Subversion Repositories ALCASAR

Rev

Rev 3274 | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
672 richard 1
#!/bin/bash
2454 tom.houday 2
#  $Id: alcasar.sh 3277 2025-04-27 16:39:10Z rexy $
1 root 3
 
2969 rexy 4
# ALCASAR is a Free and open source NAC (Network Access Controler) created by Franck BOUIJOUX (3abtux), Pascal LEVANT and Richard REY (Rexy)
3230 rexy 5
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares Coovachilli, freeradius, mariaDB, apache, php, netfilter, e2guardian, ntpd, openssl, unbound, gammu, Ulog, fail2ban, vnstat, wkhtml2pdf, ipt_NETFLOW, NFsen and NFdump
2969 rexy 6
# contact : info@alcasar.net
959 franck 7
 
1 root 8
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
2969 rexy 9
# This script is distributed under the Gnu General Public License (GPLV3)
2466 richard 10
 
1 root 11
# Options :
376 franck 12
#       -i or --install
13
#       -u or --uninstall
14
# Functions :
2990 rexy 15
#	system_testing	: Free space test and mageia version test
16
#	network_testing	: Internet connectivity tests
1221 richard 17
#	init			: Installation of RPM and scripts
18
#	network			: Network parameters
2552 rexy 19
#	ACC				: ALCASAR Control Center installation
20
#	CA				: Certification Authority initialization
1837 richard 21
#	time_server		: NTPd configuration
1221 richard 22
#	init_db			: Initilization of radius database managed with MariaDB
2421 richard 23
#	freeradius		: FreeRadius initialisation
2990 rexy 24
#	chilli			: Coovachilli initialisation (+authentication page)
2521 armand.ito 25
#	e2guardian		: E2Guardian filtering HTTP proxy configuration
2990 rexy 26
#	ulogd			: Log system in userland (match NFLOG target of iptables)
3248 rexy 27
#	nfsen			: Configuration of netflow collector (nfcapd) and Netflow grapher (nfsen-ng)
2688 lucas.echa 28
#	unbound			: Name server configuration
2990 rexy 29
#	vnstat			: Little network stat daemon
2688 lucas.echa 30
#	BL				: Adaptation of Toulouse University BlackList : split into 3 BL (for unbound, for e2guardian and for Netfilter)
1266 richard 31
#	cron			: Logs export + watchdog + connexion statistics
1389 richard 32
#	fail2ban		: Fail2ban IDS installation and configuration
33
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
2969 rexy 34
#	msec			: Mageia security package configuration
2304 tom.houday 35
#	letsencrypt		: Let's Encrypt client
2990 rexy 36
#	mail_service	: Mail service for email authentification method
2552 rexy 37
#	post_install	: Security, log rotation, etc.
1 root 38
 
2499 tom.houday 39
DEBUG_ALCASAR='off'; export DEBUG_ALCASAR	# Debug mode = wait (hit key) after each function
1 root 40
DATE=`date '+%d %B %Y - %Hh%M'`
41
DATE_SHORT=`date '+%d/%m/%Y'`
595 richard 42
Lang=`echo $LANG|cut -c 1-2`
3219 rexy 43
export LC_ALL=C		 					# switch to default language
1362 richard 44
mode="install"
1 root 45
# ******* Files parameters - paramètres fichiers *********
2552 rexy 46
DIR_INSTALL=`pwd`						# current directory
1015 richard 47
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
48
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
2552 rexy 49
DIR_BLACKLIST="$DIR_INSTALL/blacklist"	# install directory (with blacklist files)
50
DIR_SAVE="/var/Save"					# backup directory (traceability_log, user_db, security_log)
3230 rexy 51
DIR_WEB="/var/www/html"					# directory of Apache
3197 rexy 52
DIR_E2G="/etc/e2guardian"				# directory of E2Guardian
2552 rexy 53
DIR_ACC="$DIR_WEB/acc"					# directory of the 'ALCASAR Control Center'
1015 richard 54
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
55
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
2688 lucas.echa 56
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (unbound for instance)
2552 rexy 57
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"	# central ALCASAR conf file
1015 richard 58
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
1 root 59
# ******* DBMS parameters - paramètres SGBD ********
2552 rexy 60
DB_RADIUS="radius"						# database name used by FreeRadius server
61
DB_USER="radius"						# user name allows to request the users database
62
DB_GAMMU="gammu"						# database name used by Gammu-smsd
1 root 63
# ******* Network parameters - paramètres réseau *******
2552 rexy 64
HOSTNAME="alcasar"						# default hostname
3238 rexy 65
DOMAIN="lan"							# default local domain
2736 rexy 66
EXTIF=''								# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
67
INTIF=''								# INTIF is connected to the consultation network
1148 crox53 68
MTU="1500"
1243 richard 69
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
1 root 70
# ****** Paths - chemin des commandes *******
71
SED="/bin/sed -i"
72
# ****************** End of global parameters *********************
73
 
2724 rexy 74
license()
959 franck 75
{
76
	if [ $Lang == "fr" ]
1538 richard 77
	then
3190 rexy 78
		echo "                   *******************************"
79
		echo "                   **** Licence d'utilisation ****"
80
		echo "                   *******************************"
81
		echo
82
		echo "ALCASAR est un logiciel libre"
83
		echo
84
		echo "Avant de l'installer, vous devez accepter les termes de sa licence 'GPL-V3'"
85
		echo "Le descriptif de cette licence est disponible dans le fichier 'GPL-3.0.txt'"
86
		echo "Une traduction française est disponible dans le fichier 'GPL-3.0.fr.txt'."
87
		echo
88
		echo "Les objectifs de cette licence sont de garantir à l'utilisateur :"
89
		echo "- La liberté d'exécuter le logiciel, pour n'importe quel usage ;"
90
		echo "- La liberté d'étudier et d'adapter le logiciel à ses besoins ;"
91
		echo "- La liberté de redistribuer des copies ;"
92
		echo "- L'obligation de faire bénéficier à la communauté les versions modifiées."
93
		echo
1538 richard 94
	else
3190 rexy 95
		echo "                   *******************************"
96
		echo "                   ****      User License     ****"
97
		echo "                   *******************************"
98
		echo
99
		echo "ALCASAR is an open source software"
100
		echo
101
		echo "Before install it, you must understand and accept the license 'GPL-V3'"
102
		echo "you can read this license in the file 'GPL-3.0.txt'"
103
		echo
104
		echo "The goals of this license are :"
105
		echo "- the freedom of using the software ;"
106
		echo "- the freedom of studying et adapting it for its own uses ;"
107
		echo "- the freedom of redistributing copies of it ;"
108
		echo "- the compulsory of giving the modify versions to the community"
109
		echo
959 franck 110
	fi
1538 richard 111
	response=0
2760 lucas.echa 112
	PTN='^[oOyYnN]?$'
113
	until [[ "$response" =~ $PTN ]]
1538 richard 114
	do
115
		if [ $Lang == "fr" ]
1563 franck 116
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
1538 richard 117
			else echo -n "Do you accept the terms of this license (Y/n)? : "
118
		fi
119
		read response
120
	done
121
	if [ "$response" = "n" ] || [ "$response" = "N" ]
122
	then
123
		exit 1
124
	fi
2724 rexy 125
} # End of license()
959 franck 126
 
2724 rexy 127
header_install()
1 root 128
{
129
	clear
130
	echo "-----------------------------------------------------------------------------"
460 richard 131
	echo "                     ALCASAR V$VERSION Installation"
1 root 132
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
133
	echo "-----------------------------------------------------------------------------"
2724 rexy 134
} # End of header_install()
1 root 135
 
2552 rexy 136
########################################################
2990 rexy 137
##                  "system_testing"                  ##
3190 rexy 138
## - Test distribution version                        ##
2552 rexy 139
## - Test ALCASAR version (if already installed)      ##
140
## - Test free space on /var  (>10G)                  ##
141
## - Test Internet access                             ##
142
########################################################
2990 rexy 143
system_testing()
29 richard 144
{
1529 richard 145
# Test of Mageia version
3043 rexy 146
# extract the current Mageia version and hardware architecture (X86_64)
3190 rexy 147
	fic="/etc/product.id"
148
	DISTRIBUTION_NAME=`cat $fic|cut -d"," -f2|cut -d"=" -f2`
149
	DISTRIBUTION_VERSION=`cat $fic|cut -d"," -f4|cut -d"=" -f2`
150
	DISTRIBUTION_ARCH=`cat $fic|cut -d"," -f7|cut -d"=" -f2`
151
	if [ "$DISTRIBUTION_ARCH" != "x86_64" ]
2149 richard 152
		then
153
		if [ $Lang == "fr" ]
2669 tom.houday 154
			then echo "Votre architecture matérielle doit être en 64bits"
155
			else echo "You hardware architecture must be 64bits"
2149 richard 156
		fi
2482 lucas.echa 157
		exit 1
2149 richard 158
	fi
3190 rexy 159
	if [[("$DISTRIBUTION_NAME" != "Mageia" ) || (( "$DISTRIBUTION_VERSION" != "8" ) && ( "$DISTRIBUTION_VERSION" != "9" ))]]
2688 lucas.echa 160
	then
2669 tom.houday 161
		if [ -e /var/tmp/alcasar-conf.tar.gz ] # update
162
			then
163
			echo
164
			if [ $Lang == "fr" ]
165
				then
166
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
167
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
3077 rexy 168
				echo "2 - Installez Linux-Mageia 8 et ALCASAR (cf. doc d'installation)"
2669 tom.houday 169
				echo "3 - Importez votre base des usagers"
170
			else
171
				echo "The automatic update of ALCASAR can't be performed."
172
				echo "1 - Save your traceability files and the user database"
3077 rexy 173
				echo "2 - Install Linux-Mageia 8 & ALCASAR (cf. installation doc)"
2669 tom.houday 174
				echo "3 - Import your users database"
175
			fi
176
		else
177
			if [ $Lang == "fr" ]
178
				then echo "L'installation d'ALCASAR ne peut pas être réalisée."
179
				else echo "The installation of ALCASAR can't be performed."
180
			fi
181
		fi
182
		echo
183
		if [ $Lang == "fr" ]
3077 rexy 184
			then echo "Le système d'exploitation doit être remplacé (Mageia8)"
185
			else echo "The OS must be replaced (Mageia8)"
2669 tom.houday 186
		fi
2688 lucas.echa 187
		exit 1
2669 tom.houday 188
	fi
189
 
1362 richard 190
# Test if ALCASAR is already installed
191
	if [ -e $CONF_FILE ]
192
	then
2396 tom.houday 193
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
1342 richard 194
		if [ $Lang == "fr" ]
2669 tom.houday 195
			then echo "La version $current_version d'ALCASAR est déjà installée"
196
			else echo "ALCASAR version $current_version is already installed"
1342 richard 197
		fi
1362 richard 198
		response=0
2458 richard 199
		PTN='^[12]$'
2760 lucas.echa 200
		until [[ "$response" =~ $PTN ]]
1362 richard 201
		do
202
			if [ $Lang == "fr" ]
2669 tom.houday 203
				then echo -n "Tapez '1' pour une mise à jour; Tapez '2' pour une réinstallation : "
204
				else echo -n "Hit '1' for an update; Hit '2' for a reinstallation : "
2499 tom.houday 205
			fi
1362 richard 206
			read response
207
		done
2458 richard 208
		if [ "$response" = "2" ]
1362 richard 209
		then
2560 rexy 210
			rm -f /var/tmp/alcasar-conf*
3273 rexy 211
		else 
2870 rexy 212
# Create the archive of conf files
3273 rexy 213
			[ ! -e /usr/bin/mariadb_install_db ] && ln -s /usr/bin/mariadb-install-db /usr/bin/mariadb_install_db # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
214
			[ ! -e /usr/sbin/mysqld-prepare-db-dir ] && ln -s /usr/sbin/mariadb-prepare-db-dir /usr/sbin/mysqld-prepare-db-dir # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
215
			$DIR_DEST_BIN/alcasar-daemon.sh
3206 rexy 216
			$DIR_DEST_BIN/alcasar-conf.sh --create
1362 richard 217
			mode="update"
218
		fi
3180 rexy 219
	else
220
		license
1529 richard 221
	fi
2847 rexy 222
# Free /var (when updating) and test free space
223
	[ -d /var/log/netflow ] && rm -rf /var/log/netflow  # remove old porttracker RRD database
224
	journalctl -q --vacuum-files 1  # remove previous journal logs
2771 rexy 225
	free_space=`df -BG --output=avail /var|tail -1|tr -d '[:space:]G'`
226
	if [ $free_space -lt 10 ]
1529 richard 227
		then
2771 rexy 228
		if [ $Lang == "fr" ]
2847 rexy 229
			then echo "Espace disponible insuffisant sur /var ($free_space Go au lieu de 10 Go au minimum)"
2771 rexy 230
			else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
1529 richard 231
		fi
2771 rexy 232
	exit 0
1529 richard 233
	fi
2990 rexy 234
} # End of system_testing
2669 tom.houday 235
 
2870 rexy 236
########################################################
2990 rexy 237
##                   "network_testing"                ##
238
## - Internet access test                             ##
2870 rexy 239
########################################################
2990 rexy 240
network_testing()
2870 rexy 241
{
2669 tom.houday 242
# Detect external/internal interfaces
243
	if [ -z "$EXTIF" ]; then
3112 rexy 244
		GwListSorted=$(/usr/sbin/ip r list | grep default | cut -d" " -f5 | uniq )
245
		nb_gw=$(echo $GwListSorted | wc -w)
246
		if [ $nb_gw -eq 0 ]; then
2669 tom.houday 247
			if [ "$Lang" == 'fr' ]
2771 rexy 248
				then echo "Aucune passerelle par défaut configurée"
249
				else echo "No default gateway configured"
2669 tom.houday 250
			fi
251
			exit 1
3112 rexy 252
		elif [ $nb_gw -eq 1 ]; then
253
			EXTIF="$GwListSorted"
254
		else
255
			if [ "$Lang" == 'fr' ]
256
				then echo -n "Erreur : Plusieurs interfaces ont une passerelle par défaut ( "
257
				else echo -n "Error : Several interfaces have a default gateway ( "
258
			fi
259
				echo "$GwListSorted" | tr "\n" " "
260
				echo ")"
261
			exit 1
2669 tom.houday 262
		fi
263
	fi
264
	if [ "$Lang" == 'fr' ]
265
		then echo "Interface externe (Internet) utilisée : $EXTIF"
266
		else echo "External interface (Internet) used: $EXTIF"
267
	fi
268
 
269
	if [ -z "$INTIF" ]; then
3112 rexy 270
		IntifListSorted=$(/usr/sbin/ip -br link show | cut -d' ' -f1 | grep -v "^\(lo\|tun0\|$EXTIF\)\$" | uniq | sort)
271
		IntifCount=$(echo "$IntifListSorted" | wc -w)
272
		if [ $IntifCount -eq 0 ]; then
2669 tom.houday 273
			if [ "$Lang" == 'fr' ]
274
				then echo "Aucune interface de disponible pour le réseau interne"
275
				else echo "No interface available for the internal network"
276
			fi
277
			exit 1
3112 rexy 278
		elif [ $IntifCount -eq 1 ]; then
279
			INTIF="$IntifListSorted"
2669 tom.houday 280
		else
3112 rexy 281
			IntifPreferred=$(echo "$IntifListSorted" | head -1 | cut -d' ' -f1)
2669 tom.houday 282
			if [ "$Lang" == 'fr' ]
3112 rexy 283
				then echo 'Liste des interfaces disponibles pour le réseau interne :'
284
				else echo 'List of available interfaces for internal network:'
2669 tom.houday 285
			fi
3112 rexy 286
			echo "$IntifListSorted"
2669 tom.houday 287
			response=''
288
			while true; do
289
				if [ "$Lang" == 'fr' ]
3112 rexy 290
					then echo -n "Choix de l'interface interne ? [$IntifPreferred] "
291
					else echo -n "Choice of internal interface ? [$IntifPreferred] "
2669 tom.houday 292
				fi
293
				read response
3112 rexy 294
				[ -z "$response" ] && response="$IntifPreferred"
2669 tom.houday 295
 
296
				# Check if interface exist
3112 rexy 297
				if [ "$(echo "$IntifListSorted" | grep -c "^$response\$")" -eq 1 ]; then
2669 tom.houday 298
					INTIF="$response"
299
					break
300
				else
301
					if [ "$Lang" == 'fr' ]
302
						then echo "Interface \"$response\" introuvable"
303
						else echo "Interface \"$response\" not found"
304
					fi
305
				fi
306
			done
307
		fi
308
	fi
309
	if [ "$Lang" == 'fr' ]
310
		then echo "Interface interne utilisée : $INTIF"
311
		else echo "Internal interface used: $INTIF"
312
	fi
313
 
