Subversion Repositories ALCASAR

Rev

Rev 3269 | Rev 3272 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
672 richard 1
#!/bin/bash
2454 tom.houday 2
#  $Id: alcasar.sh 3271 2025-04-22 22:37:55Z rexy $
1 root 3
 
2969 rexy 4
# ALCASAR is a Free and open source NAC (Network Access Controler) created by Franck BOUIJOUX (3abtux), Pascal LEVANT and Richard REY (Rexy)
3230 rexy 5
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares Coovachilli, freeradius, mariaDB, apache, php, netfilter, e2guardian, ntpd, openssl, unbound, gammu, Ulog, fail2ban, vnstat, wkhtml2pdf, ipt_NETFLOW, NFsen and NFdump
2969 rexy 6
# contact : info@alcasar.net
959 franck 7
 
1 root 8
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
2969 rexy 9
# This script is distributed under the Gnu General Public License (GPLV3)
2466 richard 10
 
1 root 11
# Options :
376 franck 12
#       -i or --install
13
#       -u or --uninstall
14
# Functions :
2990 rexy 15
#	system_testing	: Free space test and mageia version test
16
#	network_testing	: Internet connectivity tests
1221 richard 17
#	init			: Installation of RPM and scripts
18
#	network			: Network parameters
2552 rexy 19
#	ACC				: ALCASAR Control Center installation
20
#	CA				: Certification Authority initialization
1837 richard 21
#	time_server		: NTPd configuration
1221 richard 22
#	init_db			: Initilization of radius database managed with MariaDB
2421 richard 23
#	freeradius		: FreeRadius initialisation
2990 rexy 24
#	chilli			: Coovachilli initialisation (+authentication page)
2521 armand.ito 25
#	e2guardian		: E2Guardian filtering HTTP proxy configuration
2990 rexy 26
#	ulogd			: Log system in userland (match NFLOG target of iptables)
3248 rexy 27
#	nfsen			: Configuration of netflow collector (nfcapd) and Netflow grapher (nfsen-ng)
2688 lucas.echa 28
#	unbound			: Name server configuration
2990 rexy 29
#	vnstat			: Little network stat daemon
2688 lucas.echa 30
#	BL				: Adaptation of Toulouse University BlackList : split into 3 BL (for unbound, for e2guardian and for Netfilter)
1266 richard 31
#	cron			: Logs export + watchdog + connexion statistics
1389 richard 32
#	fail2ban		: Fail2ban IDS installation and configuration
33
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
2969 rexy 34
#	msec			: Mageia security package configuration
2304 tom.houday 35
#	letsencrypt		: Let's Encrypt client
2990 rexy 36
#	mail_service	: Mail service for email authentification method
2552 rexy 37
#	post_install	: Security, log rotation, etc.
1 root 38
 
2499 tom.houday 39
DEBUG_ALCASAR='off'; export DEBUG_ALCASAR	# Debug mode = wait (hit key) after each function
1 root 40
DATE=`date '+%d %B %Y - %Hh%M'`
41
DATE_SHORT=`date '+%d/%m/%Y'`
595 richard 42
Lang=`echo $LANG|cut -c 1-2`
3219 rexy 43
export LC_ALL=C		 					# switch to default language
1362 richard 44
mode="install"
1 root 45
# ******* Files parameters - paramètres fichiers *********
2552 rexy 46
DIR_INSTALL=`pwd`						# current directory
1015 richard 47
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
48
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
2552 rexy 49
DIR_BLACKLIST="$DIR_INSTALL/blacklist"	# install directory (with blacklist files)
50
DIR_SAVE="/var/Save"					# backup directory (traceability_log, user_db, security_log)
3230 rexy 51
DIR_WEB="/var/www/html"					# directory of Apache
3197 rexy 52
DIR_E2G="/etc/e2guardian"				# directory of E2Guardian
2552 rexy 53
DIR_ACC="$DIR_WEB/acc"					# directory of the 'ALCASAR Control Center'
1015 richard 54
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
55
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
2688 lucas.echa 56
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (unbound for instance)
2552 rexy 57
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"	# central ALCASAR conf file
1015 richard 58
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
1 root 59
# ******* DBMS parameters - paramètres SGBD ********
2552 rexy 60
DB_RADIUS="radius"						# database name used by FreeRadius server
61
DB_USER="radius"						# user name allows to request the users database
62
DB_GAMMU="gammu"						# database name used by Gammu-smsd
1 root 63
# ******* Network parameters - paramètres réseau *******
2552 rexy 64
HOSTNAME="alcasar"						# default hostname
3238 rexy 65
DOMAIN="lan"							# default local domain
2736 rexy 66
EXTIF=''								# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
67
INTIF=''								# INTIF is connected to the consultation network
1148 crox53 68
MTU="1500"
1243 richard 69
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
1 root 70
# ****** Paths - chemin des commandes *******
71
SED="/bin/sed -i"
72
# ****************** End of global parameters *********************
73
 
