/data \
2211
		--certhome $acmesh_confDir/certs \
2212
		--accountkey $acmesh_confDir/ca/account.key \
2213
		--accountconf $acmesh_confDir/data/account.conf \
2214
		--useragent $acmesh_userAgent \
2308 tom.houday 2215
		--nocron \
2216
		> /dev/null
2304 tom.houday 2217
	if [ $? -ne 0 ]; then
2218
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2219
	fi
2990 rexy 2220
# Create configuration file
2304 tom.houday 2221
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2222
email=
2223
dateIssueRequest=
2224
domainRequest=
2225
challenge=
2226
dateIssued=
2227
dnsapi=
2228
dateNextRenewal=
2229
EOF
2688 lucas.echa 2230
	cd $pwdInstall || { echo "Unable to find $pwdInstall directory"; exit 1; }
2304 tom.houday 2231
	rm -rf /tmp/acme.sh-*
2724 rexy 2232
} # End of letsencrypt()
2304 tom.houday 2233
 
2234
##################################################################
2990 rexy 2235
##                       "mail_service"                         ##
3286 rexy 2236
## - Postfix/cyrus-sasl conf for email registration method      ##
2990 rexy 2237
##################################################################
2238
mail_service()
2239
{
3062 rexy 2240
	[ -e /etc/php.d/05_mail.ini.default ] || cp /etc/php.d/05_mail.ini /etc/php.d/05_mail.ini.default
2241
	$SED "s?^mail.add_x_header =.*?mail.add_x_header = Off?g" /etc/php.d/05_mail.ini
3005 rexy 2242
	[ -e /etc/postfix/main.cf.orig ] || cp /etc/postfix/main.cf /etc/postfix/main.cf.orig
3062 rexy 2243
	$SED "s?^inet_protocols =.*?inet_protocols = ipv4?g" /etc/postfix/main.cf
3180 rexy 2244
	$SED "s?^smtp_tls_security_level =.*?smtp_tls_security_level = encrypt?g" /etc/postfix/main.cf
3286 rexy 2245
	$SED "s?^smtpd_banner =.*?smtpd_banner = $HOSTNAME.$DOMAIN ESMTP?g" /etc/postfix/main.cf
2990 rexy 2246
	cat << EOT >> /etc/postfix/main.cf
3070 rexy 2247
smtputf8_enable = no
3062 rexy 2248
smtp_use_tls = yes
2249
smtp_tls_wrappermode = yes
3005 rexy 2250
smtp_sasl_auth_enable = yes
2251
smtp_sasl_security_options = noanonymous
2252
smtp_sasl_password_maps = hash:/etc/postfix/sasl/sasl_passwd
2253
relayhost =
2990 rexy 2254
myhostname = $HOSTNAME.$DOMAIN
2994 rexy 2255
EOT
3286 rexy 2256
	[ -e /etc/postfix/aliases.default ] || cp /etc/postfix/aliases /etc/postfix/aliases.default
2257
	human_user=`grep -E "x:1000:" /etc/passwd | cut -d":" -f1`
2258
	grep -Eq 'root:\s+postfix$' /etc/postfix/aliases && $SED "/root:/ s/postfix/$human_user/" /etc/postfix/aliases && newaliases
2990 rexy 2259
	chown -R postfix:postfix /var/lib/postfix
2260
} # end of mail_service
2261
 
2262
##################################################################
2552 rexy 2263
##                    Fonction "post_install"                   ##
2264
## - Modifying banners (locals et ssh) & prompts                ##
2265
## - SSH config                                                 ##
2266
## - sudoers config & files security                            ##
2267
## - log rotate & ANSSI security parameters                     ##
2268
## - Apply former conf in case of an update                     ##
2269
##################################################################
1 root 2270
post_install()
2271
{
3093 rexy 2272
	MAGEIA_VERSION=`cat /etc/lsb-release|grep "DISTRIB_DESCRIPTION"|cut -d"=" -f2|tr -d '"'`
2840 rexy 2273
# change the SSHD options
2195 richard 2274
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
3093 rexy 2275
	echo " Version $VERSION ($MAGEIA_VERSION)" >> /etc/ssh/alcasar-banner-ssh
5 franck 2276
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1 root 2277
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2278
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2279
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2840 rexy 2280
# sshd listens on EXTIF & INTIF
2281
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2282
# sshd authorized certificate for root login
2283
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2284
	$SED "s?^X11Forwarding.*?#X11Forwarding yes?g" /etc/ssh/sshd_config
2195 richard 2285
# ALCASAR conf file
2818 rexy 2286