2290 richard 314
	if [ $Lang == "fr" ]
315
		then echo -n "Tests des paramètres réseau : "
2549 tom.houday 316
		else echo -n "Network parameters tests: "
2290 richard 317
	fi
318
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
2688 lucas.echa 319
	cd /etc/sysconfig/network-scripts/ || { echo "Unable to find /etc/sysconfig/network-scripts directory"; exit 1; }
2290 richard 320
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
2282 richard 321
	for i in $IF_INTERFACES
322
	do
2688 lucas.echa 323
		if [ "$(/usr/sbin/ip link | grep -c " $i:")" -eq 0 ]; then
2282 richard 324
			rm -f ifcfg-$i
2454 tom.houday 325
 
2282 richard 326
			if [ $Lang == "fr" ]
327
				then echo "Suppression : ifcfg-$i"
2549 tom.houday 328
				else echo "Deleting: ifcfg-$i"
2282 richard 329
			fi
330
		fi
331
	done
2688 lucas.echa 332
	cd $DIR_INSTALL || { echo "Unable to find $DIR_INSTALL directory"; exit 1; }
2290 richard 333
	echo -n "."
2454 tom.houday 334
# Test Ethernet NIC links state
2669 tom.houday 335
	interfacesDown=$(/usr/sbin/ip -br link | grep "^\($EXTIF\|$INTIF\) " | grep 'NO-CARRIER' | cut -d' ' -f1)
336
	if [ ! -z "$interfacesDown" ]; then
337
		for i in $interfacesDown; do
338
			if [ $Lang == "fr" ]
339
			then
340
				echo -e "\nÉchec"
341
				echo "Le lien réseau de la carte $i n'est pas actif."
342
				echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
343
			else
344
				echo -e "\nFailed"
345
				echo "The link state of $i interface is down."
346
				echo "Make sure that this network card is connected to a switch or an A.P."
347
			fi
348
		done
349
		exit 1
350
	fi
1471 richard 351
	echo -n "."
352
# Test EXTIF config files
2681 tom.houday 353
	PUBLIC_IP_MASK=`/usr/sbin/ip addr show $EXTIF | grep '^\s*inet\s' | awk '{ print $2 }'`
354
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d'/' -f1`
2981 rexy 355
	PUBLIC_GATEWAY=`/usr/sbin/ip route list | awk -v EXTIF="$EXTIF" '(/ via / && $5 == EXTIF) {print $3}' | head -n 1`
2688 lucas.echa 356
	if [ "$(echo $PUBLIC_IP|wc -c)" -lt 7 ] || [ "$(echo $PUBLIC_GATEWAY|wc -c)" -lt 7 ]
1471 richard 357
	then
784 richard 358
		if [ $Lang == "fr" ]
2454 tom.houday 359
		then
2669 tom.houday 360
			echo -e "\nÉchec"
784 richard 361
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
362
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
1362 richard 363
			echo "Appliquez les changements : 'systemctl restart network'"
784 richard 364
		else
2669 tom.houday 365
			echo -e "\nFailed"
784 richard 366
			echo "The Internet connected network card ($EXTIF) isn't well configured."
367
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
2669 tom.houday 368
			echo "Apply the new configuration: 'systemctl restart network'"
784 richard 369
		fi
830 richard 370
		echo "DEVICE=$EXTIF"
784 richard 371
		echo "IPADDR="
372
		echo "NETMASK="
373
		echo "GATEWAY="
374
		echo "DNS1="
375
		echo "DNS2="
830 richard 376
		echo "ONBOOT=yes"
2669 tom.houday 377
		exit 1
784 richard 378
	fi
379
	echo -n "."
2290 richard 380
# Test if default GW is alive
3214 rexy 381
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
2688 lucas.echa 382
	if [ "$(expr $arp_reply)" -eq 0 ]
2454 tom.houday 383
		then
595 richard 384
		if [ $Lang == "fr" ]
2454 tom.houday 385
		then
2669 tom.houday 386
			echo -e "\nÉchec"
2290 richard 387
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
595 richard 388
			echo "Réglez ce problème puis relancez ce script."
389
		else
2669 tom.houday 390
			echo -e "\nFailed"
2290 richard 391
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
595 richard 392
			echo "Resolv this problem, then restart this script."
393
		fi
2669 tom.houday 394
		exit 1
308 richard 395
	fi
396
	echo -n "."
2290 richard 397
# Test Internet connectivity
2669 tom.houday 398
	domainTested='www.google.com'
399
	/usr/bin/curl -s --head "$domainTested" &>/dev/null
400
	if [ $? -ne 0 ]; then
595 richard 401
		if [ $Lang == "fr" ]
2454 tom.houday 402
		then
2669 tom.houday 403
			echo -e "\nLa tentative de connexion vers Internet a échoué ($domainTested)."
595 richard 404
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
405
			echo "Vérifiez la validité des adresses IP des DNS."
406
		else
2669 tom.houday 407
			echo -e "\nThe Internet connection try failed ($domainTested)."
595 richard 408
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
409
			echo "Verify the DNS IP addresses"
410
		fi
2669 tom.houday 411
		exit 1
29 richard 412
	fi
308 richard 413
	echo ". : ok"
2990 rexy 414
} # End of network_testing()
302 richard 415
 
2552 rexy 416
#######################################################################
2990 rexy 417
##                             "init"                                ##
2552 rexy 418
## - Creation of ALCASAR conf file "/usr/local/etc/alcasar.conf      ##
419
## - Creation of random password for GRUB, mariadb (admin and user)  ##
420
#######################################################################
2724 rexy 421
init()
302 richard 422
{
527 richard 423
	if [ "$mode" != "update" ]
302 richard 424
	then
425
# On affecte le nom d'organisme
597 richard 426
		header_install
302 richard 427
		ORGANISME=!
428
		PTN='^[a-zA-Z0-9-]*$'
2760 lucas.echa 429
		until [[ "$ORGANISME" =~ $PTN ]]
2454 tom.houday 430
		do
595 richard 431
			if [ $Lang == "fr" ]
2454 tom.houday 432
				then echo -n "Entrez le nom de votre organisme : "
597 richard 433
				else echo -n "Enter the name of your organism : "
595 richard 434
			fi
330 franck 435
			read ORGANISME
613 richard 436
			if [ "$ORGANISME" == "" ]
2688 lucas.echa 437
			then
330 franck 438
				ORGANISME=!
439
			fi
440
		done
302 richard 441
	fi
1 root 442
# On crée aléatoirement les mots de passe et les secrets partagés
2419 richard 443
# We create random passwords and shared secrets
628 richard 444
	rm -f $PASSWD_FILE
2419 richard 445
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
2688 lucas.echa 446
	grub2pwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c8`
2454 tom.houday 447
	pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
448
		LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
449
		grep -v '[eE]nter password:' | \
450
		sed -e "s/PBKDF2 hash of your password is //"`
3222 rexy 451
	[ -e /etc/grub.d/default-40_custom ]  || cp /etc/grub.d/40_custom /etc/grub.d/default-40_custom
452
	echo "set superusers=\"root\"" >> /etc/grub.d/40_custom
453
	echo "password_pbkdf2 root $pbkdf2" >> /etc/grub.d/40_custom
2419 richard 454
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
2454 tom.houday 455
	echo "GRUB2_user=root" >> $PASSWD_FILE
456
	echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
3269 rexy 457
	dbpwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2419 richard 458
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
3269 rexy 459
	echo "db_root=$dbpwd" >> $PASSWD_FILE
2688 lucas.echa 460
	radiuspwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2419 richard 461
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
2421 richard 462
	echo "db_user=$DB_USER" >> $PASSWD_FILE
463
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
2688 lucas.echa 464
	secretuam=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2412 tom.houday 465
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
466
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
2688 lucas.echa 467
	secretradius=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2412 tom.houday 468
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
469
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
3135 rexy 470
	csrfkey=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
471
	echo "# Key used to create CSRF-tokens in several ACC forms" >> $PASSWD_FILE
472
	echo "csrf_key=$csrfkey" >> $PASSWD_FILE
628 richard 473
	chmod 640 $PASSWD_FILE
1828 richard 474
#  copy scripts in in /usr/local/bin
2664 tom.houday 475
	cp -fr $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown -R root:root $DIR_DEST_BIN/alcasar* ; chmod -R 740 $DIR_DEST_BIN/alcasar*
1828 richard 476
#  copy conf files in /usr/local/etc
1954 richard 477
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
3269 rexy 478
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mariadb.sh
3222 rexy 479
# generate main conf file
628 richard 480
	cat <<EOF > $CONF_FILE
612 richard 481
##########################################
482
##                                      ##
483
##          ALCASAR Parameters          ##
484
##                                      ##
485
##########################################
1 root 486
 
612 richard 487
INSTALL_DATE=$DATE
488
VERSION=$VERSION
489
ORGANISM=$ORGANISME
490
EOF
628 richard 491
	chmod o-rwx $CONF_FILE
2724 rexy 492
} # End of init()
1 root 493
 
2552 rexy 494
#########################################################
2990 rexy 495
##                     "network"                       ##
2552 rexy 496
## - Define the several network address                ##
497
## - Define the DNS naming                             ##
498
## - INTIF parameters (consultation network)           ##
499
## - Write "/etc/hosts" file                           ##
500
## - write "hosts.allow" & "hosts.deny" files          ##
501
#########################################################
2724 rexy 502
network()
1 root 503
{
504
	header_install
636 richard 505
	if [ "$mode" != "update" ]
506
		then
507
		if [ $Lang == "fr" ]
508
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
509
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
510
		fi
511
		response=0
2760 lucas.echa 512
		PTN='^[oOyYnN]?$'
513
		until [[ "$response" =~ $PTN ]]
1 root 514
		do
595 richard 515
			if [ $Lang == "fr" ]
659 richard 516
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
618 richard 517
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
595 richard 518
			fi
1 root 519
			read response
520
		done
636 richard 521
		if [ "$response" = "n" ] || [ "$response" = "N" ]
522
		then
523
			PRIVATE_IP_MASK="0"
524
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
2760 lucas.echa 525
			until [[ $(expr "$PRIVATE_IP_MASK" : $PTN) -gt 0 ]]
1 root 526
			do
595 richard 527
				if [ $Lang == "fr" ]
597 richard 528
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
529
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
595 richard 530
				fi
597 richard 531
				read PRIVATE_IP_MASK
1 root 532
			done
636 richard 533
		else
2688 lucas.echa 534
			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
636 richard 535
		fi
595 richard 536
	else
2834 rexy 537
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= /var/tmp/conf/etc/alcasar.conf|cut -d"=" -f2`
538
		rm -rf /var/tmp/conf
1 root 539
	fi
861 richard 540
# Define LAN side global parameters
1740 richard 541
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
977 richard 542
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
1499 richard 543
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
977 richard 544
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
1499 richard 545
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
3247 rexy 546
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`								# ALCASAR private ip address (consultation LAN side)
547
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]											# when entering network address instead of ip address
2688 lucas.echa 548
	then
2454 tom.houday 549
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`
1499 richard 550
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
2454 tom.houday 551
	fi
3247 rexy 552
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
553
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`	# private network broadcast (ie.: 192.168.182.255)
554
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`;				# ie.: 2=classe B, 3=classe C
1499 richard 555
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
3247 rexy 556
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`				# last octet of LAN broadcast
1499 richard 557
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
3244 rexy 558
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
3247 rexy 559
	classe=$((PRIVATE_PREFIX/8))												# ie.: 2=classe B, 3=classe C
560
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.		# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
1828 richard 561
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
841 richard 562
# Define Internet parameters
2809 rexy 563
	DNS1=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS1='| cut -d"=" -f2`	# 1st DNS server
564
	DNS2=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS2=' | cut -d"=" -f2`	# 2nd DNS server
2870 rexy 565
	DNS1=${DNS1:=208.67.220.220}
70 franck 566
	DNS2=${DNS2:=208.67.222.222}
1499 richard 567
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
1052 richard 568
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
1069 richard 569
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
2552 rexy 570
# Write network parameters in the conf file
2737 rexy 571
	echo "HOSTNAME=$HOSTNAME" >> $CONF_FILE
572
	echo "DOMAIN=$DOMAIN" >> $CONF_FILE
1469 richard 573
	echo "EXTIF=$EXTIF" >> $CONF_FILE
574
	echo "INTIF=$INTIF" >> $CONF_FILE
2770 rexy 575
# Retrieve NIC name of other consultation LAN
2282 richard 576
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
577
	for i in $INTERFACES
578
	do
579
		SUB=`echo ${i:0:2}`
580
		if [ $SUB = "wl" ]
581
			then WIFIF=$i
2454 tom.houday 582
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ]
2282 richard 583
			then LANIF=$i
584
		fi
585
	done
586
	if [ -n "$WIFIF" ]
587
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
588
	elif [ -n "$LANIF" ]
589
		then echo "LANIF=$LANIF" >> $CONF_FILE
590
	fi
2552 rexy 591
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2` # test static or dynamic
1499 richard 592
	if [ $IP_SETTING == "dhcp" ]
2688 lucas.echa 593
	then
2947 rexy 594
		DHCP_DNS_servers=`cat /var/lib/dhclient/dhclient--$EXTIF.lease |grep domain-name-servers|sed -n "1 p"| rev|cut -d" " -f1|rev|tr -d ';'`
595
		DNS1=`echo $DHCP_DNS_servers | cut -d"," -f1`
596
		DNS2=`echo $DHCP_DNS_servers | cut -d"," -f2`
1499 richard 597
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
1585 richard 598
		echo "GW=dhcp" >> $CONF_FILE
1499 richard 599
	else
600
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
1585 richard 601
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
1499 richard 602
	fi
1587 richard 603
	echo "DNS1=$DNS1" >> $CONF_FILE
604
	echo "DNS2=$DNS2" >> $CONF_FILE
2956 rexy 605
	echo "PROXY=off" >> $CONF_FILE
606
	echo "PROXY_IP=\"192.168.0.100:80\"" >> $CONF_FILE
607
	echo "PUBLIC_WEIGHT=1" >> $CONF_FILE
994 franck 608
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
628 richard 609
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
1484 richard 610
	echo "DHCP=on" >> $CONF_FILE
2708 tom.houday 611
	echo "EXT_DHCP_IP=" >> $CONF_FILE
612
	echo "RELAY_DHCP_IP=" >> $CONF_FILE
613
	echo "RELAY_DHCP_PORT=" >> $CONF_FILE
2709 tom.houday 614
	echo "INT_DNS_DOMAIN=" >> $CONF_FILE
615
	echo "INT_DNS_IP=" >> $CONF_FILE
1610 franck 616
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
1499 richard 617
# network default
597 richard 618
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
1 root 619
	cat <<EOF > /etc/sysconfig/network
620
NETWORKING=yes
621
FORWARD_IPV4=true
622
EOF
2552 rexy 623
# write "/etc/hosts"
1 root 624
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
625
	cat <<EOF > /etc/hosts
503 richard 626
127.0.0.1	localhost
2558 rexy 627
$PRIVATE_IP	$HOSTNAME
1 root 628
EOF
2552 rexy 629
# write EXTIF (Internet) config
1499 richard 630
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
631
	if [ $IP_SETTING == "dhcp" ]
2688 lucas.echa 632
	then
1499 richard 633
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
14 richard 634
DEVICE=$EXTIF
1585 richard 635
BOOTPROTO=dhcp
636
DNS1=127.0.0.1
637
PEERDNS=no
638
RESOLV_MODS=yes
639
ONBOOT=yes
1613 franck 640
NOZEROCONF=yes
1585 richard 641
METRIC=10
642
MII_NOT_SUPPORTED=yes
643
IPV6INIT=no
644
IPV6TO4INIT=no
645
ACCOUNTING=no
646
USERCTL=no
647
MTU=$MTU
648
EOF
2688 lucas.echa 649
	else
1585 richard 650
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
651
DEVICE=$EXTIF
14 richard 652
BOOTPROTO=static
597 richard 653
IPADDR=$PUBLIC_IP
654
NETMASK=$PUBLIC_NETMASK
655
GATEWAY=$PUBLIC_GATEWAY
2870 rexy 656
DNS1=$DNS1
657
DNS2=$DNS2
1499 richard 658
RESOLV_MODS=yes
14 richard 659
ONBOOT=yes
660
METRIC=10
1610 franck 661
NOZEROCONF=yes
14 richard 662
MII_NOT_SUPPORTED=yes
663
IPV6INIT=no
664
IPV6TO4INIT=no
665
ACCOUNTING=no
666
USERCTL=no
994 franck 667
MTU=$MTU
14 richard 668
EOF
1499 richard 669
	fi
2552 rexy 670
# write INTIF (consultation LAN) in normal mode
2868 rexy 671
cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
841 richard 672
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
673
DEVICE=$INTIF
674
BOOTPROTO=static
675
ONBOOT=yes
676
NOZEROCONF=yes
677
MII_NOT_SUPPORTED=yes
678
IPV6INIT=no
679
IPV6TO4INIT=no
680
ACCOUNTING=no
681
USERCTL=no
682
EOF
2552 rexy 683
# write INTIF in bypass mode (see "alcasar-bypass.sh")
1554 richard 684
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
1 root 685
DEVICE=$INTIF
686
BOOTPROTO=static
687
IPADDR=$PRIVATE_IP
604 richard 688
NETMASK=$PRIVATE_NETMASK
1 root 689
ONBOOT=yes
690
METRIC=10
691
NOZEROCONF=yes
692
MII_NOT_SUPPORTED=yes
14 richard 693
IPV6INIT=no
694
IPV6TO4INIT=no
695
ACCOUNTING=no
696
USERCTL=no
1 root 697
EOF
2282 richard 698
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
699
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
700
	then
701
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
702
DEVICE=$WIFIF
703
BOOTPROTO=static
704
ONBOOT=yes
705
NOZEROCONF=yes
706
MII_NOT_SUPPORTED=yes
707
IPV6INIT=no
708
IPV6TO4INIT=no
709
ACCOUNTING=no
710
USERCTL=no
711
EOF
712
	elif [ -n "$LANIF" ]
713
	then
714
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
715
DEVICE=$LANIF
716
BOOTPROTO=static
717
ONBOOT=yes
718
NOZEROCONF=yes
719
MII_NOT_SUPPORTED=yes
720
IPV6INIT=no
721
IPV6TO4INIT=no
722
ACCOUNTING=no
723
USERCTL=no
724
EOF
725
	fi
2552 rexy 726
# write hosts.allow & hosts.deny
1 root 727
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
728
	cat <<EOF > /etc/hosts.allow
729
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
604 richard 730
sshd: ALL
1 root 731
ntpd: $PRIVATE_NETWORK_SHORT
732
EOF
733
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
734
	cat <<EOF > /etc/hosts.deny
735
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
736
EOF
790 richard 737
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
860 richard 738
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
1069 richard 739
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
790 richard 740
# load conntrack ftp module
741
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
1705 richard 742
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
1159 crox53 743
# load ipt_NETFLOW module
744
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
1513 richard 745
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
2937 rexy 746
	cp /lib/systemd/system/iptables.service /etc/systemd/system/iptables.service
747
	$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /etc/systemd/system/iptables.service
2688 lucas.echa 748
	[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
749
	$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
2956 rexy 750
# create the alcasar-network unit
751
	cat << EOF > /etc/systemd/system/alcasar-network.service
752
#  This file is part of systemd.
2454 tom.houday 753
#
2956 rexy 754
#  systemd is free software; you can redistribute it and/or modify it
755
#  under the terms of the GNU General Public License as published by
756
#  the Free Software Foundation; either version 2 of the License, or
757
#  (at your option) any later version.
758
 