2724 rexy 74
license()
959 franck 75
{
76
	if [ $Lang == "fr" ]
1538 richard 77
	then
3190 rexy 78
		echo "                   *******************************"
79
		echo "                   **** Licence d'utilisation ****"
80
		echo "                   *******************************"
81
		echo
82
		echo "ALCASAR est un logiciel libre"
83
		echo
84
		echo "Avant de l'installer, vous devez accepter les termes de sa licence 'GPL-V3'"
85
		echo "Le descriptif de cette licence est disponible dans le fichier 'GPL-3.0.txt'"
86
		echo "Une traduction française est disponible dans le fichier 'GPL-3.0.fr.txt'."
87
		echo
88
		echo "Les objectifs de cette licence sont de garantir à l'utilisateur :"
89
		echo "- La liberté d'exécuter le logiciel, pour n'importe quel usage ;"
90
		echo "- La liberté d'étudier et d'adapter le logiciel à ses besoins ;"
91
		echo "- La liberté de redistribuer des copies ;"
92
		echo "- L'obligation de faire bénéficier à la communauté les versions modifiées."
93
		echo
1538 richard 94
	else
3190 rexy 95
		echo "                   *******************************"
96
		echo "                   ****      User License     ****"
97
		echo "                   *******************************"
98
		echo
99
		echo "ALCASAR is an open source software"
100
		echo
101
		echo "Before install it, you must understand and accept the license 'GPL-V3'"
102
		echo "you can read this license in the file 'GPL-3.0.txt'"
103
		echo
104
		echo "The goals of this license are :"
105
		echo "- the freedom of using the software ;"
106
		echo "- the freedom of studying et adapting it for its own uses ;"
107
		echo "- the freedom of redistributing copies of it ;"
108
		echo "- the compulsory of giving the modify versions to the community"
109
		echo
959 franck 110
	fi
1538 richard 111
	response=0
2760 lucas.echa 112
	PTN='^[oOyYnN]?$'
113
	until [[ "$response" =~ $PTN ]]
1538 richard 114
	do
115
		if [ $Lang == "fr" ]
1563 franck 116
			then echo -n "Acceptez-vous les termes de cette licence (O/n)? : "
1538 richard 117
			else echo -n "Do you accept the terms of this license (Y/n)? : "
118
		fi
119
		read response
120
	done
121
	if [ "$response" = "n" ] || [ "$response" = "N" ]
122
	then
123
		exit 1
124
	fi
2724 rexy 125
} # End of license()
959 franck 126
 
2724 rexy 127
header_install()
1 root 128
{
129
	clear
130
	echo "-----------------------------------------------------------------------------"
460 richard 131
	echo "                     ALCASAR V$VERSION Installation"
1 root 132
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
133
	echo "-----------------------------------------------------------------------------"
2724 rexy 134
} # End of header_install()
1 root 135
 