	echo "HTTPS_LOGIN=off" >> $CONF_FILE
2409 tom.houday 2287
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
3043 rexy 2288
	echo "SSH_LAN=22" >> $CONF_FILE
2289
	echo "SSH_WAN=0" >> $CONF_FILE
1631 richard 2290
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
3046 rexy 2291
	echo "INTERLAN=off" >> $CONF_FILE
628 richard 2292
	echo "LDAP=off" >> $CONF_FILE
2447 richard 2293
	echo "LDAP_SERVER=127.0.0.1" >> $CONF_FILE
3238 rexy 2294
	echo "LDAP_BASE=cn=Users;dc=serverad;dc=lan" >> $CONF_FILE
2454 tom.houday 2295
	echo "LDAP_UID=sAMAccountName" >> $CONF_FILE
2296
	echo "LDAP_FILTER=" >> $CONF_FILE
2297
	echo "LDAP_USER=alcasar" >> $CONF_FILE
2298
	echo "LDAP_PASSWORD=" >> $CONF_FILE
2705 tom.houday 2299
	echo "LDAP_SSL=on" >> $CONF_FILE
2300
	echo "LDAP_CERT_REQUIRED=" >> $CONF_FILE
2600 tom.houday 2301
	echo "SMS=off" >> $CONF_FILE
2302
	echo "SMS_NUM=" >> $CONF_FILE
2993 rexy 2303
	echo "MAIL=off" >> $CONF_FILE
2304
	echo "MAIL_TYPE=" >> $CONF_FILE
2305
	echo "MAIL_SMTP_IP=" >> $CONF_FILE
3021 rexy 2306
	echo "MAIL_SMTP_PORT=" >> $CONF_FILE
2993 rexy 2307
	echo "MAIL_ADDR=" >> $CONF_FILE
2308
	echo "MAIL_WHITEDOMAIN=" >> $CONF_FILE
2309
	echo "MAIL_ADMIN=" >> $CONF_FILE
2688 lucas.echa 2310
	echo "BL_PUREIP=on" >> $CONF_FILE
2311
	echo "BL_SAFESEARCH=off" >> $CONF_FILE
2312
	echo "WL_SAFESEARCH=off" >> $CONF_FILE
2770 rexy 2313
	echo "IOT_CAPTURE=off" >> $CONF_FILE
2926 rexy 2314
	echo "WIFI4EU=off" >> $CONF_FILE
2315
	echo "WIFI4EU_CODE=123e4567-e89b-12d3-a456-426655440000" >> $CONF_FILE
2979 rexy 2316
	echo "MULTIWAN=off" >> $CONF_FILE
3294 rexy 2317
	echo "REPLICATION=off" >> $CONF_FILE
2318
	echo "REPLICATION_TO=" >> $CONF_FILE
2195 richard 2319
# Prompt customisation (colors)
1 root 2320
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
5 franck 2321
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
630 franck 2322
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2941 rexy 2323
	$SED "s?^alias ll=.*?alias ll=\"ls -al --color\"?g" /etc/profile.d/60alias.sh
2195 richard 2324
# sudoers configuration for "apache" & "sysadmin"
1 root 2325
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2850 rexy 2326
	cp -f $DIR_CONF/sudoers /etc/ ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
629 richard 2327
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1543 richard 2328
# Modify some logrotate files (gammu, ulogd)
1 root 2329
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2330
	chmod 644 /etc/logrotate.d/*
2195 richard 2331
# Log compression
706 franck 2332
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2333
# actualisation des fichiers logs compressés
3230 rexy 2334
	for dir in firewall e2guardian httpd
706 franck 2335
	do
2688 lucas.echa 2336
		find /var/log/$dir -type f -name "*.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9]" -exec gzip {} \;
706 franck 2337
	done
2601 tom.houday 2338
	/usr/bin/systemctl daemon-reload
2956 rexy 2339
# processes started at boot time (Systemctl)
3269 rexy 2340
	for i in alcasar-network mariadb httpd ntpd iptables unbound unbound-blacklist unbound-whitelist unbound-blackhole radiusd nfcapd nfsen-ng e2guardian ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban vnstat sshd
1221 richard 2341
	do
1574 richard 2342
		/usr/bin/systemctl -q enable $i.service
1221 richard 2343
	done
2454 tom.houday 2344
 
1452 richard 2345
# disable processes at boot time (Systemctl)
2688 lucas.echa 2346
	for i in ulogd gpm dhcpd
1452 richard 2347
	do
1574 richard 2348
		/usr/bin/systemctl -q disable $i.service
1452 richard 2349
	done
2454 tom.houday 2350
 
2864 rexy 2351
# Apply some security rules (some are from French cybersecurity Agency - ANSSI)
1362 richard 2352
# ignore ICMP broadcast (smurf attack)
2353
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2354
# ignore ICMP errors bogus
2355
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2356
# remove ICMP redirects responces
2357
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2358
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2359
# enable SYN Cookies (Syn flood attacks)
2360