759
# This unit starts alcasar-network.sh script.
760
[Unit]
761
Description=alcasar-network.sh execution
762
After=network.target iptables.service
763
 
764
[Service]
765
Type=oneshot
766
RemainAfterExit=yes
767
ExecStart=$DIR_DEST_BIN/alcasar-network.sh
768
ExecStop=$DIR_DEST_BIN/alcasar-network.sh
769
TimeoutSec=0
770
 
771
[Install]
772
WantedBy=multi-user.target
773
EOF
774
	/usr/bin/systemctl daemon-reload
775
 
776
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is started at the end of this script in order not to cut network flow in case of using ssh
2724 rexy 777
} # End of network()
1 root 778
 
2763 rexy 779
##################################################################
2990 rexy 780
##                           "CA"                               ##
3230 rexy 781
## - Creating the CA and the server certificate (httpd)         ##
2763 rexy 782
##################################################################
783
CA()
784
{
785
	$DIR_DEST_BIN/alcasar-CA.sh
2814 rexy 786
	chmod 755 /etc/pki/
2801 rexy 787
	chown root:apache /etc/pki/CA; chmod 750 /etc/pki/CA
2821 rexy 788
	chown root:apache /etc/pki/CA/alcasar-ca.crt; chmod 640 /etc/pki/CA/alcasar-ca.crt
2811 rexy 789
	chown root:root /etc/pki/CA/private; chmod 700 /etc/pki/CA/private
790
	chmod 600 /etc/pki/CA/private/*
791
	chown -R root:apache /etc/pki/tls/private; chmod 750 /etc/pki/tls/private
792
	chmod 640 /etc/pki/tls/private/*
3170 rexy 793
	chmod 644 /etc/pki/tls/certs/*
2763 rexy 794
} # End of CA()
795
 
2990 rexy 796
######################################################
797
##                       "ACC"                      ##
798
## - copy ALCASAR Control Center (ACC) files        ##
3230 rexy 799
## - configuration of the web server (Apache)       ##
2990 rexy 800
## - creation of the first ACC admin account        ##
801
## - secure the ACC access                          ##
802
######################################################
2724 rexy 803
ACC()
1 root 804
{
805
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
806
	mkdir $DIR_WEB
1833 richard 807
# Copy & adapt ACC files
316 richard 808
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
3240 rexy 809
	ln $DIR_WEB/images/favicon-48.ico $DIR_WEB/favicon.ico
316 richard 810
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
2815 rexy 811
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/welcome.php
812
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/welcome.php
813
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/welcome.php
3135 rexy 814
	$SED "s?^\$csrf_key = .*?\$csrf_key = \"$csrfkey\"\;?g" $DIR_ACC/manager/htdocs/activity.php
5 franck 815
	chown -R apache:apache $DIR_WEB/*
1833 richard 816
# copy & adapt "freeradius-web" files
817
	cp -rf $DIR_CONF/freeradius-web/ /etc/
818
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
819
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
820
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
821
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
822
	cat <<EOF > /etc/freeradius-web/naslist.conf
823
nas1_name: alcasar-$ORGANISME
824
nas1_model: Network Access Controler
825
nas1_ip: $PRIVATE_IP
826
nas1_port_num: 0
827
nas1_community: public
828
EOF
829
	chown -R apache:apache /etc/freeradius-web/
830
# create the log & backup structure :
1489 richard 831
# - base = users database
832
# - archive = tarball of "base + http firewall + netflow"
1833 richard 833
# - security = watchdog log
2829 rexy 834
# - conf_file = archive conf file (usefull in updating process)
2887 rexy 835
	for i in base archive security activity_report iot_captures;
1 root 836
	do
837
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
838
	done
5 franck 839
	chown -R root:apache $DIR_SAVE
1833 richard 840
# Configuring & securing php
2937 rexy 841
	[ -e /etc/php.d/05_date.ini.default ] || cp /etc/php.d/05_date.ini /etc/php.d/05_date.ini.default
2887 rexy 842
	timezone=`timedatectl show --property=Timezone|cut -d"=" -f2`
843
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.d/05_date.ini
71 richard 844
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
411 richard 845
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
846
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
2397 tom.houday 847
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
848
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
71 richard 849
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
850
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
2397 tom.houday 851
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
3230 rexy 852
# Configuring & securing Apache
790 richard 853
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
3230 rexy 854
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
855
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
856
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
857
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
858
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
859
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
860
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
861
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
862
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
863
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
864
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
3240 rexy 865
	$SED "s?^#LoadModule rewrite_module.*?LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
3230 rexy 866
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
867
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
868
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
869
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
870
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
871
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
872
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
873
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
874
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
3252 rexy 875
	[ -e /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf.default ] || cp /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf.default
876
	$SED "s?^    SSLCertificateFile.*?    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt?g" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
877
	$SED "s?^    SSLCertificateKeyFile.*?    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key?g" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
3271 rexy 878
	$SED "/^    SSLCertificateKeyFile/a\    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.pem" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
3230 rexy 879
# Error page management
880
	[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
881
	cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
882
Alias /error/ "/var/www/html/"
883
<Directory "/usr/share/httpd/error">
884
    AllowOverride None
885
    Options IncludesNoExec
886
    AddOutputFilter Includes html
887
    AddHandler type-map var
888
    Require all granted
889
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
890
    ForceLanguagePriority Prefer Fallback
891
</Directory>
892
ErrorDocument 400 /error/error.php?error=400
893
ErrorDocument 401 /error/error.php?error=401
894
ErrorDocument 403 /error/error.php?error=403
895
ErrorDocument 404 /error/index.php
896
ErrorDocument 405 /error/error.php?error=405
897
ErrorDocument 408 /error/error.php?error=408
898
ErrorDocument 410 /error/error.php?error=410
899
ErrorDocument 411 /error/error.php?error=411
900
ErrorDocument 412 /error/error.php?error=412
901
ErrorDocument 413 /error/error.php?error=413
902
ErrorDocument 414 /error/error.php?error=414
903
ErrorDocument 415 /error/error.php?error=415
904
ErrorDocument 500 /error/error.php?error=500
905
ErrorDocument 501 /error/error.php?error=501
906
ErrorDocument 502 /error/error.php?error=502
907
ErrorDocument 503 /error/error.php?error=503
908
ErrorDocument 506 /error/error.php?error=506
909
EOF
910
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
911
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
912
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
913
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
914
</body>
915
</html>
916
EOF
917
# ACC partitioning
918
	rm -f /etc/httpd/conf/vhosts.d/alcasar*
919
	cat <<EOF > /etc/httpd/conf/vhosts.d/alcasar.conf
920
<Directory $DIR_WEB>
921
        AllowOverride None
922
        Order deny,allow
923
        Deny from all
924
        Allow from 127.0.0.1
925
        Allow from $PRIVATE_NETWORK_MASK
926
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
927
</Directory>
928
<Directory $DIR_WEB/certs>
929
        AddType application/x-x509-ca-cert crt
930
</Directory>
931
<Directory $DIR_ACC>
932
        SSLRequireSSL
933
        AllowOverride None
934
        Order deny,allow
935
        Deny from all
936
        Allow from 127.0.0.1
937
        Allow from $PRIVATE_NETWORK_MASK
938
        require valid-user
939
        AuthType digest
940
        AuthName "ALCASAR Control Center (ACC)"
941
        AuthDigestDomain $HOSTNAME.$DOMAIN
942
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
943
        AuthUserFile $DIR_DEST_ETC/digest/key_all
944
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
945
</Directory>
946
<Directory $DIR_ACC/admin>
947
        SSLRequireSSL
948
        AllowOverride None
949
        Order deny,allow
950
        Deny from all
951
        Allow from 127.0.0.1
952
        Allow from $PRIVATE_NETWORK_MASK
953
        require valid-user
954
        AuthType digest
955
        AuthName "ALCASAR Control Center (ACC)"
956
        AuthDigestDomain $HOSTNAME.$DOMAIN
957
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
958
        AuthUserFile $DIR_DEST_ETC/digest/key_admin
959
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
960
</Directory>
961
<Directory $DIR_ACC/manager>
962
        SSLRequireSSL
963
        AllowOverride None
964
        Order deny,allow
965
        Deny from all
966
        Allow from 127.0.0.1
967
        Allow from $PRIVATE_NETWORK_MASK
968
        require valid-user
969
        AuthType digest
970
        AuthName "ALCASAR Control Center (ACC)"
971
        AuthDigestDomain $HOSTNAME.$DOMAIN
972
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
973
        AuthUserFile $DIR_DEST_ETC/digest/key_manager
974
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
975
</Directory>
3240 rexy 976
<Directory $DIR_ACC/manager/nfsen>
977
        AllowOverride None
978
        <IfModule mod_rewrite.c>
979
                RewriteEngine On
980
                RewriteCond %{REQUEST_FILENAME} !-f
981
                RewriteCond %{REQUEST_FILENAME} !-d
3247 rexy 982
                RewriteRule ^api/(.*)$ backend/index.php?request=\$1 [QSA,NC,L]
3240 rexy 983
                RewriteRule ^$ frontend [L]
984
        </IfModule>
985
</Directory>
3230 rexy 986
<Directory $DIR_ACC/backup>
987
        SSLRequireSSL
988
        AllowOverride None
989
        Order deny,allow
990
        Deny from all
991
        Allow from 127.0.0.1
992
        Allow from $PRIVATE_NETWORK_MASK
993
        require valid-user
994
        AuthType digest
995
        AuthName "ALCASAR Control Center (ACC)"
996
        AuthDigestDomain $HOSTNAME.$DOMAIN
997
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
998
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
999
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1000
</Directory>
1001
Alias /save/ "$DIR_SAVE/"
1002
<Directory $DIR_SAVE>
1003
        SSLRequireSSL
1004
        Options Indexes
1005
        Order deny,allow
1006
        Deny from all
1007
        Allow from 127.0.0.1
1008
        Allow from $PRIVATE_NETWORK_MASK
1009
        require valid-user
1010
        AuthType digest
1011
        AuthName "ALCASAR Control Center (ACC)"
1012
        AuthDigestDomain $HOSTNAME.$DOMAIN
1013
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
1014
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1015
</Directory>
1016
EOF
2552 rexy 1017
# Creation of the first account (in 'admin' profile)
2293 tom.houday 1018
	if [ "$mode" = "install" ]
2688 lucas.echa 1019
	then
1020
		header_install
1268 richard 1021
# Creation of keys file for the admin account ("admin")
2688 lucas.echa 1022
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1023
		mkdir -p $DIR_DEST_ETC/digest
1024
		chmod 755 $DIR_DEST_ETC/digest
2737 rexy 1025
		if [ $Lang == "fr" ]
2760 lucas.echa 1026
			then echo "Création du premier compte administrateur : "
1027
			else echo "Creation of the first admin account : "
2737 rexy 1028
		fi
2688 lucas.echa 1029
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
1030
		do
1031
			$DIR_DEST_BIN/alcasar-profil.sh --add admin
1032
		done
2293 tom.houday 1033
	fi
3252 rexy 1034
# Link CAcerts in ACC
2818 rexy 1035
	[ -d /var/www/html/certs ] || mkdir /var/www/html/certs
1036
	ln -s /etc/pki/CA/alcasar-ca.crt /var/www/html/certs/certificat_alcasar_ca.crt
3230 rexy 1037
# Run Apache after coova (in order waiting tun0 to be up)
1038
	cp /lib/systemd/system/httpd.service /etc/systemd/system/httpd.service
1039
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /etc/systemd/system/httpd.service
2293 tom.houday 1040
	# Log file for ACC access imputability
2887 rexy 1041
	[ -e $DIR_SAVE/security/acc_access.log ] || touch $DIR_SAVE/security/acc_access.log
1042
	chown root:apache $DIR_SAVE/security/acc_access.log
1043
	chmod 664 $DIR_SAVE/security/acc_access.log
2724 rexy 1044
} # End of ACC()
1 root 1045
 
2552 rexy 1046
#############################################################
2990 rexy 1047
##                     "time_server"                       ##
2552 rexy 1048
## - Configuring NTP server                                ##
1049
#############################################################
2724 rexy 1050
time_server()
1837 richard 1051
{
3192 rexy 1052
[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
1053
$SED "s?^pool.*?pool fr.pool.ntp.org iburst?g" /etc/ntp.conf
3193 rexy 1054
echo "interface ignore wildcard" >> /etc/ntp.conf
1055
echo "interface listen lo" >> /etc/ntp.conf
3197 rexy 1056
echo "interface listen tun0" >> /etc/ntp.conf
1837 richard 1057
# Synchronize now
3192 rexy 1058
	ntpdate fr.pool.ntp.org &
3193 rexy 1059
sleep 2 # wait for time server responce
2724 rexy 1060
} # End of time_server()
1837 richard 1061
 
2541 rexy 1062
#####################################################################
2990 rexy 1063
##                           "init_db"                             ##
3273 rexy 1064
## - MariaDb initialization                                        ##
2541 rexy 1065
## - Set admin (root) password                                     ##
1066
## - Remove unused users & databases                               ##
1067
## - Radius database creation                                      ##
1068
## - Copy of accounting tables (mtotacct, totacct) & userinfo      ##
1069
#####################################################################
2724 rexy 1070
init_db()
1 root 1071
{
3269 rexy 1072
	if [ "`systemctl is-active mariadb`" == "active" ]
1990 richard 1073
	then
3269 rexy 1074
		systemctl stop mariadb
1990 richard 1075
	fi
3272 rexy 1076
	if [ "`systemctl is-active mysqld`" == "active" ]
1077
	then
1078
		systemctl stop mysqld
1079
	fi
1355 richard 1080
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1 root 1081
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1979 richard 1082
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
3269 rexy 1083
	[ -e /etc/my.cnf.d/server.cnf.default ] || cp /etc/my.cnf.d/server.cnf /etc/my.cnf.d/server.cnf.default
1084
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf.d/server.cnf
1085
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf.d/server.cnf
1086
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf.d/server.cnf  # accentuated user names are allowed
3272 rexy 1087
	# Create our own systemd unit
1088
	cp /lib/systemd/system/mysqld.service /etc/systemd/system/mariadb.service
1089
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/mariadbd?g" /etc/systemd/system/mariadb.service
2416 richard 1090
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
3272 rexy 1091
	[ ! -e /usr/bin/mariadb_install_db ] && ln -s /usr/bin/mariadb-install-db /usr/bin/mariadb_install_db # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
3273 rexy 1092
	[ ! -e /usr/sbin/mysqld-prepare-db-dir ] && ln -s /usr/sbin/mariadb-prepare-db-dir /usr/sbin/mysqld-prepare-db-dir # avoid Mageia bug (https://bugs.mageia.org/show_bug.cgi?id=34200)
3272 rexy 1093
	/usr/bin/systemctl start mariadb
1963 richard 1094
	nb_round=1
1981 richard 1095
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1963 richard 1096
	do
1097
		nb_round=`expr $nb_round + 1`
1098
		sleep 2
1099
	done
1981 richard 1100
	if [ ! -S /var/lib/mysql/mysql.sock ]
1963 richard 1101
	then
3272 rexy 1102
		if [ $Lang == "fr" ]
1103
			then echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1104
			else echo "Problem: the 'MariaDB' database didn't start!"
1105
		fi
1963 richard 1106
		exit
1955 richard 1107
	fi
1355 richard 1108
# Secure the server
3269 rexy 1109
	/usr/bin/mariadb --execute "GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$dbpwd';"
1110
	SQL="/usr/bin/mariadb -uroot -p$dbpwd --execute"
1111
	$SQL "DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1112
	$SQL "CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;"
615 richard 1113
# Create 'radius' database
3269 rexy 1114
	$SQL "CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
615 richard 1115
# Add an empty radius database structure
3269 rexy 1116
	/usr/bin/mariadb -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
3272 rexy 1117
	# modify the start script in order to close accounting connexion when the system is comming down or up
3269 rexy 1118
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mariadb.sh -acct_stop" /etc/systemd/system/mariadb.service
1119
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mariadb.sh -acct_stop" /etc/systemd/system/mariadb.service
2416 richard 1120
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
3272 rexy 1121
	/usr/bin/systemctl daemon-reload
1122
	/usr/bin/systemctl restart mariadb
2724 rexy 1123
} # End of init_db()
1 root 1124
 