2552 rexy 136
########################################################
2990 rexy 137
##                  "system_testing"                  ##
3190 rexy 138
## - Test distribution version                        ##
2552 rexy 139
## - Test ALCASAR version (if already installed)      ##
140
## - Test free space on /var  (>10G)                  ##
141
## - Test Internet access                             ##
142
########################################################
2990 rexy 143
system_testing()
29 richard 144
{
1529 richard 145
# Test of Mageia version
3043 rexy 146
# extract the current Mageia version and hardware architecture (X86_64)
3190 rexy 147
	fic="/etc/product.id"
148
	DISTRIBUTION_NAME=`cat $fic|cut -d"," -f2|cut -d"=" -f2`
149
	DISTRIBUTION_VERSION=`cat $fic|cut -d"," -f4|cut -d"=" -f2`
150
	DISTRIBUTION_ARCH=`cat $fic|cut -d"," -f7|cut -d"=" -f2`
151
	if [ "$DISTRIBUTION_ARCH" != "x86_64" ]
2149 richard 152
		then
153
		if [ $Lang == "fr" ]
2669 tom.houday 154
			then echo "Votre architecture matérielle doit être en 64bits"
155
			else echo "You hardware architecture must be 64bits"
2149 richard 156
		fi
2482 lucas.echa 157
		exit 1
2149 richard 158
	fi
3190 rexy 159
	if [[("$DISTRIBUTION_NAME" != "Mageia" ) || (( "$DISTRIBUTION_VERSION" != "8" ) && ( "$DISTRIBUTION_VERSION" != "9" ))]]
2688 lucas.echa 160
	then
2669 tom.houday 161
		if [ -e /var/tmp/alcasar-conf.tar.gz ] # update
162
			then
163
			echo
164
			if [ $Lang == "fr" ]
165
				then
166
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
167
				echo "1 - Effectuez une sauvegarde des fichiers de traçabilité et de la base des usagers via l'ACC"
3077 rexy 168
				echo "2 - Installez Linux-Mageia 8 et ALCASAR (cf. doc d'installation)"
2669 tom.houday 169
				echo "3 - Importez votre base des usagers"
170
			else
171
				echo "The automatic update of ALCASAR can't be performed."
172
				echo "1 - Save your traceability files and the user database"
3077 rexy 173
				echo "2 - Install Linux-Mageia 8 & ALCASAR (cf. installation doc)"
2669 tom.houday 174
				echo "3 - Import your users database"
175
			fi
176
		else
177
			if [ $Lang == "fr" ]
178
				then echo "L'installation d'ALCASAR ne peut pas être réalisée."
179
				else echo "The installation of ALCASAR can't be performed."
180
			fi
181
		fi
182
		echo
183
		if [ $Lang == "fr" ]
3077 rexy 184
			then echo "Le système d'exploitation doit être remplacé (Mageia8)"
185
			else echo "The OS must be replaced (Mageia8)"
2669 tom.houday 186
		fi
2688 lucas.echa 187
		exit 1
2669 tom.houday 188
	fi
189
 