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2361
# enable kernel antispoofing
2362
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2363
# ignore source routing
2364
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2365
# set conntrack timer to 1h (3600s) instead of 5 weeks
2366
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2454 tom.houday 2367
# disable log_martians (ALCASAR is often installed between two private network addresses)
1363 richard 2368
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1778 richard 2369
# disable iptables_helpers
2370
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
1788 richard 2371
# Switch to the router mode
2372
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
1917 franck 2373
# Remove unused service ipv6
1964 franck 2374
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2375
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2376
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2377
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
1003 richard 2378
# switch to multi-users runlevel (instead of x11)
1221 richard 2379
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2864 rexy 2380
# disable Core dump file
2381
	[ -e /etc/security/limits.conf.default ]  || cp /etc/security/limits.conf /etc/security/limits.conf.default
2382
	$SED "/^# End of file.*/i*\tsoft\tcore\t0\n*\thard\tcore\t0" /etc/security/limits.conf
2432 richard 2383
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
3222 rexy 2384
	[ -e /etc/default/grub.default ] || cp /etc/default/grub /etc/default/grub.default
2432 richard 2385
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2433 richard 2386
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2432 richard 2387
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
3190 rexy 2388
	vm_vga=`lsmod | grep -c -E "virtio|vmwgfx"` # test if in VM
2454 tom.houday 2389
	if [ $vm_vga == 0 ] # is not a VM
2432 richard 2390
	then
2454 tom.houday 2391
		cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2392
		echo >> /etc/mageia-release
2393
		$SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
3093 rexy 2394
	else
2395
		echo > /etc/mageia-release
2454 tom.houday 2396
	fi
2397
	if [ $Lang == "fr" ]
2398
	then
3093 rexy 2399
		echo "Bienvenue sur ALCASAR Version $VERSION ($MAGEIA_VERSION)" >> /etc/mageia-release
2688 lucas.echa 2400
		echo "Connectez-vous à l'URL 'https://$HOSTNAME.$DOMAIN/acc'" >> /etc/mageia-release
2454 tom.houday 2401
	else
3093 rexy 2402
		echo "Welcome on ALCASAR Version $VERSION ($MAGEIA_VERSION)" >> /etc/mageia-release
2688 lucas.echa 2403
		echo "Connect to 'https://$HOSTNAME.$DOMAIN/acc'" >> /etc/mageia-release
2454 tom.houday 2404
	fi
2405
	/usr/bin/update-grub2
1221 richard 2406
# Load and apply the previous conf file
2407
	if [ "$mode" = "update" ]
532 richard 2408
	then
2887 rexy 2409
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in $DIR_SAVE/archive
1221 richard 2410
		$DIR_DEST_BIN/alcasar-conf.sh --load
2411
		PARENT_SCRIPT=`basename $0`
2412
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2413
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2454 tom.houday 2414
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf
1221 richard 2415
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2416
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
532 richard 2417
	fi
2560 rexy 2418
	rm -f /var/tmp/alcasar-conf*
1221 richard 2419
	chown -R root:apache $DIR_DEST_ETC/*
2420
	chmod -R 660 $DIR_DEST_ETC/*
2421
	chmod ug+x $DIR_DEST_ETC/digest
2688 lucas.echa 2422
	cd $DIR_INSTALL || { echo "Unable to find $DIR_INSTALL directory"; exit 1; }
5 franck 2423
	echo ""
1 root 2424
	echo "#############################################################################"
638 richard 2425
	if [ $Lang == "fr" ]
2426
		then
2427
		echo "#                        Fin d'installation d'ALCASAR                       #"
2428
		echo "#                                                                           #"
2429
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2430