2423 richard 1125
###################################################################
2990 rexy 1126
##                           "freeradius"                        ##
2423 richard 1127
## - Set the configuration files                                 ##
1128
## - Set the shared secret between coova-chilli and freeradius   ##
3269 rexy 1129
## - Adapt the MariaDB conf file and counters                      ##
2423 richard 1130
###################################################################
2724 rexy 1131
freeradius()
1 root 1132
{
1800 richard 1133
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1 root 1134
	chown -R radius:radius /etc/raddb
1135
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
2420 richard 1136
# Set radius global parameters (radius.conf)
1 root 1137
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1138
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1139
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
2420 richard 1140
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1141
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
2728 rexy 1142
# Add ALCASAR & Coovachilli dictionaries
1143
	[ -e /etc/raddb/dictionary.default ] || cp /etc/raddb/dictionary /etc/raddb/dictionary.default
2730 rexy 1144
	cp $DIR_CONF/radius/dictionary.alcasar /etc/raddb/
1145
	echo '$INCLUDE dictionary.alcasar' > /etc/raddb/dictionary
1146
	cp /usr/share/doc/coova-chilli/dictionary.coovachilli /etc/raddb/
1147
	echo '$INCLUDE dictionary.coovachilli' >> /etc/raddb/dictionary
2420 richard 1148
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1 root 1149
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1150
	cat << EOF > /etc/raddb/clients.conf
2438 richard 1151
client localhost {
1152
	ipaddr = 127.0.0.1
1 root 1153
	secret = $secretradius
2438 richard 1154
	shortname = chilli
2454 tom.houday 1155
	nas_type = other
1 root 1156
}
1157
EOF
2758 rexy 1158
# Set Virtual server
1159
    # Remvoveing all except "alcasar virtual site")
1160
	# INFO : To enable 802.1X, add the "innser-tunnel" virtual server (link in sites-enabled)  Change the firewall rules to allow "radius" extern connections.
2467 richard 1161
	cp $DIR_CONF/radius/alcasar /etc/raddb/sites-available/alcasar
1162
	cp $DIR_CONF/radius/alcasar-with-ldap /etc/raddb/sites-available/alcasar-with-ldap
1163
	chown radius:apache /etc/raddb/sites-available/alcasar*
1164
	chmod 660 /etc/raddb/sites-available/alcasar*
2758 rexy 1165
	rm -f /etc/raddb/sites-enabled/*
2420 richard 1166
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
2454 tom.houday 1167
# Set modules
2728 rexy 1168
	# Add custom LDAP "available module"
2758 rexy 1169
	# INFO : To enable 802.1X, add the "eap" module and verify access to the keys (/etc/pki/tls/private/radius.pem). Change the firewall rules to allow "radius" extern connections.
2465 richard 1170
	cp -f $DIR_CONF/radius/ldap-alcasar /etc/raddb/mods-available/
1171
	chown -R radius:radius /etc/raddb/mods-available/ldap-alcasar
2728 rexy 1172
	# Set only usefull modules for ALCASAR (! the module 'ldap-alcasar' is enabled only via ACC)
2454 tom.houday 1173
	rm -rf  /etc/raddb/mods-enabled/*
2615 tom.houday 1174
	for mods in sql sqlcounter attr_filter expiration logintime pap expr always
2454 tom.houday 1175
	do
1176
		ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1177
	done
2758 rexy 1178
# Configure SQL module
2420 richard 1179
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
2423 richard 1180
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1181
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
2420 richard 1182
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
2423 richard 1183
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1184
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1185
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1186
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
2758 rexy 1187
	# no TLS encryption on 127.0.0.1
2763 rexy 1188
	$SED "s?^[\t ]*ca_file =.*?#&?g" /etc/raddb/mods-available/sql
1189
	$SED "s?^[\t ]*ca_path =.*?#&?g" /etc/raddb/mods-available/sql
1190
	$SED "s?^[\t ]*certificate_file =.*?#&?g" /etc/raddb/mods-available/sql
1191
	$SED "s?^[\t ]*private_key_file =.*?#&?g" /etc/raddb/mods-available/sql
1192
	$SED "s?^[\t ]*cipher =.*?#&?g" /etc/raddb/mods-available/sql
1193
	$SED "s?^[\t ]*tls_required =.*?tls_required = no?g" /etc/raddb/mods-available/sql
2454 tom.houday 1194
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.
2420 richard 1195
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1196
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1197
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
2421 richard 1198
# sqlcounter modifications
2470 richard 1199
	[ -e /etc/raddb/mods-available/sqlcounter.default ] || cp /etc/raddb/mods-available/sqlcounter /etc/raddb/mods-available/sqlcounter.default
1200
	cp -f $DIR_CONF/radius/sqlcounter /etc/raddb/mods-available/sqlcounter
1201
	chown -R radius:radius /etc/raddb/mods-available/sqlcounter
3269 rexy 1202
# make certain that mariaDB is up before freeradius start
2937 rexy 1203
	cp /lib/systemd/system/radiusd.service /etc/systemd/system/radiusd.service
3269 rexy 1204
	$SED "s?^After=.*?After=syslog.target network.target mariadb.service?g" /etc/systemd/system/radiusd.service
1574 richard 1205
	/usr/bin/systemctl daemon-reload
2597 tom.houday 1206
# Allow apache to change some conf files (ie : ldap on/off)
1207
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2770 rexy 1208
	chmod 750 /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2724 rexy 1209
} # End of freeradius()
1 root 1210
 
2423 richard 1211
#############################################################################
2990 rexy 1212
##                                "chilli"                                 ##
2423 richard 1213
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1214
## - Adapt the authentication web page (intercept.php)                     ##
1215
#############################################################################
2724 rexy 1216
chilli()
1 root 1217
{
1370 richard 1218
# chilli unit for systemd
2937 rexy 1219
	cat << EOF > /etc/systemd/system/chilli.service
1372 richard 1220
#  This file is part of systemd.
1221
#
1222
#  systemd is free software; you can redistribute it and/or modify it
1223
#  under the terms of the GNU General Public License as published by
1224
#  the Free Software Foundation; either version 2 of the License, or
1225
#  (at your option) any later version.
2771 rexy 1226
 
1227
# This unit launches coova-chilli a captive portal
1370 richard 1228
[Unit]
1229
Description=chilli is a captive portal daemon
1230
After=network.target
1231
 
1232
[Service]
1379 richard 1233
Type=forking
1370 richard 1234
ExecStart=/usr/libexec/chilli start
1235
ExecStop=/usr/libexec/chilli stop
1236
ExecReload=/usr/libexec/chilli reload
2775 rexy 1237
PIDFile=/run/chilli.pid
1370 richard 1238
 
1239
[Install]
1240
WantedBy=multi-user.target
1241
EOF
799 richard 1242
# init file creation
1370 richard 1243
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1801 richard 1244
	cat <<EOF > /etc/init.d/chilli
799 richard 1245
#!/bin/sh
1246
#
1247
# chilli CoovaChilli init
1248
#
1249
# chkconfig: 2345 65 35
1250
# description: CoovaChilli
1251
### BEGIN INIT INFO
1252
# Provides:       chilli
2454 tom.houday 1253
# Required-Start: network
1254
# Should-Start:
799 richard 1255
# Required-Stop:  network
2454 tom.houday 1256
# Should-Stop:
799 richard 1257
# Default-Start:  2 3 5
1258
# Default-Stop:
1259
# Description:    CoovaChilli access controller
1260
### END INIT INFO
1261
 
1262
[ -f /usr/sbin/chilli ] || exit 0
1263
. /etc/init.d/functions
1264
CONFIG=/etc/chilli.conf
2775 rexy 1265
pidfile=/run/chilli.pid
799 richard 1266
[ -f \$CONFIG ] || {
2394 tom.houday 1267
	echo "\$CONFIG Not found"
1268
	exit 0
799 richard 1269
}
2882 rexy 1270
current_users_file="/tmp/current_users.txt"	# file containing active users
799 richard 1271
RETVAL=0
1272
prog="chilli"
1273
case \$1 in
2394 tom.houday 1274
	start)
2454 tom.houday 1275
		if [ -f \$pidfile ] ; then
2394 tom.houday 1276
			gprintf "chilli is already running"
1277
		else
1278
			gprintf "Starting \$prog: "
2884 rexy 1279
			echo '' > \$current_users_file && chown root:apache \$current_users_file && chmod 660 \$current_users_file
2775 rexy 1280
			rm -f /run/chilli* # cleaning
2394 tom.houday 1281
			/usr/sbin/modprobe tun >/dev/null 2>&1
1282
			echo 1 > /proc/sys/net/ipv4/ip_forward
1283
			[ -e /dev/net/tun ] || {
2454 tom.houday 1284
				(cd /dev;
1285
				mkdir net;
1286
				cd net;
2394 tom.houday 1287
				mknod tun c 10 200)
1288
			}
1289
			ifconfig $INTIF 0.0.0.0
1290
			/usr/sbin/ethtool -K $INTIF gro off
1291
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1292
			RETVAL=\$?
1293
		fi
1294
		;;
799 richard 1295
 
2394 tom.houday 1296
	reload)
1297
		killall -HUP chilli
1298
		;;
799 richard 1299
 
2394 tom.houday 1300
	restart)
1301
		\$0 stop
1302
		sleep 2
1303
		\$0 start
1304
		;;
799 richard 1305
 
2394 tom.houday 1306
	status)
1307
		status chilli
1308
		RETVAL=0
1309
		;;
1310
 
1311
	stop)
2454 tom.houday 1312
		if [ -f \$pidfile ] ; then
2394 tom.houday 1313
			gprintf "Shutting down \$prog: "
1314
			killproc /usr/sbin/chilli
1315
			RETVAL=\$?
1316
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1317
			[ -e \$current_users_file ] && rm -f \$current_users_file
2454 tom.houday 1318
		else
2394 tom.houday 1319
			gprintf "chilli is not running"
1320
		fi
1321
		;;
1322
 
1323
	*)
1324
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1325
		exit 1
799 richard 1326
esac
1327
echo
1328
EOF
2324 tom.houday 1329
	chmod a+x /etc/init.d/chilli
1330
	ln -s /etc/init.d/chilli /usr/libexec/chilli
799 richard 1331
# conf file creation
346 richard 1332
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
2016 raphael.pi 1333
	#NTP Option configuration for DHCP
2032 richard 1334
	#DHCP Options : rfc2132
1335
		#dhcp option value will be convert in hexa.
1336
		#NTP option (or 'option 42') is like :
2454 tom.houday 1337
		#
2032 richard 1338
		#    Code   Len         Address 1               Address 2
1339
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1340
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1341
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1342
		#
1343
		#Code : 42 => 2a
1344
		#Len : 4 => 04
2688 lucas.echa 1345
	PRIVATE_IP_HEXA=$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f1)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f2)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f3)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f4)")
346 richard 1346
	cat <<EOF > /etc/chilli.conf
1347
# coova config for ALCASAR
2775 rexy 1348
cmdsocket	/run/chilli.sock
1336 richard 1349
unixipc		chilli.$INTIF.ipc
2775 rexy 1350
pidfile		/run/chilli.pid
346 richard 1351
net		$PRIVATE_NETWORK_MASK
595 richard 1352
dhcpif		$INTIF
841 richard 1353
ethers		$DIR_DEST_ETC/alcasar-ethers
861 richard 1354
#nodynip
865 richard 1355
#statip
1356
dynip		$PRIVATE_NETWORK_MASK
1249 richard 1357
domain		$DOMAIN
355 richard 1358
dns1		$PRIVATE_IP
1359
dns2		$PRIVATE_IP
346 richard 1360
uamlisten	$PRIVATE_IP
503 richard 1361
uamport		3990
2370 tom.houday 1362
uamuiport	3991
837 richard 1363
macauth
1364
macpasswd	password
1697 richard 1365
strictmacauth
1243 richard 1366
locationname	$HOSTNAME.$DOMAIN
346 richard 1367
radiusserver1	127.0.0.1
1368
radiusserver2	127.0.0.1
1369
radiussecret	$secretradius
1370
radiusauthport	1812
1371
radiusacctport	1813
2818 rexy 1372
uamserver	http://$HOSTNAME.$DOMAIN/intercept.php
2374 tom.houday 1373
redirurl
1243 richard 1374
radiusnasid	$HOSTNAME.$DOMAIN
346 richard 1375
uamsecret	$secretuam
1249 richard 1376
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
346 richard 1377
coaport		3799
1379 richard 1378
conup		$DIR_DEST_BIN/alcasar-conup.sh
1379
condown		$DIR_DEST_BIN/alcasar-condown.sh
2594 tom.houday 1380
macup		$DIR_DEST_BIN/alcasar-macup.sh
503 richard 1381
include		$DIR_DEST_ETC/alcasar-uamallowed
1382
include		$DIR_DEST_ETC/alcasar-uamdomain
2016 raphael.pi 1383
dhcpopt		2a04$PRIVATE_IP_HEXA
1613 franck 1384
#dhcpgateway		none
1385
#dhcprelayagent		none
1610 franck 1386
#dhcpgatewayport	none
2234 richard 1387
sslkeyfile	/etc/pki/tls/private/alcasar.key
1388
sslcertfile	/etc/pki/tls/certs/alcasar.crt
2922 rexy 1389
sslcafile	/etc/pki/tls/certs/server-chain.pem
2818 rexy 1390
#redirssl
1391
#uamuissl
346 richard 1392
EOF
2274 richard 1393
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
977 richard 1394
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
2274 richard 1395
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
840 richard 1396
# create files for trusted domains and urls
1148 crox53 1397
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
503 richard 1398
	chown root:apache $DIR_DEST_ETC/alcasar-*
1399
	chmod 660 $DIR_DEST_ETC/alcasar-*
847 richard 1400
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
526 stephane 1401
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
796 richard 1402
# user 'chilli' creation (in order to run conup/off and up/down scripts
2396 tom.houday 1403
	chilli_exist=`grep -c ^chilli: /etc/passwd`
796 richard 1404
	if [ "$chilli_exist" == "1" ]
1405
	then
2454 tom.houday 1406
		userdel -r chilli 2>/dev/null
796 richard 1407
	fi
1408
	groupadd -f chilli
1409
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
2724 rexy 1410
}  # End of chilli()
1349 richard 1411
 
2541 rexy 1412
################################################################
2990 rexy 1413
##                        "e2guardian"                        ##
3193 rexy 1414
## - Set the parameters of this HTTP proxy (as controler)     ##
2541 rexy 1415
################################################################
2724 rexy 1416
e2guardian()
1 root 1417
{
2758 rexy 1418
# Adapt systemd unit
2937 rexy 1419
	cp /lib/systemd/system/e2guardian.service /etc/systemd/system/e2guardian.service
1420
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/e2guardian -c /etc/e2guardian/e2guardian.conf?g" /etc/systemd/system/e2guardian.service
3177 rexy 1421
	$SED "s?^After=.*?After=network-online.target chilli.service?g" /etc/systemd/system/e2guardian.service
1422
	$SED "/^PIDFile=/d" /etc/systemd/system/e2guardian.service
1423
 