1362 richard 190
# Test if ALCASAR is already installed
191
	if [ -e $CONF_FILE ]
192
	then
2396 tom.houday 193
		current_version=`grep ^VERSION= $CONF_FILE | cut -d"=" -f2`
1342 richard 194
		if [ $Lang == "fr" ]
2669 tom.houday 195
			then echo "La version $current_version d'ALCASAR est déjà installée"
196
			else echo "ALCASAR version $current_version is already installed"
1342 richard 197
		fi
1362 richard 198
		response=0
2458 richard 199
		PTN='^[12]$'
2760 lucas.echa 200
		until [[ "$response" =~ $PTN ]]
1362 richard 201
		do
202
			if [ $Lang == "fr" ]
2669 tom.houday 203
				then echo -n "Tapez '1' pour une mise à jour; Tapez '2' pour une réinstallation : "
204
				else echo -n "Hit '1' for an update; Hit '2' for a reinstallation : "
2499 tom.houday 205
			fi
1362 richard 206
			read response
207
		done
2458 richard 208
		if [ "$response" = "2" ]
1362 richard 209
		then
2560 rexy 210
			rm -f /var/tmp/alcasar-conf*
1362 richard 211
		else
2870 rexy 212
# Create the archive of conf files
3206 rexy 213
			$DIR_DEST_BIN/alcasar-conf.sh --create
2970 rexy 214
# avoid lack of local DNS resolution when unbound is updated (alcasar <= V5.3)
215
			local_unbound_unit=`ls /etc/systemd/system/unbound* 2>/dev/null | wc -w`
216
			if [ $local_unbound_unit -ne 4 ]; then
217
				cp -f /lib/systemd/system/unbound*.service /etc/systemd/system/
218
			fi
1362 richard 219
			mode="update"
220
		fi
3180 rexy 221
	else
222
		license
1529 richard 223
	fi
2847 rexy 224
# Free /var (when updating) and test free space
225
	[ -d /var/log/netflow ] && rm -rf /var/log/netflow  # remove old porttracker RRD database
226
	journalctl -q --vacuum-files 1  # remove previous journal logs
2771 rexy 227
	free_space=`df -BG --output=avail /var|tail -1|tr -d '[:space:]G'`
228
	if [ $free_space -lt 10 ]
1529 richard 229
		then
2771 rexy 230
		if [ $Lang == "fr" ]
2847 rexy 231
			then echo "Espace disponible insuffisant sur /var ($free_space Go au lieu de 10 Go au minimum)"
2771 rexy 232
			else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
1529 richard 233
		fi
2771 rexy 234
	exit 0
1529 richard 235
	fi
2990 rexy 236
} # End of system_testing
2669 tom.houday 237
 
2870 rexy 238
########################################################
2990 rexy 239
##                   "network_testing"                ##
240
## - Internet access test                             ##
2870 rexy 241
########################################################
2990 rexy 242
network_testing()
2870 rexy 243
{
2669 tom.houday 244
# Detect external/internal interfaces
245
	if [ -z "$EXTIF" ]; then
3112 rexy 246
		GwListSorted=$(/usr/sbin/ip r list | grep default | cut -d" " -f5 | uniq )
247
		nb_gw=$(echo $GwListSorted | wc -w)
248
		if [ $nb_gw -eq 0 ]; then
2669 tom.houday 249
			if [ "$Lang" == 'fr' ]
2771 rexy 250
				then echo "Aucune passerelle par défaut configurée"
251
				else echo "No default gateway configured"
2669 tom.houday 252
			fi
253
			exit 1
3112 rexy 254
		elif [ $nb_gw -eq 1 ]; then
255
			EXTIF="$GwListSorted"
256
		else
257
			if [ "$Lang" == 'fr' ]
258
				then echo -n "Erreur : Plusieurs interfaces ont une passerelle par défaut ( "
259
				else echo -n "Error : Several interfaces have a default gateway ( "
260
			fi
261
				echo "$GwListSorted" | tr "\n" " "
262
				echo ")"
263
			exit 1
2669 tom.houday 264
		fi
265
	fi
266
	if [ "$Lang" == 'fr' ]
267
		then echo "Interface externe (Internet) utilisée : $EXTIF"
268
		else echo "External interface (Internet) used: $EXTIF"
269
	fi
270
 