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2431
		echo "#                                                                           #"
2432
		echo "#############################################################################"
2433
		echo
2434
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2435
		echo
2436
		echo "- Lisez attentivement la documentation d'exploitation"
2437
		echo
2688 lucas.echa 2438
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://$HOSTNAME.$DOMAIN"
638 richard 2439
		echo
2440
		echo "                   Appuyez sur 'Entrée' pour continuer"
2454 tom.houday 2441
	else
2396 tom.houday 2442
		echo "#                        End of ALCASAR install process                     #"
638 richard 2443
		echo "#                                                                           #"
2444
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2445
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2446
		echo "#                                                                           #"
2447
		echo "#############################################################################"
2448
		echo
2449
		echo "- The system will be rebooted in order to operate ALCASAR"
2450
		echo
2451
		echo "- Read the exploitation documentation"
2452
		echo
2688 lucas.echa 2453
		echo "- The ALCASAR Control Center (ACC) is at http://$HOSTNAME.$DOMAIN"
638 richard 2454
		echo
2455
		echo "                   Hit 'Enter' to continue"
2456
	fi
1782 franck 2457
	sleep 2
2560 rexy 2458
	if [ "$mode" == "install" ] || [ "$DEBUG_ALCASAR" == "on" ]
820 richard 2459
	then
2688 lucas.echa 2460
		read
815 richard 2461
	fi
774 richard 2462
	clear
1 root 2463
	reboot
2724 rexy 2464
} # End of post_install()
1 root 2465
 
2552 rexy 2466
#####################################################################################
2467
#                                   Main Install loop                               #
2468
#####################################################################################
832 richard 2469
dir_exec=`dirname "$0"`
2470
if [ $dir_exec != "." ]
2471
then
2472
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2473
	echo "Launch this program from the ALCASAR archive directory"
2474
	exit 0
2475
fi
2688 lucas.echa 2476
if [ $EUID -gt 0 ]
2220 richard 2477
then
2688 lucas.echa 2478
	echo "Vous devez être \"root\" pour installer ALCASAR (commande 'su')"
2479
	echo "You must be \"root\" to install ALCASAR ('su' command)"
2220 richard 2480
	exit 0
2481
fi
832 richard 2482
VERSION=`cat $DIR_INSTALL/VERSION`
291 franck 2483
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1 root 2484
nb_args=$#
2485
args=$1
2486
if [ $nb_args -eq 0 ]
2487
then
2488
	nb_args=1
2489
	args="-h"
2490
fi
1062 richard 2491
chmod -R u+x $DIR_SCRIPTS/*
1 root 2492
case $args in
2493
	-\? | -h* | --h*)
2494
		echo "$usage"
2495
		exit 0
2496
		;;
291 franck 2497
	-i | --install)
3180 rexy 2498
		for func in system_testing network_testing
2724 rexy 2499
		do
2500
			header_install
2501
			$func
2502
			if [ $DEBUG_ALCASAR == "on" ]
2503
			then
3179 rexy 2504
				echo "*** 'debug' : end installing function '$func' ***"
2724 rexy 2505
				read
2506
			fi
2507
		done
595 richard 2508
# RPMs install
2941 rexy 2509
		$DIR_SCRIPTS/alcasar-rpm.sh
595 richard 2510
		if [ "$?" != "0" ]
1 root 2511
		then
595 richard 2512
			exit 0
2513
		fi
1249 richard 2514
		if [ -e $CONF_FILE ]
595 richard 2515
		then
2458 richard 2516
# Uninstall or update the running version
2517
			if [ "$mode" == "update" ]
2518
			then
2560 rexy 2519
				$DIR_DEST_BIN/alcasar-uninstall.sh -update
2458 richard 2520
			else
2560 rexy 2521
				$DIR_DEST_BIN/alcasar-uninstall.sh -full
2458 richard 2522
			fi
595 richard 2523
		fi
2847 rexy 2524
		if [ $DEBUG_ALCASAR == "on" ]
2525
		then
2526
			echo "*** 'debug' : end of cleaning ***"
2527
			read
2528
		fi
2980 rexy 2529
# Avoid some RPM automatic updates
2530
		echo "/^kernel/" > /etc/urpmi/skip.list
2531
		echo "/^wkhtmltopdf/" >> /etc/urpmi/skip.list
2532
		echo "/^freeradius/" >> /etc/urpmi/skip.list
3273 rexy 2533