2937 rexy 1424
# Adapt the main conf file
3197 rexy 1425
	[ -e $DIR_E2G/e2guardian.conf.default ] || cp $DIR_E2G/e2guardian.conf $DIR_E2G/e2guardian.conf.default
1293 richard 1426
# French deny HTML page
3197 rexy 1427
	$SED "s?^language =.*?language = 'french'?g" $DIR_E2G/e2guardian.conf
3200 rexy 1428
# Listen & loop prevention on loopback
3197 rexy 1429
	$SED "s?^#checkip = 127.0.0.1.*?checkip = 127.0.0.1?g" $DIR_E2G/e2guardian.conf
3238 rexy 1430
# 2 filtergroups (8080 & 8081)
3197 rexy 1431
	$SED "s?^#filtergroups =.*?filtergroups = 2?g" $DIR_E2G/e2guardian.conf
3193 rexy 1432
# Listen on LAN only
3197 rexy 1433
	$SED "s?^#filterip =.*?filterip = $PRIVATE_IP?g" $DIR_E2G/e2guardian.conf
3193 rexy 1434
# Listen on 8080 (group1 : BL users on HTTP)
3238 rexy 1435
	$SED "s?^#filterports = 8080:8081.*?filterports = 8080:8081?g" $DIR_E2G/e2guardian.conf
3193 rexy 1436
# Listen on 8081 (group2 : previously AV users --> to be redefine)
3197 rexy 1437
#	$SED "/^filterip = $PRIVATE_IP/a filterip = $PRIVATE_IP" $DIR_E2G/e2guardian.conf
1438
	$SED "s?^#filterports = 8081.*?filterports = 8081?g" $DIR_E2G/e2guardian.conf
3193 rexy 1439
# for now we don't listen transparently on 8443 (HTTPS) (only in future version)
3197 rexy 1440
	$SED "s?^transparenthttpsport =.*?#transparenthttpsport = 8443?g" $DIR_E2G/e2guardian.conf
1293 richard 1441
# Don't log
3197 rexy 1442
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_E2G/e2guardian.conf
2775 rexy 1443
# Disable HTML content control (weighted & banned)
3197 rexy 1444
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_E2G/e2guardian.conf
2840 rexy 1445
# Enable authport plugin
3197 rexy 1446
	$SED "s?^#authplugin = '/etc/e2guardian/authplugins/port.conf'?authplugin = '/etc/e2guardian/authplugins/port.conf'?g" $DIR_E2G/e2guardian.conf
1447
	$SED "s?^#mapauthtoports =.*?mapauthtoports = off?g" $DIR_E2G/e2guardian.conf
3193 rexy 1448
	# !!! Set Max RAM cache to 10Mb (for antimalware/EDR)
3197 rexy 1449
	#$SED "s?^maxcontentramcachescansize =.*?maxcontentramcachescansize = 10240?g" $DIR_E2G/e2guardian.conf
3193 rexy 1450
	# !!! Set Max file size cache to 20Mb (for antimalware/EDR)
3197 rexy 1451
	#$SED "s?^maxcontentfilecachescansize =.*?maxcontentfilecachescansize = 20480?g" $DIR_E2G/e2guardian.conf
2841 rexy 1452
 
2867 rexy 1453
# copy & adapt HTML templates
2866 rexy 1454
	cp $DIR_CONF/alcasar-e2g-fr.html /usr/share/e2guardian/languages/french/alcasar-e2g.html
1455
	cp $DIR_CONF/alcasar-e2g-en.html /usr/share/e2guardian/languages/ukenglish/alcasar-e2g.html
2867 rexy 1456
	$SED "s?\/\/[a-z.]*\/?\/\/$HOSTNAME.$DOMAIN\/?g" /usr/share/e2guardian/languages/french/alcasar-e2g.html
1457
	$SED "s?\/\/[a-z.]*\/?\/\/$HOSTNAME.$DOMAIN\/?g" /usr/share/e2guardian/languages/ukenglish/alcasar-e2g.html
2866 rexy 1458
 
3193 rexy 1459
###### ALCASAR filtering for group1 (blacklisted_users) ####
1460
# Adapt group1 conf file
3197 rexy 1461
	[ -e $DIR_E2G/e2guardianf1.conf.default ] || cp $DIR_E2G/e2guardianf1.conf $DIR_E2G/e2guardianf1.conf.default
3200 rexy 1462
	$SED "s?^#reportinglevel =.*?reportinglevel = 3?g" $DIR_E2G/e2guardianf1.conf
1463
	$SED "s?^#groupname =.*?groupname = 'blacklisted_users'?g" $DIR_E2G/e2guardianf1.conf
1464
	$SED "s?^#htmltemplate =.*?htmltemplate = 'alcasar-e2g.html'?g" $DIR_E2G/e2guardianf1.conf
1465
	$SED "s?^\.Define LISTDIR.*?\.Define LISTDIR <$DIR_E2G/lists/group1>?g" $DIR_E2G/e2guardianf1.conf
3197 rexy 1466
	DIR_E2G_GROUP1="$DIR_E2G/lists/group1"
1467
	cp -r $DIR_E2G/lists/example.group $DIR_E2G_GROUP1
3243 rexy 1468
 
2840 rexy 1469
# RAZ bannedphraselist
3197 rexy 1470
	$SED "s?^[^#]?#&?g" $DIR_E2G_GROUP1/bannedphraselist # (comment what is not)
2519 rexy 1471
# Disable URL control with regex
3197 rexy 1472
	$SED "s?^[^#]?#&?g" $DIR_E2G_GROUP1/bannedregexpurllist # (comment what is not)
2758 rexy 1473
# Dont filtering files by extension or mime-type (empty list)
3197 rexy 1474
	> $DIR_E2G_GROUP1/bannedextensionlist
1475
	> $DIR_E2G_GROUP1/bannedmimetypelist
2758 rexy 1476
# Creation of ALCASAR banned site list
3197 rexy 1477
	cat <<EOF > $DIR_E2G_GROUP1/greysitelist
2775 rexy 1478
# E2guardian filter config for ALCASAR
1479
# In ALCASAR E2guardian filters only URLs (domains are filtered with unbound)
2758 rexy 1480
# block all SSL and CONNECT tunnels
1481
**s
1482
# block all SSL and CONNECT tunnels specified only as an IP
1483
*ips
1484
# block all sites specified only by an IP
1485
*ip
1486
EOF
3195 rexy 1487
# Creation of file for banned URLs (filled later with Toulouse BL --> see BL function)
3197 rexy 1488
	cat <<EOF > $DIR_E2G_GROUP1/bannedurllist
3193 rexy 1489
# E2guardian URL filter config for ALCASAR
2758 rexy 1490
EOF
3195 rexy 1491
# Creation of files for rehabilited domains
3197 rexy 1492
	> $DIR_E2G_GROUP1/exceptionsitelist
3195 rexy 1493
# Creation of files for rehabilited IP
3243 rexy 1494
	[ -e $DIR_E2G_GROUP1/exceptionsiteiplist.default ] || mv $DIR_E2G_GROUP1/exceptionsiteiplist $DIR_E2G_GROUP1/exceptionsiteiplist.default
1495
	> $DIR_E2G_GROUP1/exceptionsiteiplist
3193 rexy 1496
# Create & adapt group2 conf file (av + av_wl)
3197 rexy 1497
	cp $DIR_E2G/e2guardianf1.conf.default $DIR_E2G/e2guardianf2.conf
1498
	$SED "s?^#reportinglevel =.*?reportinglevel = 3?g" $DIR_E2G/e2guardianf2.conf
1499
	$SED "s?^#groupname =.*?groupname = 'antimalware + whitelested users'?g" $DIR_E2G/e2guardianf2.conf
2775 rexy 1500
# create log folder
3193 rexy 1501
	mkdir -p /var/log/e2guardian
2775 rexy 1502
	chown -R e2guardian /etc/e2guardian /var/log/e2guardian
2724 rexy 1503
} # End of e2guardian()
1 root 1504
 
2724 rexy 1505
##############################################################
2990 rexy 1506
##                        "ulogd"                           ##
2724 rexy 1507
## - Ulog config for multi-log files                        ##
1508
##############################################################
1509
ulogd()
476 richard 1510
{
1511
# Three instances of ulogd (three different logfiles)
1512
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
478 richard 1513
	nl=1
1358 richard 1514
	for log_type in traceability ssh ext-access
478 richard 1515
	do
2937 rexy 1516
		cp -f /lib/systemd/system/ulogd.service /etc/systemd/system/ulogd-$log_type.service
1369 richard 1517
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1375 richard 1518
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1704 richard 1519
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
478 richard 1520
		cat << EOF >> /etc/ulogd-$log_type.conf
1452 richard 1521
[emu1]
478 richard 1522
file="/var/log/firewall/$log_type.log"
1523
sync=1
1524
EOF
2938 rexy 1525
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /etc/systemd/system/ulogd-$log_type.service
478 richard 1526
		nl=`expr $nl + 1`
1527
	done
476 richard 1528
	chown -R root:apache /var/log/firewall
1529
	chmod 750 /var/log/firewall
1530
	chmod 640 /var/log/firewall/*
2724 rexy 1531
}  # End of ulogd()
476 richard 1532
 
1159 crox53 1533
##########################################################
2990 rexy 1534
##                     "nfsen"                          ##
2771 rexy 1535
## - configure NetFlow collector (nfcapd)               ##
1536
## - configure NetFlow grapher (nfsen-ng)               ##
1159 crox53 1537
##########################################################
1389 richard 1538
nfsen()
1 root 1539
{
2772 rexy 1540
	groupadd -f nfcapd
2868 rexy 1541
	id -u nfcapd >/dev/null 2>&1 || useradd -r -g nfcapd -s /bin/false -c "system user for nfcapd" nfcapd
2771 rexy 1542
# nfcapd unit for systemd
2937 rexy 1543
	cat << EOF > /etc/systemd/system/nfcapd.service
1372 richard 1544
#  This file is part of systemd.
1545
#
1546
#  systemd is free software; you can redistribute it and/or modify it
1547
#  under the terms of the GNU General Public License as published by
1548
#  the Free Software Foundation; either version 2 of the License, or
1549
#  (at your option) any later version.
1550
 
2771 rexy 1551
# This unit launches nfcapd (a Netflow collector).
1372 richard 1552
[Unit]
2771 rexy 1553
Description=Netflow Capture Daemon
1554
After=network-online.target iptables.service
1372 richard 1555
 
1556
[Service]
3079 rexy 1557
Type=simple
3242 rexy 1558
ExecStartPre=/bin/mkdir -p /run/nfcapd
1559
ExecStartPre=/bin/chown nfcapd:nfcapd /run/nfcapd
2771 rexy 1560
PIDFile=/run/nfcapd/nfcapd.pid
3240 rexy 1561
ExecStart=/usr/bin/nfcapd -D -b 127.0.0.1 -p 2055 -u nfcapd -g nfcapd -B 200000 -t 300 -S 1 -z -P /run/nfcapd/nfcapd.pid -I alcasar_netflow -w /var/log/nfsen/profiles-data/live/alcasar_netflow
2771 rexy 1562
ExecReload=/bin/kill -HUP $MAINPID
1372 richard 1563
 
1564
[Install]
1565
WantedBy=multi-user.target
1566
EOF
2825 rexy 1567
    [ -d /var/log/nfsen/profiles-data/live/alcasar_netflow ] || mkdir -p /var/log/nfsen/profiles-data/live/alcasar_netflow
3240 rexy 1568
    touch /var/log/nfsen/profiles-data/live/alcasar_netflow/.nfstat
3242 rexy 1569
    chown -R nfcapd:nfcapd /var/log/nfsen
3240 rexy 1570
# nfsen-ng
3248 rexy 1571
# initializing and populating the RRD database (see if it should be usefull)
1572
#su - apache --shell=/bin/bash -c '/var/www/html/acc/manager/nfsen/backend/cli.php -f -p -ps import'
1573
# nfsen-ng unit for systemd
1574
	cat << EOF > /etc/systemd/system/nfsen-ng.service
1575
#  This file is part of systemd.
1576
#
1577
#  systemd is free software; you can redistribute it and/or modify it
1578
#  under the terms of the GNU General Public License as published by
1579
#  the Free Software Foundation; either version 2 of the License, or
1580
#  (at your option) any later version.
3240 rexy 1581
 
3248 rexy 1582
# This unit launches nfsen-ng (a Netflow grapher).
1583
[Unit]
1584
Description=nfsen-ng daemon (netflow grapher)
1585
After=network-online.target
1586
 
1587
[Service]
1588
Type=simple
1589
User=apache
1590
Group=apache
1591
PIDFile=/var/www/html/acc/manager/nfsen/backend/nfsen-ng.pid
1592
WorkingDirectory=/var/www/html/acc/manager/nfsen/backend/
1593
ExecStart=/usr/bin/php /var/www/html/acc/manager/nfsen/backend/listen.php
1594
 
1595
[Install]
1596
WantedBy=multi-user.target
1597
EOF
1598
 
2724 rexy 1599
} # End of nfsen()
1 root 1600
 
2552 rexy 1601
###########################################################
2990 rexy 1602
##                       "vnstat"                        ##
2809 rexy 1603
## - Initialization of vnstat and vnstat-dashboard       ##
2552 rexy 1604
###########################################################
2724 rexy 1605
vnstat()
1541 richard 1606
{
2990 rexy 1607
# vnstat
2933 rexy 1608
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
2589 rexy 1609
	$SED "s?^Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
2688 lucas.echa 1610
	$SED "s?^DatabaseDir.*?DatabaseDir /var/log/vnstat?g" /etc/vnstat.conf
2933 rexy 1611
	$SED "s?^MaxBandwidth.*?MaxBandwidth 10000?g" /etc/vnstat.conf
2990 rexy 1612
# vnstat-dashboard
2933 rexy 1613
	$SED "s?^\$thisInterface.*?\$thisInterface = \"$EXTIF\";?" $DIR_ACC/manager/vnstat/index.php
2937 rexy 1614
	cp /lib/systemd/system/vnstat.service /etc/systemd/system/vnstat.service
3077 rexy 1615
	$SED "s?^ReadWritePaths=.*?ReadWritePaths=/var/log?g" /etc/systemd/system/vnstat.service
2724 rexy 1616
} # End of vnstat()
2281 tom.houday 1617
 
2724 rexy 1618
#########################################################
2990 rexy 1619
##                     "unbound"                       ##
2724 rexy 1620
## - create the conf files for 4 unbound services      ##
1621
## - create the systemd files for 4 unbound services   ##
1622
#########################################################
2688 lucas.echa 1623
unbound ()
1624
{
1625
	[ -d /etc/unbound/conf.d ] || mkdir -p /etc/unbound/conf.d
1626
	[ -d /etc/unbound/conf.d/common ] || mkdir /etc/unbound/conf.d/common
1627
	[ -d /etc/unbound/conf.d/common/local-forward ] || mkdir /etc/unbound/conf.d/common/local-forward
1628
	[ -d /etc/unbound/conf.d/common/local-dns ] || mkdir /etc/unbound/conf.d/common/local-dns
1629
	[ -d /etc/unbound/conf.d/forward ] || mkdir /etc/unbound/conf.d/forward
1630
	[ -d /etc/unbound/conf.d/blacklist ] || mkdir /etc/unbound/conf.d/blacklist
1631
	[ -d /etc/unbound/conf.d/whitelist ] || mkdir /etc/unbound/conf.d/whitelist
1632
	[ -d /etc/unbound/conf.d/blackhole ] || mkdir /etc/unbound/conf.d/blackhole
2833 rexy 1633
	[ -d /var/log/unbound ] || mkdir /var/log/unbound
1634
	chown unbound:unbound /var/log/unbound
2688 lucas.echa 1635
	[ -e /etc/unbound/unbound.conf.default ] || cp /etc/unbound/unbound.conf /etc/unbound/unbound.conf.default
1636
 
2724 rexy 1637
# Forward zone configuration file for all unbound dns servers
2688 lucas.echa 1638
	cat << EOF > /etc/unbound/conf.d/common/forward-zone.conf
1639
forward-zone:
1640
	name: "."
1641
	forward-addr: $DNS1
1642
	forward-addr: $DNS2
1472 richard 1643
EOF
1644
 
2724 rexy 1645
# Custom configuration file for manual DNS configuration
2688 lucas.echa 1646
	cat << EOF > /etc/unbound/conf.d/common/local-forward/custom.conf
1647
## Ajouter un bloc pour chaque nom de domaine géré par un autre seveur DNS
1648
## Add one block for each domain name managed by an other DNS server
1649
##
1650
## Example:
1651
##
1652
## server:
1653
##     local-zone: "<your_domain>." transparent
1654
## forward-zone:
1655
##     name: "<your_domain>."
1656
##     forward-addr: <@IP_domain_server>
1657
##
2558 rexy 1658
EOF
1659
 
2724 rexy 1660
# Configuration file of ALCASAR main domains for $INTIF
2688 lucas.echa 1661
	cat << EOF > /etc/unbound/conf.d/common/local-dns/${INTIF}.conf
1662
server:
1663
	local-data: "$HOSTNAME.$DOMAIN A $PRIVATE_IP"
2831 rexy 1664
	local-data-ptr: "$PRIVATE_IP $HOSTNAME.$DOMAIN"
2688 lucas.echa 1665
EOF
1666
 