271
	if [ -z "$INTIF" ]; then
3112 rexy 272
		IntifListSorted=$(/usr/sbin/ip -br link show | cut -d' ' -f1 | grep -v "^\(lo\|tun0\|$EXTIF\)\$" | uniq | sort)
273
		IntifCount=$(echo "$IntifListSorted" | wc -w)
274
		if [ $IntifCount -eq 0 ]; then
2669 tom.houday 275
			if [ "$Lang" == 'fr' ]
276
				then echo "Aucune interface de disponible pour le réseau interne"
277
				else echo "No interface available for the internal network"
278
			fi
279
			exit 1
3112 rexy 280
		elif [ $IntifCount -eq 1 ]; then
281
			INTIF="$IntifListSorted"
2669 tom.houday 282
		else
3112 rexy 283
			IntifPreferred=$(echo "$IntifListSorted" | head -1 | cut -d' ' -f1)
2669 tom.houday 284
			if [ "$Lang" == 'fr' ]
3112 rexy 285
				then echo 'Liste des interfaces disponibles pour le réseau interne :'
286
				else echo 'List of available interfaces for internal network:'
2669 tom.houday 287
			fi
3112 rexy 288
			echo "$IntifListSorted"
2669 tom.houday 289
			response=''
290
			while true; do
291
				if [ "$Lang" == 'fr' ]
3112 rexy 292
					then echo -n "Choix de l'interface interne ? [$IntifPreferred] "
293
					else echo -n "Choice of internal interface ? [$IntifPreferred] "
2669 tom.houday 294
				fi
295
				read response
3112 rexy 296
				[ -z "$response" ] && response="$IntifPreferred"
2669 tom.houday 297
 
298
				# Check if interface exist
3112 rexy 299
				if [ "$(echo "$IntifListSorted" | grep -c "^$response\$")" -eq 1 ]; then
2669 tom.houday 300
					INTIF="$response"
301
					break
302
				else
303
					if [ "$Lang" == 'fr' ]
304
						then echo "Interface \"$response\" introuvable"
305
						else echo "Interface \"$response\" not found"
306
					fi
307
				fi
308
			done
309
		fi
310
	fi
311
	if [ "$Lang" == 'fr' ]
312
		then echo "Interface interne utilisée : $INTIF"
313
		else echo "Internal interface used: $INTIF"
314
	fi
315
 
2290 richard 316
	if [ $Lang == "fr" ]
317
		then echo -n "Tests des paramètres réseau : "
2549 tom.houday 318
		else echo -n "Network parameters tests: "
2290 richard 319
	fi
320
# Remove conf file if NIC is not plugged (ie : GSM/WIFI/Bt dongles)
2688 lucas.echa 321
	cd /etc/sysconfig/network-scripts/ || { echo "Unable to find /etc/sysconfig/network-scripts directory"; exit 1; }
2290 richard 322
	IF_INTERFACES=`ls ifcfg-*|cut -d"-" -f2|grep -v "^lo"|cut -d"*" -f1`
2282 richard 323
	for i in $IF_INTERFACES
324
	do
2688 lucas.echa 325
		if [ "$(/usr/sbin/ip link | grep -c " $i:")" -eq 0 ]; then
2282 richard 326
			rm -f ifcfg-$i
2454 tom.houday 327
 