		echo "/^mariadb/" >> /etc/urpmi/skip.list
3190 rexy 2534
		if [ `grep -E '^exclude=' /etc/dnf/dnf.conf |wc -l` -eq "1" ]; then
3273 rexy 2535
			$SED "s?^exclude=.*?exclude=kernel\* wkhtmltopdf freeradius mariadb?g" /etc/dnf/dnf.conf
2980 rexy 2536
		else
3273 rexy 2537
			echo "exclude=kernel* wkhtmltopdf freeradius mariadb" >> /etc/dnf/dnf.conf
2980 rexy 2538
		fi
2835 rexy 2539
# Test if conf file
2540
		if [ -e /var/tmp/alcasar-conf.tar.gz ]
595 richard 2541
		then
2826 rexy 2542
# Extract some info from the previous configuration file
2834 rexy 2543
			cd /var/tmp
2544
			tar -xf /var/tmp/alcasar-conf.tar.gz conf/etc/alcasar.conf
2847 rexy 2545
			if [ "$mode" == "install" ] # don't display this if updating a running version
2834 rexy 2546
			then
2547
				header_install
2548
				ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2549
				PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2550
				MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2551
				MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2`
2552
				UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3|cut -c1`
597 richard 2553
				if [ $Lang == "fr" ]
2834 rexy 2554
					then echo "Le fichier de configuration d'une version $MAJ_PREVIOUS_VERSION.$MIN_PREVIOUS_VERSION.$UPD_PREVIOUS_VERSION a été trouvé";
2956 rexy 2555
					else echo "The configuration file of a version $MAJ_PREVIOUS_VERSION.$MIN_PREVIOUS_VERSION.$UPD_PREVIOUS_VERSION has been found";
597 richard 2556
				fi
2834 rexy 2557
				response=0
2558
				PTN='^[oOnNyY]?$'
2559
				until [[ "$response" =~ $PTN ]]
2560
				do
2561
					if [ $Lang == "fr" ]
2562
						then echo -n "Voulez-vous l'utiliser (O/n)? ";
2563
						else echo -n "Do you want to use it (Y/n)?";
2564
					fi
2565
					read response
2566
					if [ "$response" = "n" ] || [ "$response" = "N" ]
2567
					then
2568
						rm -f /var/tmp/alcasar-conf*
2569
						rm -rf /var/tmp/conf
2570
					fi
2571
				done
2572
			fi
2847 rexy 2573
			cd $DIR_INSTALL
597 richard 2574
		fi
636 richard 2575
# Test if update
2834 rexy 2576
		if [ -e /var/tmp/alcasar-conf.tar.gz ]
597 richard 2577
		then
2578
			if [ $Lang == "fr" ]
2579
				then echo "#### Installation avec mise à jour ####";
2580
				else echo "#### Installation with update     ####";
2581
			fi
5 franck 2582
			mode="update"
1 root 2583
		fi
3170 rexy 2584
		for func in init network CA ACC time_server init_db freeradius chilli e2guardian ulogd nfsen vnstat unbound dhcpd BL cron fail2ban gammu_smsd msec letsencrypt mail_service post_install
5 franck 2585
		do
2586
			$func
2466 richard 2587
			if [ $DEBUG_ALCASAR == "on" ]
2688 lucas.echa 2588
			then
3179 rexy 2589
				echo "*** 'debug' : end installing function '$func' ***"
2688 lucas.echa 2590
				read
2466 richard 2591
			fi
14 richard 2592
		done
5 franck 2593
		;;
291 franck 2594
	-u | --uninstall)
1828 richard 2595
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
1 root 2596
		then
597 richard 2597
			if [ $Lang == "fr" ]
2598
				then echo "ALCASAR n'est pas installé!";
2599
				else echo "ALCASAR isn't installed!";
2600
			fi
1 root 2601
			exit 0
2602
		fi
5 franck 2603
		response=0
2760 lucas.echa 2604
		PTN='^[oOyYnN]?$'
2605
		until [[ "$response" =~ $PTN ]]
5 franck 2606
		do
597 richard 2607
			if [ $Lang == "fr" ]
2760 lucas.echa 2608
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (O/n)? ";
854 richard 2609
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
597 richard 2610
			fi
5 franck 2611
			read response
2612
		done
1103 richard 2613
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
1 root 2614
		then
3206 rexy 2615
			$DIR_DEST_BIN/alcasar-conf.sh --create
2454 tom.houday 2616
		else
2560 rexy 2617
			rm -f /var/tmp/alcasar-conf*
1 root 2618
		fi
597 richard 2619
# Uninstall the running version
2560 rexy 2620
		$DIR_DEST_BIN/alcasar-uninstall.sh -full
1 root 2621
		;;
2622
	*)
2623
		echo "Argument inconnu :$1";
460 richard 2624
		echo "Unknown argument :$1";
1 root 2625
		echo "$usage"
2626
		exit 1
2627
		;;
2628
esac
10 franck 2629
# end of script