2724 rexy 1667
# Configuration file for lo of forward unbound
2688 lucas.echa 1668
	cat << EOF > /etc/unbound/conf.d/forward/iface.lo.conf
1669
server:
1670
	interface: 127.0.0.1@53
1671
	access-control-view: 127.0.0.1/8 lo
1672
view:
1673
	name: "lo"
2864 rexy 1674
	local-data: "$HOSTNAME A 127.0.0.1"
2688 lucas.echa 1675
	local-data: "$HOSTNAME.$DOMAIN A 127.0.0.1"
2864 rexy 1676
	local-data-ptr: "127.0.0.1 $HOSTNAME.$DOMAIN"
2688 lucas.echa 1677
	view-first: yes
1678
EOF
1679
 
2724 rexy 1680
# Configuration file for $INTIF of forward unbound
2688 lucas.echa 1681
	cat << EOF > /etc/unbound/conf.d/forward/iface.${INTIF}.conf
1682
server:
1683
	interface: ${PRIVATE_IP}@53
1684
	access-control-view: $PRIVATE_NETWORK_MASK $INTIF
1685
view:
1686
	name: "$INTIF"
1687
	view-first: yes
1688
EOF
1689
 
2831 rexy 1690
# Configuration file for main unbound
2688 lucas.echa 1691
	cat << EOF > /etc/unbound/unbound.conf
1692
server:
1693
	verbosity: 1
1694
	hide-version: yes
1695
	hide-identity: yes
1696
	do-ip6: no
1697
	include: /etc/unbound/conf.d/common/forward-zone.conf
1698
	include: /etc/unbound/conf.d/common/local-forward/*
1699
	include: /etc/unbound/conf.d/common/local-dns/*
1700
	include: /etc/unbound/conf.d/forward/*
1701
EOF
1702
 
2724 rexy 1703
# Configuration file for $INTIF of blacklist unbound
2688 lucas.echa 1704
	cat << EOF > /etc/unbound/conf.d/blacklist/iface.${INTIF}.conf
1705
server:
1706
	interface: ${PRIVATE_IP}@54
1707
	access-control: $PRIVATE_IP_MASK allow
1708
	access-control-tag: $PRIVATE_IP_MASK "blacklist"
1709
	access-control-tag-action: $PRIVATE_IP_MASK "blacklist" redirect
1710
	access-control-tag-data: $PRIVATE_IP_MASK "blacklist" "A $PRIVATE_IP"
1711
EOF
1712
 
2724 rexy 1713
# Configuration file for blacklist unbound
2688 lucas.echa 1714
	cat << EOF > /etc/unbound/unbound-blacklist.conf
1715
server:
1716
	verbosity: 1
1717
	hide-version: yes
1718
	hide-identity: yes
1719
	do-ip6: no
1720
	logfile: "/var/log/unbound/unbound-blacklist.log"
1721
	chroot: ""
1722
	define-tag: "blacklist"
1723
	log-local-actions: yes
1724
	include: /etc/unbound/conf.d/common/forward-zone.conf
1725
	include: /etc/unbound/conf.d/common/local-forward/*
1726
	include: /etc/unbound/conf.d/common/local-dns/*
1727
	include: /etc/unbound/conf.d/blacklist/*
1728
	include: /usr/local/share/unbound-bl-enabled/*
1729
EOF
1730
 
2724 rexy 1731
# Configuration file for $INTIF of whitelist unbound
2688 lucas.echa 1732
	cat << EOF > /etc/unbound/conf.d/whitelist/iface.${INTIF}.conf
1733
server:
1734
	interface: ${PRIVATE_IP}@55
1735
	access-control: $PRIVATE_IP_MASK allow
1736
	access-control-tag: $PRIVATE_IP_MASK "whitelist"
1737
	access-control-tag-action: $PRIVATE_IP_MASK "whitelist" redirect
1738
	access-control-tag-data: $PRIVATE_IP_MASK "whitelist" "A $PRIVATE_IP"
1739
EOF
1740
 
2724 rexy 1741
# Configuration file for whitelist unbound
2688 lucas.echa 1742
	cat << EOF > /etc/unbound/unbound-whitelist.conf
1743
server:
3099 rexy 1744
	module-config: "ipset validator iterator"
2688 lucas.echa 1745
	verbosity: 1
1746
	hide-version: yes
1747
	hide-identity: yes
1748
	do-ip6: no
1749
	do-not-query-localhost: no
1750
	define-tag: "whitelist"
1751
	local-zone: "." transparent
1752
	local-zone-tag: "." "whitelist"
3099 rexy 1753
	include: /etc/unbound/conf.d/common/forward-zone.conf
2861 rexy 1754
	include: /etc/unbound/conf.d/common/local-forward/*
1755
	include: /etc/unbound/conf.d/common/local-dns/*
1756
	include: /etc/unbound/conf.d/whitelist/*
2688 lucas.echa 1757
	include: /usr/local/share/unbound-wl-enabled/*
3099 rexy 1758
	username: ""
1759
ipset:
1760
	name-v4: "wl_ip_allowed"
2688 lucas.echa 1761
EOF
1762
 
2724 rexy 1763
# Configuration file for $INTIF of blackhole unbound
2688 lucas.echa 1764
	cat << EOF > /etc/unbound/conf.d/blackhole/iface.${INTIF}.conf
1765
server:
1766
	interface: ${PRIVATE_IP}@56
1767
	access-control-view: $PRIVATE_NETWORK_MASK $INTIF
1768
view:
1769
	name: "$INTIF"
1770
	local-zone: "." redirect
1771
	local-data: ". A $PRIVATE_IP"
1772
EOF
1773
 
2724 rexy 1774
# Configuration file for blackhole unbound
2688 lucas.echa 1775
	cat << EOF > /etc/unbound/unbound-blackhole.conf
1776
server:
1777
	verbosity: 1
1778
	hide-version: yes
1779
	hide-identity: yes
1780
	do-ip6: no
2861 rexy 1781
	include: /etc/unbound/conf.d/common/local-forward/*
1782
	include: /etc/unbound/conf.d/common/local-dns/*
2688 lucas.echa 1783
	include: /etc/unbound/conf.d/blackhole/*
1784
EOF
3257 rexy 1785
 
1786
# Add the safesearch conf file to blacklist & whitelist
1787
	cp $DIR_CONF/safe-searching /etc/unbound/conf.d/blacklist/
1788
	cp $DIR_CONF/safe-searching /etc/unbound/conf.d/whitelist/
1789
 
1790
# Adapt systemd unit for the 4 instances of unbound
2937 rexy 1791
	cp /lib/systemd/system/unbound.service /etc/systemd/system/unbound.service
1792
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/unbound -d -c /etc/unbound/unbound.conf?g" /etc/systemd/system/unbound.service
1793
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /etc/systemd/system/unbound.service
3177 rexy 1794
	$SED "/^PIDFile=/d" /etc/systemd/system/unbound.service
2688 lucas.echa 1795
	for list in blacklist blackhole whitelist
1474 richard 1796
	do
3177 rexy 1797
		cp -f /etc/systemd/system/unbound.service /etc/systemd/system/unbound-$list.service
2937 rexy 1798
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/unbound -d -c /etc/unbound/unbound-$list.conf?g" /etc/systemd/system/unbound-$list.service
1474 richard 1799
	done
2724 rexy 1800
} # End of unbound()
2688 lucas.echa 1801
 
2689 lucas.echa 1802
##################################################
2990 rexy 1803
##                   "dhcpd"                    ##
2689 lucas.echa 1804
##################################################
2724 rexy 1805
dhcpd()
2689 lucas.echa 1806
{
1807
	[ -e /etc/dhcpd.conf.default ] || cp /etc/dhcpd.conf /etc/dhcpd.conf.default
1808
	cat <<EOF > /etc/dhcpd.conf
1809
ddns-update-style none;
1810
subnet $PRIVATE_NETWORK netmask $PRIVATE_NETMASK {
1811
	option routers $PRIVATE_IP;
1812
	option subnet-mask $PRIVATE_NETMASK;
1813
	option domain-name-servers $PRIVATE_IP;
1814
	range dynamic-bootp $PRIVATE_SECOND_IP $PRIVATE_LAST_IP;
1815
	default-lease-time 21600;
1816
	max-lease-time 43200;
1817
}
1818
EOF
3238 rexy 1819
chown -R dhcpd:dhcpd /var/lib/dhcpd
2724 rexy 1820
} # End of dhcpd()
2689 lucas.echa 1821
 
2552 rexy 1822
##########################################################
2990 rexy 1823
##                         "BL"                         ##
2769 rexy 1824
## - copy & adapt Toulouse BL to ALCASAR architecture   ##
2688 lucas.echa 1825
##     - domain names for unbound-bl & unbound-wl       ##
2552 rexy 1826
##     - URLs for E²guardian                            ##
1827
##     - IPs for NetFilter                              ##
2769 rexy 1828
## - copy additional BLs (TOR + Ultrasurf + C&C)        ##
2552 rexy 1829
##########################################################
2724 rexy 1830
BL()
308 richard 1831
{
2990 rexy 1832
# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
3197 rexy 1833
	rm -rf $DIR_E2G/lists/blacklists
1930 richard 1834
	mkdir -p /tmp/blacklists
1938 richard 1835
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
2769 rexy 1836
# creation of the additional BL and WL categorie named "ossi" (for domain names & ip only)
3197 rexy 1837
	mkdir -p $DIR_E2G/lists/blacklists/ossi-bl
1838
	touch $DIR_E2G/lists/blacklists/ossi-bl/domains
1957 richard 1839
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
3197 rexy 1840
	mkdir -p $DIR_E2G/lists/blacklists/ossi-wl
1841
	touch $DIR_E2G/lists/blacklists/ossi-wl/domains
1957 richard 1842
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
2769 rexy 1843
# add additional BL files
2770 rexy 1844
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklists")
1957 richard 1845
	do
3197 rexy 1846
		mkdir $DIR_E2G/lists/blacklists/ossi-bl-$x
1847
		cp $DIR_BLACKLIST/$x  $DIR_E2G/lists/blacklists/ossi-bl-$x/domains
1957 richard 1848
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1849
	done
3197 rexy 1850
	chown -R e2guardian:apache $DIR_E2G
1957 richard 1851
	chown -R root:apache $DIR_DEST_SHARE
3197 rexy 1852
	chmod -R g+rw $DIR_E2G $DIR_DEST_SHARE
1927 richard 1853
# adapt the Toulouse BL to ALCASAR architecture
1957 richard 1854
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1925 richard 1855
# enable the default categories
1957 richard 1856
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
2560 rexy 1857
	rm -rf /tmp/blacklists
2724 rexy 1858
} # End of BL()
219 jeremy 1859
 
2552 rexy 1860
#######################################################
2990 rexy 1861
##                    "cron"                         ##
2552 rexy 1862
## - write all cron & anacron files                  ##
1863
#######################################################
2724 rexy 1864
cron()
1 root 1865
{
2640 rexy 1866
# 'crontab' with standard cron at midnight instead of 4:0 am (default)
1 root 1867
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1868
	cat <<EOF > /etc/crontab
1828 richard 1869
SHELL=/usr/bin/bash
2640 rexy 1870
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1 root 1871
MAILTO=root
1872
HOME=/
1873
 
1874
# run-parts
1875
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1876
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1877
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1878
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1879
EOF
1880
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1881
	cat <<EOF >> /etc/anacrontab
3269 rexy 1882
7	8	cron.MariaDBDump	nice /etc/cron.d/alcasar-mariadb
2454 tom.houday 1883
7	10	cron.logExport		nice /etc/cron.d/alcasar-archive
1 root 1884
EOF
3269 rexy 1885
	cat <<EOF > /etc/cron.d/alcasar-mariadb
2640 rexy 1886
# Verify, repair and export users database (every monday at 4:45 am)
3269 rexy 1887
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mariadb.sh --dump
2640 rexy 1888
# Remove users whose expiration date is exceeded for more more than 7 days (every Monday at 4:40 am)
3269 rexy 1889
40 4 * * * root $DIR_DEST_BIN/alcasar-mariadb.sh --expire_user 2>&1 >/dev/null
3274 rexy 1890
# Remove users who haven't logged in for more than a year (every Monday at 4:35 am)
3277 rexy 1891
 
1 root 1892
EOF
952 franck 1893
	cat <<EOF > /etc/cron.d/alcasar-archive
2640 rexy 1894
# Archiving logs (traceability & users database) (every Monday at 5:35 am)
952 franck 1895
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1896
EOF
2454 tom.houday 1897
	cat <<EOF > /etc/cron.d/alcasar-ticket-clean
2640 rexy 1898
# Remove password files (created when importing users by CSV files) and user's PDF voucher (every hours at 30')
1566 richard 1899
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
168 franck 1900
EOF
2454 tom.houday 1901
	cat <<EOF > /etc/cron.d/alcasar-distrib-updates
2967 rexy 1902
# Update the system and reboot if needed (everyday at 3:30 am)
1903
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1 ; /usr/local/bin/alcasar-daemon.sh -after-update
722 franck 1904
EOF
2454 tom.houday 1905
	cat <<EOF > /etc/cron.d/alcasar-connections-stats
1808 richard 1906
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
2640 rexy 1907
# 'alcasar-tot_stats' : aggregate the daily connections of users and write it in the table 'totacct' (everyday at 1:01 pm)
1908
# 'alcasar-monthly_tot_stat' : aggregate the monthly connections of users and write it in table 'mtotacct' (everyday at 1h05 pm)
1909
# 'alcasar-truncate_raddact' : remove the user' session log older than 365 days (applying French law : "LCEN") (every month, the first at 01:10 pm)
1910
# 'alcasar-clean_radacct' : close the sessions openned for more than 30 days (every month, the first at 01:15 pm)
1911
# 'alcasar-activity_report.sh' : generate an activity report in PDF (every sunday at 5:35 pm)
1808 richard 1912
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1913
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1914
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1915
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
2009 raphael.pi 1916
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1 root 1917
EOF
2454 tom.houday 1918
	cat <<EOF > /etc/cron.d/alcasar-watchdog
2640 rexy 1919
# 'alcasar-watchdog.sh' : run the "watchdog" (every 10')
3099 rexy 1920
# 'alcasar-flush_ipset_wl.sh' : empty the IPSET of the whitelisted IP loaded dynamically with unbound-whitelist hook (every sunday at 0:05 am)
2886 rexy 1921
# 'alcasar-watchdog.sh --disconnect-permanent-users' : disconnect users with attribute "Alcasar-Status-Page-Must-Stay-Open" (daily --> see "cron.daily")
2640 rexy 1922
# 'alcasar-watchdog-hl.sh' : (optionnaly) remove the IP 0.0.0.0 from chilli cache memory
2395 tom.houday 1923
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1905 raphael.pi 1924
 
2886 rexy 1925
@daily root $DIR_DEST_BIN/alcasar-watchdog.sh --disconnect-permanent-users > /dev/null 2>&1
2228 franck 1926
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1 root 1927
EOF
2454 tom.houday 1928
	cat <<EOF > /etc/cron.d/alcasar-daemon-watchdog
2886 rexy 1929
# start dead daemons (after boot process and every 20')
1851 franck 1930
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
2886 rexy 1931
*/20 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
808 franck 1932
EOF
2454 tom.houday 1933
	cat <<EOF > /etc/cron.d/alcasar-rsync-bl
2769 rexy 1934
# Automatic update the BL (every 12 hours). The enabled categories are listed in '/usr/local/etc/update_cat.conf' (no sync if empty).
1935
 
1874 raphael.pi 1936
EOF
2769 rexy 1937
	cat <<EOF > /etc/cron.d/alcasar-rsync-ossi_bl
1938
# Automatic update the OSSI BLs (every 12 hours) by running the custom update scripts specified in '/usr/local/etc/update_ossi_cat.conf'.
1939
 
1940
EOF
2304 tom.houday 1941
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
2640 rexy 1942
# Automatic renew the Let's Encrypt certificate (daily --> see "cron.daily")
2304 tom.houday 1943
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1944
EOF
2771 rexy 1945
	cat <<EOF > /etc/cron.d/alcasar-nfcapd-expire
2886 rexy 1946
# Remove netflow files older than one year (daily --> see "cron.daily")
2825 rexy 1947
@daily root /usr/bin/nfexpire -e /var/log/nfsen/profiles-data/live/alcasar_netflow -t 365d
2771 rexy 1948
EOF
1808 richard 1949
# removing the users crons
522 richard 1950
	rm -f /var/spool/cron/*
2724 rexy 1951
} # End of cron()
1 root 1952
 
2867 rexy 1953
########################################################################
2990 rexy 1954
##                              "Fail2Ban"                            ##
2867 rexy 1955
##- Adapt conf file to ALCASAR                                        ##
3231 rexy 1956
##- Secure items : SSH, intercept & ACC brute-Force + evasive + pwd   ##
2867 rexy 1957
########################################################################
1163 crox53 1958
fail2ban()
1959
{
2868 rexy 1960
# adapt fail2ban to Mageia (fedora like) & ALCASAR behaviour
2990 rexy 1961
	[ -e /etc/fail2ban/jail.conf.default ] || cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.conf.default
3191 rexy 1962
	$SED "s?^before =.*?before = paths-mageia.conf?g" /etc/fail2ban/jail.conf
2867 rexy 1963
 