2282 richard 328
			if [ $Lang == "fr" ]
329
				then echo "Suppression : ifcfg-$i"
2549 tom.houday 330
				else echo "Deleting: ifcfg-$i"
2282 richard 331
			fi
332
		fi
333
	done
2688 lucas.echa 334
	cd $DIR_INSTALL || { echo "Unable to find $DIR_INSTALL directory"; exit 1; }
2290 richard 335
	echo -n "."
2454 tom.houday 336
# Test Ethernet NIC links state
2669 tom.houday 337
	interfacesDown=$(/usr/sbin/ip -br link | grep "^\($EXTIF\|$INTIF\) " | grep 'NO-CARRIER' | cut -d' ' -f1)
338
	if [ ! -z "$interfacesDown" ]; then
339
		for i in $interfacesDown; do
340
			if [ $Lang == "fr" ]
341
			then
342
				echo -e "\nÉchec"
343
				echo "Le lien réseau de la carte $i n'est pas actif."
344
				echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
345
			else
346
				echo -e "\nFailed"
347
				echo "The link state of $i interface is down."
348
				echo "Make sure that this network card is connected to a switch or an A.P."
349
			fi
350
		done
351
		exit 1
352
	fi
1471 richard 353
	echo -n "."
354
# Test EXTIF config files
2681 tom.houday 355
	PUBLIC_IP_MASK=`/usr/sbin/ip addr show $EXTIF | grep '^\s*inet\s' | awk '{ print $2 }'`
356
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d'/' -f1`
2981 rexy 357
	PUBLIC_GATEWAY=`/usr/sbin/ip route list | awk -v EXTIF="$EXTIF" '(/ via / && $5 == EXTIF) {print $3}' | head -n 1`
2688 lucas.echa 358
	if [ "$(echo $PUBLIC_IP|wc -c)" -lt 7 ] || [ "$(echo $PUBLIC_GATEWAY|wc -c)" -lt 7 ]
1471 richard 359
	then
784 richard 360
		if [ $Lang == "fr" ]
2454 tom.houday 361
		then
2669 tom.houday 362
			echo -e "\nÉchec"
784 richard 363
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
364
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
1362 richard 365
			echo "Appliquez les changements : 'systemctl restart network'"
784 richard 366
		else
2669 tom.houday 367
			echo -e "\nFailed"
784 richard 368
			echo "The Internet connected network card ($EXTIF) isn't well configured."
369
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
2669 tom.houday 370
			echo "Apply the new configuration: 'systemctl restart network'"
784 richard 371
		fi
830 richard 372
		echo "DEVICE=$EXTIF"
784 richard 373
		echo "IPADDR="
374
		echo "NETMASK="
375
		echo "GATEWAY="
376
		echo "DNS1="
377
		echo "DNS2="
830 richard 378
		echo "ONBOOT=yes"
2669 tom.houday 379
		exit 1
784 richard 380
	fi
381
	echo -n "."
2290 richard 382
# Test if default GW is alive
3214 rexy 383
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
2688 lucas.echa 384
	if [ "$(expr $arp_reply)" -eq 0 ]
2454 tom.houday 385
		then
595 richard 386
		if [ $Lang == "fr" ]
2454 tom.houday 387
		then
2669 tom.houday 388
			echo -e "\nÉchec"
2290 richard 389
			echo "Le routeur de sortie ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
595 richard 390
			echo "Réglez ce problème puis relancez ce script."
391
		else
2669 tom.houday 392
			echo -e "\nFailed"
2290 richard 393
			echo "The Internet gateway or the ISP equipment ($PUBLIC_GATEWAY) doesn't answered."
595 richard 394
			echo "Resolv this problem, then restart this script."
395
		fi
2669 tom.houday 396
		exit 1
308 richard 397
	fi
398
	echo -n "."
2290 richard 399
# Test Internet connectivity
2669 tom.houday 400
	domainTested='www.google.com'
401
	/usr/bin/curl -s --head "$domainTested" &>/dev/null
402
	if [ $? -ne 0 ]; then
595 richard 403
		if [ $Lang == "fr" ]
2454 tom.houday 404
		then
2669 tom.houday 405
			echo -e "\nLa tentative de connexion vers Internet a échoué ($domainTested)."
595 richard 406
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
407
			echo "Vérifiez la validité des adresses IP des DNS."
408
		else
2669 tom.houday 409
			echo -e "\nThe Internet connection try failed ($domainTested)."
595 richard 410
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
411
			echo "Verify the DNS IP addresses"
412
		fi
2669 tom.houday 413
		exit 1
29 richard 414
	fi
308 richard 415
	echo ". : ok"
2990 rexy 416
} # End of network_testing()
302 richard 417
 