1964
# add 5 jails and their filters
3231 rexy 1965
## sshd : Ban after 5 failed attempts (ie. brute-force). This "jail" uses the default "sshd" f2b filter.
2990 rexy 1966
	cat << EOF > /etc/fail2ban/jail.d/01-alcasar_sshd.conf
2867 rexy 1967
[sshd]
1968
enabled = true
1969
#enabled  = false
3231 rexy 1970
maxretry = 5
2868 rexy 1971
bantime = 3m
3231 rexy 1972
findtime = 3m
2867 rexy 1973
EOF
1974
 
3231 rexy 1975
## alcasar_httpd-auth : Ban after 3 failed attempts on ACC. This "jail" uses the default "apache-auth" f2b filter.
1976
	cat << EOF > /etc/fail2ban/jail.d/02-alcasar_httpd-auth.conf
1977
[apache-auth]
1978
enabled = true
2867 rexy 1979
#enabled  = false
3231 rexy 1980
maxretry = 3
1981
bantime = 3m
1982
findtime = 3m
1983
EOF
2867 rexy 1984
 
1985
## mod-evasive : Ban after 3 failed retrieve page attempts (ie : unknown page)
2990 rexy 1986
	cat << EOF > /etc/fail2ban/jail.d/03-alcasar_mod-evasive.conf
2867 rexy 1987
[alcasar_mod-evasive]
3231 rexy 1988
enabled = true
1989
#enabled = false
2867 rexy 1990
backend = auto
1991
filter = alcasar_mod-evasive
1992
action = iptables-allports[name=alcasar_mod-evasive]
3231 rexy 1993
logpath = /var/log/httpd/access_log
2867 rexy 1994
maxretry = 3
2868 rexy 1995
bantime = 3m
1996
findtime = 3m
2867 rexy 1997
EOF
2990 rexy 1998
	cat << EOF > /etc/fail2ban/filter.d/alcasar_mod-evasive.conf
2867 rexy 1999
[Definition]
2000
failregex =  <HOST> .+\] "[^"]+" 403
2001
ignoreregex =
2002
EOF
2003
 
2004
### alcasar_intercept : ban after 5 failed user login attemps on intercept.php
2990 rexy 2005
	cat << EOF > /etc/fail2ban/jail.d/04-alcasar_intercept.conf
2867 rexy 2006
[alcasar_intercept]
2007
enabled = true
2008
#enabled = false
2009
backend = auto
2010
filter = alcasar_intercept
2011
action = iptables-allports[name=alcasar_intercept]
3231 rexy 2012
logpath = /var/log/httpd/access_log
2867 rexy 2013
maxretry = 5
2868 rexy 2014
bantime = 3m
2015
findtime = 3m
2016
EOF
2990 rexy 2017
	cat << EOF > /etc/fail2ban/filter.d/alcasar_intercept.conf
2867 rexy 2018
[Definition]
2019
failregex = <HOST> .* \"GET \/intercept\.php\?res=failed\&reason=reject
2020
ignoreregex =
2021
EOF
2022
 
2023
## alcasar_change-pwd : ban after 5 failed user change password attempts
2990 rexy 2024
	cat << EOF > /etc/fail2ban/jail.d/05-alcasar_change-pwd.conf
2867 rexy 2025
[alcasar_change-pwd]
2026
enabled = true
2027
#enabled = false
2028
backend = auto
2029
filter = alcasar_change-pwd
2030
action = iptables-allports[name=alcasar_change-pwd]
3231 rexy 2031
logpath = /var/log/httpd/access_log
2867 rexy 2032
maxretry = 5
2868 rexy 2033
bantime = 3m
2034
findtime = 3m
2867 rexy 2035
EOF
2990 rexy 2036
	cat << EOF > /etc/fail2ban/filter.d/alcasar_change-pwd.conf
2867 rexy 2037
[Definition]
2038
failregex = <HOST> .* \"POST \/password\.php
2039
ignoreregex =
2040
EOF
2041
 
2840 rexy 2042
# allow reading of 2 log files (fail2ban & watchdog).
2744 rexy 2043
	[ -e /var/log/fail2ban.log ] || /usr/bin/touch /var/log/fail2ban.log
2887 rexy 2044
	[ -e $DIR_SAVE/security/watchdog.log ] || /usr/bin/touch $DIR_SAVE/security/watchdog.log
1165 crox53 2045
	chmod 644 /var/log/fail2ban.log
2887 rexy 2046
	chmod 644 $DIR_SAVE/security/watchdog.log
1418 richard 2047
	/usr/bin/touch /var/log/auth.log
1515 richard 2048
# fail2ban unit
2990 rexy 2049
	cp /lib/systemd/system/fail2ban.service /etc/systemd/system/fail2ban.service
2050
	$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /etc/systemd/system/fail2ban.service
2051
	$SED '/Type=/a\PIDFile=/run/fail2ban/fail2ban.pid' /etc/systemd/system/fail2ban.service
3230 rexy 2052
	$SED '/After=*/c After=syslog.target network.target httpd.service' /etc/systemd/system/fail2ban.service
2724 rexy 2053
} # End of fail2ban()
1163 crox53 2054
 
2990 rexy 2055
########################################################
2056
##                  "gammu_smsd"                      ##
2057
## - Creating of SMS management database              ##
2058
## - Write the gammu a gammu_smsd conf files          ##
2059
########################################################
1376 richard 2060
gammu_smsd()
2061
{
2601 tom.houday 2062
# Create 'gammu' system user
2063
	groupadd -f gammu_smsd
2868 rexy 2064
	useradd -r -g gammu_smsd -s /bin/false -c "system user for gammu_smsd" gammu_smsd
2601 tom.houday 2065
	usermod -a -G dialout gammu_smsd
2066
 
2067
# Create 'gammu' database
3269 rexy 2068
	SQL="/usr/bin/mariadb -uroot -p$dbpwd --execute"
2069
	$SQL "CREATE DATABASE IF NOT EXISTS $DB_GAMMU; GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd'; FLUSH PRIVILEGES;"
1376 richard 2070
# Add a gammu database structure
3269 rexy 2071
	/usr/bin/mariadb -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1376 richard 2072
 
2552 rexy 2073
# Config file for the gammu_smsd daemon & gammu (ttyUSB0 as default com port)
2601 tom.houday 2074
	cat << EOF > /etc/gammurc
2552 rexy 2075
[gammu]
2076
device = /dev/ttyUSB0
2077
connection = at115200
2078
EOF
2079
 
2601 tom.houday 2080
	cat << EOF > /etc/gammu_smsd_conf
1376 richard 2081
[gammu]
2082
port = /dev/ttyUSB0
2083
connection = at115200
2084
 
2085
[smsd]
2086
PIN = 1234
2087
logfile = /var/log/gammu-smsd/gammu-smsd.log
2088
logformat = textall
2089
debuglevel = 0
2090
 
2091
service = sql
2092
driver = native_mysql
2093
user = $DB_USER
2094
password = $radiuspwd
2095
pc = localhost
2096
database = $DB_GAMMU
2097
 
2631 rexy 2098
RunOnReceive = sudo $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1376 richard 2099
 
2100
StatusFrequency = 30
1380 richard 2101
;LoopSleep = 2
1376 richard 2102
 
2103
;ResetFrequency = 300
2104
;HardResetFrequency = 120
2105
 
2454 tom.houday 2106
CheckSecurity = 1
1376 richard 2107
CheckSignal = 1
2108
CheckBattery = 0
2109
EOF
2601 tom.houday 2110
	chmod 755 /etc/gammu_smsd_conf /etc/gammurc
1376 richard 2111
 
2601 tom.houday 2112
# Create the systemd unit
2937 rexy 2113
	cat << EOF > /etc/systemd/system/gammu-smsd.service
2601 tom.houday 2114
[Unit]
2115
Description=SMS daemon for Gammu
2116
Documentation=man:gammu-smsd(1)
3269 rexy 2117
After=network.target mariadb.service
1376 richard 2118
 
2601 tom.houday 2119
[Service]
2120
Type=forking
2775 rexy 2121
ExecStart=/usr/bin/gammu-smsd --config /etc/gammu_smsd_conf --user=gammu_smsd --group=gammu_smsd --pid=/run/gammu-smsd.pid --daemon
2601 tom.houday 2122
ExecReload=/bin/kill -HUP $MAINPID
2775 rexy 2123
ExecStopPost=/bin/rm -f /run/gammu-smsd.pid
2124
PIDFile=/run/gammu-smsd.pid
2601 tom.houday 2125
 
2126
[Install]
2127
WantedBy=multi-user.target
2128
EOF
2129
 
2314 richard 2130
# Log folder for gammu-smsd
2772 rexy 2131
	[ -d /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
2601 tom.houday 2132
	chmod 755 /var/log/gammu-smsd
1376 richard 2133
 
2552 rexy 2134
# Udev rule for Modeswitch (switch from "mass_storage" mode to "ttyUSB" modem) needed with some Huawei MODEM (idVendor: 12d1)
2135
# normally not needed now since modeswitch is managed by udev (see Mageia RPM)
2542 rexy 2136
#cat << EOF > /lib/udev/rules.d/66-huawei.rules
2137
#KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
2138
#EOF
2552 rexy 2139
# Udev rule for fixing the enumeration of ttyUSB port on some MODEM (when they switch randomly the order of their ports at boot time)
2140
# example : http://hintshop.ludvig.co.nz/show/persistent-names-usb-serial-devices/
2141
 
2724 rexy 2142
} # End of gammu_smsd()
1376 richard 2143
 
2990 rexy 2144
########################################################
2145
##                      "msec"                        ##
2146
## - Apply the "fileserver" security level            ##
2147
## - remove the "system request" for rebooting        ##
2148
## - Fix several file permissions                     ##
2149
########################################################
2202 richard 2150
msec()
2151
{
2152
 
2153
# Apply fileserver security level
2990 rexy 2154
	[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
2155
	echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
2202 richard 2156
 
2203 richard 2157
# Set permissions monitoring and enforcement
2202 richard 2158
cat <<EOF > /etc/security/msec/perm.local
2801 rexy 2159
/var/log/firewall/                      root.apache     750
2202 richard 2160
/var/log/firewall/*                     root.apache     640
2161
/etc/security/msec/perm.local           root.root       640
2162
/etc/security/msec/level.local          root.root       640
2163
/etc/freeradius-web                     root.apache     750
2164
/etc/freeradius-web/admin.conf          root.apache     640
2420 richard 2165
/etc/raddb/client.conf                  radius.radius   640
2166
/etc/raddb/radius.conf                  radius.radius   640
2167
/etc/raddb/mods-available/ldap          radius.apache   660
2202 richard 2168
/etc/raddb/sites-available/alcasar      radius.apache   660
2863 rexy 2169
/etc/pki/CA/                            root.apache     750 force
2170
/etc/pki/CA/*                           root.apache     640 force 
2171
/etc/pki/CA/private/                    root.root       700 force
2172
/etc/pki/CA/private/*                   root.root       600 force
2173
/etc/pki/tls/private/                   root.apache     750 force
2174
/etc/pki/tls/private/*                  root.apache     640 force
2202 richard 2175
EOF
2454 tom.houday 2176
# apply now hourly & daily checks
2990 rexy 2177
	/usr/sbin/msec
2178
	/etc/cron.weekly/msec
2202 richard 2179
 
2724 rexy 2180
} # End of msec()
2202 richard 2181
 
2182
##################################################################
2552 rexy 2183
##                   Fonction "letsencrypt"                     ##
2184
## - Install Let's Encrypt client                               ##
2185
## - Prepare Let's Encrypt ALCASAR configuration file           ##
2304 tom.houday 2186
##################################################################
2187
letsencrypt()
2188
{
3170 rexy 2189
	acmesh_installDir="/opt/acme.sh"
2190
	acmesh_confDir="/usr/local/etc/letsencrypt"
2191
	acmesh_userAgent="ALCASAR"
2990 rexy 2192
# Remove potential old installers
2586 tom.houday 2193
	rm -rf /tmp/acme.sh-*
3170 rexy 2194
	[ -d $acmesh_confDir ] && rm -rf $acmesh_confDir
2990 rexy 2195
# Extract acme.sh
2304 tom.houday 2196
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2197
	pwdInstall=$(pwd)
3169 rexy 2198
	cd /tmp/acme.sh-* || { echo "Unable to find tmp ACME directory"; exit 1; }
3170 rexy 2199
	mkdir $acmesh_confDir ; chown root:apache $acmesh_confDir ; chmod 440 $acmesh_confDir
2200
	mkdir $acmesh_confDir/{data,certs,ca} ; chown root:apache $acmesh_confDir/{data,certs,ca} ; chmod 440 $acmesh_confDir/{data,certs,ca}
2990 rexy 2201
# Install acme.sh
2304 tom.houday 2202
	./acme.sh --install \
2203
		--home $acmesh_installDir \
2204
		--config-home $acmesh_confDir/data \
2205
		--certhome $acmesh_confDir/certs \
2206
		--accountkey $acmesh_confDir/ca/account.key \
2207
		--accountconf $acmesh_confDir/data/account.conf \
2208
		--useragent $acmesh_userAgent \
2308 tom.houday 2209
		--nocron \
2210
		> /dev/null
2304 tom.houday 2211
	if [ $? -ne 0 ]; then
2212
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2213
	fi
2990 rexy 2214
# Create configuration file
2304 tom.houday 2215
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2216
email=
2217
dateIssueRequest=
2218
domainRequest=
2219
challenge=
2220
dateIssued=
2221
dnsapi=
2222
dateNextRenewal=
2223
EOF
2688 lucas.echa 2224
	cd $pwdInstall || { echo "Unable to find $pwdInstall directory"; exit 1; }
2304 tom.houday 2225
	rm -rf /tmp/acme.sh-*
2724 rexy 2226
} # End of letsencrypt()
2304 tom.houday 2227
 
2228
##################################################################
2990 rexy 2229
##                       "mail_service"                         ##
2994 rexy 2230
## - Install Postfix conf for email registration method         ##
2990 rexy 2231
##################################################################
2232
mail_service()
2233
{
3062 rexy 2234
	[ -e /etc/php.d/05_mail.ini.default ] || cp /etc/php.d/05_mail.ini /etc/php.d/05_mail.ini.default
2235
	$SED "s?^mail.add_x_header =.*?mail.add_x_header = Off?g" /etc/php.d/05_mail.ini
3005 rexy 2236
	[ -e /etc/postfix/main.cf.orig ] || cp /etc/postfix/main.cf /etc/postfix/main.cf.orig
3062 rexy 2237
	$SED "s?^inet_protocols =.*?inet_protocols = ipv4?g" /etc/postfix/main.cf
3180 rexy 2238
	$SED "s?^smtp_tls_security_level =.*?smtp_tls_security_level = encrypt?g" /etc/postfix/main.cf
2239
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2990 rexy 2240
	cat << EOT >> /etc/postfix/main.cf
3070 rexy 2241
smtputf8_enable = no
3062 rexy 2242
smtp_use_tls = yes
2243
smtp_tls_wrappermode = yes
3005 rexy 2244
smtp_sasl_auth_enable = yes
2245
smtp_sasl_security_options = noanonymous
2246
smtp_sasl_password_maps = hash:/etc/postfix/sasl/sasl_passwd
2247
relayhost =
2990 rexy 2248
myhostname = $HOSTNAME.$DOMAIN
2994 rexy 2249
EOT
2990 rexy 2250
	chown -R postfix:postfix /var/lib/postfix
2251
} # end of mail_service
2252
 
2253
##################################################################
2552 rexy 2254
##                    Fonction "post_install"                   ##
2255
## - Modifying banners (locals et ssh) & prompts                ##
2256
## - SSH config                                                 ##
2257
## - sudoers config & files security                            ##
2258
## - log rotate & ANSSI security parameters                     ##
2259
## - Apply former conf in case of an update                     ##
2260
##################################################################
1 root 2261
post_install()
2262
{
3093 rexy 2263
	MAGEIA_VERSION=`cat /etc/lsb-release|grep "DISTRIB_DESCRIPTION"|cut -d"=" -f2|tr -d '"'`
2840 rexy 2264
# change the SSHD options
2195 richard 2265
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
3093 rexy 2266
	echo " Version $VERSION ($MAGEIA_VERSION)" >> /etc/ssh/alcasar-banner-ssh
5 franck 2267
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1 root 2268
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2269
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2270
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2840 rexy 2271
# sshd listens on EXTIF & INTIF
2272
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2273
# sshd authorized certificate for root login
2274
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2275
	$SED "s?^X11Forwarding.*?#X11Forwarding yes?g" /etc/ssh/sshd_config
2195 richard 2276
# ALCASAR conf file
2818 rexy 2277
	echo "HTTPS_LOGIN=off" >> $CONF_FILE
2409 tom.houday 2278
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
3043 rexy 2279
	echo "SSH_LAN=22" >> $CONF_FILE
2280
	echo "SSH_WAN=0" >> $CONF_FILE
1631 richard 2281
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
3046 rexy 2282
	echo "INTERLAN=off" >> $CONF_FILE
628 richard 2283
	echo "LDAP=off" >> $CONF_FILE
2447 richard 2284
	echo "LDAP_SERVER=127.0.0.1" >> $CONF_FILE
3238 rexy 2285
	echo "LDAP_BASE=cn=Users;dc=serverad;dc=lan" >> $CONF_FILE
2454 tom.houday 2286
	echo "LDAP_UID=sAMAccountName" >> $CONF_FILE
2287
	echo "LDAP_FILTER=" >> $CONF_FILE
2288
	echo "LDAP_USER=alcasar" >> $CONF_FILE
2289
	echo "LDAP_PASSWORD=" >> $CONF_FILE
2705 tom.houday 2290
	echo "LDAP_SSL=on" >> $CONF_FILE
2291
	echo "LDAP_CERT_REQUIRED=" >> $CONF_FILE
2600 tom.houday 2292
	echo "SMS=off" >> $CONF_FILE
2293
	echo "SMS_NUM=" >> $CONF_FILE
2993 rexy 2294
	echo "MAIL=off" >> $CONF_FILE
2295
	echo "MAIL_TYPE=" >> $CONF_FILE
2296
	echo "MAIL_SMTP_IP=" >> $CONF_FILE
3021 rexy 2297
	echo "MAIL_SMTP_PORT=" >> $CONF_FILE
2993 rexy 2298
	echo "MAIL_ADDR=" >> $CONF_FILE
2299
	echo "MAIL_WHITEDOMAIN=" >> $CONF_FILE
2300
	echo "MAIL_ADMIN=" >> $CONF_FILE
2688 lucas.echa 2301
	echo "BL_PUREIP=on" >> $CONF_FILE
2302
	echo "BL_SAFESEARCH=off" >> $CONF_FILE
2303
	echo "WL_SAFESEARCH=off" >> $CONF_FILE
2770 rexy 2304
	echo "IOT_CAPTURE=off" >> $CONF_FILE
2926 rexy 2305
	echo "WIFI4EU=off" >> $CONF_FILE
2306
	echo "WIFI4EU_CODE=123e4567-e89b-12d3-a456-426655440000" >> $CONF_FILE
2979 rexy 2307
	echo "MULTIWAN=off" >> $CONF_FILE
2195 richard 2308
# Prompt customisation (colors)
1 root 2309
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
5 franck 2310
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
630 franck 2311
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2941 rexy 2312
	$SED "s?^alias ll=.*?alias ll=\"ls -al --color\"?g" /etc/profile.d/60alias.sh
2195 richard 2313
# sudoers configuration for "apache" & "sysadmin"
1 root 2314
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2850 rexy 2315
	cp -f $DIR_CONF/sudoers /etc/ ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
629 richard 2316
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1543 richard 2317
# Modify some logrotate files (gammu, ulogd)
1 root 2318
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2319
	chmod 644 /etc/logrotate.d/*
2195 richard 2320
# Log compression
706 franck 2321
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2322
# actualisation des fichiers logs compressés
3230 rexy 2323
	for dir in firewall e2guardian httpd
706 franck 2324
	do
2688 lucas.echa 2325
		find /var/log/$dir -type f -name "*.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9]" -exec gzip {} \;
706 franck 2326
	done
2601 tom.houday 2327
	/usr/bin/systemctl daemon-reload
2956 rexy 2328
# processes started at boot time (Systemctl)
3269 rexy 2329
	for i in alcasar-network mariadb httpd ntpd iptables unbound unbound-blacklist unbound-whitelist unbound-blackhole radiusd nfcapd nfsen-ng e2guardian ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban vnstat sshd
1221 richard 2330
	do
1574 richard 2331
		/usr/bin/systemctl -q enable $i.service
1221 richard 2332
	done
2454 tom.houday 2333
 
1452 richard 2334
# disable processes at boot time (Systemctl)
2688 lucas.echa 2335
	for i in ulogd gpm dhcpd
1452 richard 2336
	do
1574 richard 2337
		/usr/bin/systemctl -q disable $i.service
1452 richard 2338
	done
2454 tom.houday 2339
 
2864 rexy 2340
# Apply some security rules (some are from French cybersecurity Agency - ANSSI)
1362 richard 2341
# ignore ICMP broadcast (smurf attack)
2342
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2343
# ignore ICMP errors bogus
2344
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2345
# remove ICMP redirects responces
2346
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2347
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2348
# enable SYN Cookies (Syn flood attacks)
2349
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2350
# enable kernel antispoofing
2351
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2352
# ignore source routing
2353
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2354
# set conntrack timer to 1h (3600s) instead of 5 weeks
2355
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2454 tom.houday 2356
# disable log_martians (ALCASAR is often installed between two private network addresses)
1363 richard 2357
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1778 richard 2358
# disable iptables_helpers
2359
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
1788 richard 2360
# Switch to the router mode
2361
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
1917 franck 2362
# Remove unused service ipv6
1964 franck 2363
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2364
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2365
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2366
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
1003 richard 2367
# switch to multi-users runlevel (instead of x11)
1221 richard 2368
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2864 rexy 2369
# disable Core dump file
2370
	[ -e /etc/security/limits.conf.default ]  || cp /etc/security/limits.conf /etc/security/limits.conf.default
2371
	$SED "/^# End of file.*/i*\tsoft\tcore\t0\n*\thard\tcore\t0" /etc/security/limits.conf
2432 richard 2372
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
3222 rexy 2373
	[ -e /etc/default/grub.default ] || cp /etc/default/grub /etc/default/grub.default
2432 richard 2374
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2433 richard 2375
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2432 richard 2376
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
3190 rexy 2377
	vm_vga=`lsmod | grep -c -E "virtio|vmwgfx"` # test if in VM
2454 tom.houday 2378
	if [ $vm_vga == 0 ] # is not a VM
2432 richard 2379
	then
2454 tom.houday 2380
		cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2381
		echo >> /etc/mageia-release
2382
		$SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
3093 rexy 2383
	else
2384
		echo > /etc/mageia-release
2454 tom.houday 2385
	fi
2386
	if [ $Lang == "fr" ]
2387
	then
3093 rexy 2388
		echo "Bienvenue sur ALCASAR Version $VERSION ($MAGEIA_VERSION)" >> /etc/mageia-release
2688 lucas.echa 2389
		echo "Connectez-vous à l'URL 'https://$HOSTNAME.$DOMAIN/acc'" >> /etc/mageia-release
2454 tom.houday 2390
	else
3093 rexy 2391
		echo "Welcome on ALCASAR Version $VERSION ($MAGEIA_VERSION)" >> /etc/mageia-release
2688 lucas.echa 2392
		echo "Connect to 'https://$HOSTNAME.$DOMAIN/acc'" >> /etc/mageia-release
2454 tom.houday 2393
	fi
2394
	/usr/bin/update-grub2
1221 richard 2395
# Load and apply the previous conf file
2396
	if [ "$mode" = "update" ]
532 richard 2397
	then
2887 rexy 2398
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in $DIR_SAVE/archive
1221 richard 2399
		$DIR_DEST_BIN/alcasar-conf.sh --load
2400
		PARENT_SCRIPT=`basename $0`
2401
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2402
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2454 tom.houday 2403
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf
1221 richard 2404
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2405
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
532 richard 2406
	fi
2560 rexy 2407
	rm -f /var/tmp/alcasar-conf*
1221 richard 2408
	chown -R root:apache $DIR_DEST_ETC/*
2409
	chmod -R 660 $DIR_DEST_ETC/*
2410
	chmod ug+x $DIR_DEST_ETC/digest
2688 lucas.echa 2411
	cd $DIR_INSTALL || { echo "Unable to find $DIR_INSTALL directory"; exit 1; }
5 franck 2412
	echo ""
1 root 2413
	echo "#############################################################################"
638 richard 2414
	if [ $Lang == "fr" ]
2415
		then
2416
		echo "#                        Fin d'installation d'ALCASAR                       #"
2417
		echo "#                                                                           #"
2418
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2419
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2420
		echo "#                                                                           #"
2421
		echo "#############################################################################"
2422
		echo
2423
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2424
		echo
2425
		echo "- Lisez attentivement la documentation d'exploitation"
2426
		echo
2688 lucas.echa 2427
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://$HOSTNAME.$DOMAIN"
638 richard 2428
		echo
2429
		echo "                   Appuyez sur 'Entrée' pour continuer"
2454 tom.houday 2430
	else
2396 tom.houday 2431
		echo "#                        End of ALCASAR install process                     #"
638 richard 2432
		echo "#                                                                           #"
2433
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2434
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2435
		echo "#                                                                           #"
2436
		echo "#############################################################################"
2437
		echo
2438
		echo "- The system will be rebooted in order to operate ALCASAR"
2439
		echo
2440
		echo "- Read the exploitation documentation"
2441
		echo
2688 lucas.echa 2442
		echo "- The ALCASAR Control Center (ACC) is at http://$HOSTNAME.$DOMAIN"
638 richard 2443
		echo
2444
		echo "                   Hit 'Enter' to continue"
2445
	fi
1782 franck 2446
	sleep 2
2560 rexy 2447
	if [ "$mode" == "install" ] || [ "$DEBUG_ALCASAR" == "on" ]
820 richard 2448
	then
2688 lucas.echa 2449
		read
815 richard 2450
	fi
774 richard 2451
	clear
1 root 2452
	reboot
2724 rexy 2453
} # End of post_install()
1 root 2454
 
2552 rexy 2455
#####################################################################################
2456
#                                   Main Install loop                               #
2457
#####################################################################################
832 richard 2458
dir_exec=`dirname "$0"`
2459
if [ $dir_exec != "." ]
2460
then
2461
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2462
	echo "Launch this program from the ALCASAR archive directory"
2463
	exit 0
2464
fi
2688 lucas.echa 2465
if [ $EUID -gt 0 ]
2220 richard 2466
then
2688 lucas.echa 2467
	echo "Vous devez être \"root\" pour installer ALCASAR (commande 'su')"
2468
	echo "You must be \"root\" to install ALCASAR ('su' command)"
2220 richard 2469
	exit 0
2470
fi
832 richard 2471
VERSION=`cat $DIR_INSTALL/VERSION`
291 franck 2472
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1 root 2473
nb_args=$#
2474
args=$1
2475
if [ $nb_args -eq 0 ]
2476
then
2477
	nb_args=1
2478
	args="-h"
2479
fi
1062 richard 2480
chmod -R u+x $DIR_SCRIPTS/*
1 root 2481
case $args in
2482
	-\? | -h* | --h*)
2483
		echo "$usage"
2484
		exit 0
2485
		;;
291 franck 2486
	-i | --install)
3180 rexy 2487
		for func in system_testing network_testing
2724 rexy 2488
		do
2489
			header_install
2490
			$func
2491
			if [ $DEBUG_ALCASAR == "on" ]
2492
			then
3179 rexy 2493
				echo "*** 'debug' : end installing function '$func' ***"
2724 rexy 2494
				read
2495
			fi
2496
		done
595 richard 2497
# RPMs install
2941 rexy 2498
		$DIR_SCRIPTS/alcasar-rpm.sh
595 richard 2499
		if [ "$?" != "0" ]
1 root 2500
		then
595 richard 2501
			exit 0
2502
		fi
1249 richard 2503
		if [ -e $CONF_FILE ]
595 richard 2504
		then
2458 richard 2505
# Uninstall or update the running version
2506
			if [ "$mode" == "update" ]
2507
			then
2560 rexy 2508
				$DIR_DEST_BIN/alcasar-uninstall.sh -update
2458 richard 2509
			else
2560 rexy 2510
				$DIR_DEST_BIN/alcasar-uninstall.sh -full
2458 richard 2511
			fi
595 richard 2512
		fi
2847 rexy 2513
		if [ $DEBUG_ALCASAR == "on" ]
2514
		then
2515
			echo "*** 'debug' : end of cleaning ***"
2516
			read
2517
		fi
2980 rexy 2518
# Avoid some RPM automatic updates
2519
		echo "/^kernel/" > /etc/urpmi/skip.list
2520
		echo "/^wkhtmltopdf/" >> /etc/urpmi/skip.list
2521
		echo "/^freeradius/" >> /etc/urpmi/skip.list
3273 rexy 2522
		echo "/^mariadb/" >> /etc/urpmi/skip.list
3190 rexy 2523
		if [ `grep -E '^exclude=' /etc/dnf/dnf.conf |wc -l` -eq "1" ]; then
3273 rexy 2524
			$SED "s?^exclude=.*?exclude=kernel\* wkhtmltopdf freeradius mariadb?g" /etc/dnf/dnf.conf
2980 rexy 2525
		else
3273 rexy 2526
			echo "exclude=kernel* wkhtmltopdf freeradius mariadb" >> /etc/dnf/dnf.conf
2980 rexy 2527
		fi
2835 rexy 2528
# Test if conf file
2529
		if [ -e /var/tmp/alcasar-conf.tar.gz ]
595 richard 2530
		then
2826 rexy 2531
# Extract some info from the previous configuration file
2834 rexy 2532
			cd /var/tmp
2533
			tar -xf /var/tmp/alcasar-conf.tar.gz conf/etc/alcasar.conf
2847 rexy 2534
			if [ "$mode" == "install" ] # don't display this if updating a running version
2834 rexy 2535
			then
2536
				header_install
2537
				ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2538
				PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2539
				MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2540
				MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2`
2541
				UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3|cut -c1`
597 richard 2542
				if [ $Lang == "fr" ]
2834 rexy 2543
					then echo "Le fichier de configuration d'une version $MAJ_PREVIOUS_VERSION.$MIN_PREVIOUS_VERSION.$UPD_PREVIOUS_VERSION a été trouvé";
2956 rexy 2544
					else echo "The configuration file of a version $MAJ_PREVIOUS_VERSION.$MIN_PREVIOUS_VERSION.$UPD_PREVIOUS_VERSION has been found";
597 richard 2545
				fi
2834 rexy 2546
				response=0
2547
				PTN='^[oOnNyY]?$'
2548
				until [[ "$response" =~ $PTN ]]
2549
				do
2550
					if [ $Lang == "fr" ]
2551
						then echo -n "Voulez-vous l'utiliser (O/n)? ";
2552
						else echo -n "Do you want to use it (Y/n)?";
2553
					fi
2554
					read response
2555
					if [ "$response" = "n" ] || [ "$response" = "N" ]
2556
					then
2557
						rm -f /var/tmp/alcasar-conf*
2558
						rm -rf /var/tmp/conf
2559
					fi
2560
				done
2561
			fi
2847 rexy 2562
			cd $DIR_INSTALL
597 richard 2563
		fi
636 richard 2564
# Test if update
2834 rexy 2565
		if [ -e /var/tmp/alcasar-conf.tar.gz ]
597 richard 2566
		then
2567
			if [ $Lang == "fr" ]
2568
				then echo "#### Installation avec mise à jour ####";
2569
				else echo "#### Installation with update     ####";
2570
			fi
5 franck 2571
			mode="update"
1 root 2572
		fi
3170 rexy 2573
		for func in init network CA ACC time_server init_db freeradius chilli e2guardian ulogd nfsen vnstat unbound dhcpd BL cron fail2ban gammu_smsd msec letsencrypt mail_service post_install
5 franck 2574
		do
2575
			$func
2466 richard 2576
			if [ $DEBUG_ALCASAR == "on" ]
2688 lucas.echa 2577
			then
3179 rexy 2578
				echo "*** 'debug' : end installing function '$func' ***"
2688 lucas.echa 2579
				read
2466 richard 2580
			fi
14 richard 2581
		done
5 franck 2582
		;;
291 franck 2583
	-u | --uninstall)
1828 richard 2584
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
1 root 2585
		then
597 richard 2586
			if [ $Lang == "fr" ]
2587
				then echo "ALCASAR n'est pas installé!";
2588
				else echo "ALCASAR isn't installed!";
2589
			fi
1 root 2590
			exit 0
2591
		fi
5 franck 2592
		response=0
2760 lucas.echa 2593
		PTN='^[oOyYnN]?$'
2594
		until [[ "$response" =~ $PTN ]]
5 franck 2595
		do
597 richard 2596
			if [ $Lang == "fr" ]
2760 lucas.echa 2597
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (O/n)? ";
854 richard 2598
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
597 richard 2599
			fi
5 franck 2600
			read response
2601
		done
1103 richard 2602
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
1 root 2603
		then
3206 rexy 2604
			$DIR_DEST_BIN/alcasar-conf.sh --create
2454 tom.houday 2605
		else
2560 rexy 2606
			rm -f /var/tmp/alcasar-conf*
1 root 2607
		fi
597 richard 2608
# Uninstall the running version
2560 rexy 2609
		$DIR_DEST_BIN/alcasar-uninstall.sh -full
1 root 2610
		;;
2611
	*)
2612
		echo "Argument inconnu :$1";
460 richard 2613
		echo "Unknown argument :$1";
1 root 2614
		echo "$usage"
2615
		exit 1
2616
		;;
2617
esac
10 franck 2618
# end of script