2552 rexy 418
#######################################################################
2990 rexy 419
##                             "init"                                ##
2552 rexy 420
## - Creation of ALCASAR conf file "/usr/local/etc/alcasar.conf      ##
421
## - Creation of random password for GRUB, mariadb (admin and user)  ##
422
#######################################################################
2724 rexy 423
init()
302 richard 424
{
527 richard 425
	if [ "$mode" != "update" ]
302 richard 426
	then
427
# On affecte le nom d'organisme
597 richard 428
		header_install
302 richard 429
		ORGANISME=!
430
		PTN='^[a-zA-Z0-9-]*$'
2760 lucas.echa 431
		until [[ "$ORGANISME" =~ $PTN ]]
2454 tom.houday 432
		do
595 richard 433
			if [ $Lang == "fr" ]
2454 tom.houday 434
				then echo -n "Entrez le nom de votre organisme : "
597 richard 435
				else echo -n "Enter the name of your organism : "
595 richard 436
			fi
330 franck 437
			read ORGANISME
613 richard 438
			if [ "$ORGANISME" == "" ]
2688 lucas.echa 439
			then
330 franck 440
				ORGANISME=!
441
			fi
442
		done
302 richard 443
	fi
1 root 444
# On crée aléatoirement les mots de passe et les secrets partagés
2419 richard 445
# We create random passwords and shared secrets
628 richard 446
	rm -f $PASSWD_FILE
2419 richard 447
	echo "#####  ALCASAR ($ORGANISME) security passwords  #####" > $PASSWD_FILE
2688 lucas.echa 448
	grub2pwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c8`
2454 tom.houday 449
	pbkdf2=`( echo $grub2pwd ; echo $grub2pwd ) | \
450
		LC_ALL=C /usr/bin/grub2-mkpasswd-pbkdf2 | \
451
		grep -v '[eE]nter password:' | \
452
		sed -e "s/PBKDF2 hash of your password is //"`
3222 rexy 453
	[ -e /etc/grub.d/default-40_custom ]  || cp /etc/grub.d/40_custom /etc/grub.d/default-40_custom
454
	echo "set superusers=\"root\"" >> /etc/grub.d/40_custom
455
	echo "password_pbkdf2 root $pbkdf2" >> /etc/grub.d/40_custom
2419 richard 456
	echo "# Login name and password to protect GRUB2 boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
2454 tom.houday 457
	echo "GRUB2_user=root" >> $PASSWD_FILE
458
	echo "GRUB2_password=$grub2pwd" >> $PASSWD_FILE
3269 rexy 459
	dbpwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2419 richard 460
	echo "# Login name and Password of MariaDB administrator:" >> $PASSWD_FILE
3269 rexy 461
	echo "db_root=$dbpwd" >> $PASSWD_FILE
2688 lucas.echa 462
	radiuspwd=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2419 richard 463
	echo "# Login name and password of MariaDB user:" >> $PASSWD_FILE
2421 richard 464
	echo "db_user=$DB_USER" >> $PASSWD_FILE
465
	echo "db_password=$radiuspwd" >> $PASSWD_FILE
2688 lucas.echa 466
	secretuam=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2412 tom.houday 467
	echo "# Shared secret between the script 'intercept.php' and coova-chilli:" >> $PASSWD_FILE
468
	echo "secret_uam=$secretuam" >> $PASSWD_FILE
2688 lucas.echa 469
	secretradius=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
2412 tom.houday 470
	echo "# Shared secret between coova-chilli and FreeRadius:" >> $PASSWD_FILE
471
	echo "secret_radius=$secretradius" >> $PASSWD_FILE
3135 rexy 472
	csrfkey=`cat /dev/urandom | tr -dc '[:alnum:]' | head -c16`
473
	echo "# Key used to create CSRF-tokens in several ACC forms" >> $PASSWD_FILE
474
	echo "csrf_key=$csrfkey" >> $PASSWD_FILE
628 richard 475
	chmod 640 $PASSWD_FILE
1828 richard 476
#  copy scripts in in /usr/local/bin
2664 tom.houday 477
	cp -fr $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown -R root:root $DIR_DEST_BIN/alcasar* ; chmod -R 740 $DIR_DEST_BIN/alcasar*
1828 richard 478
#  copy conf files in /usr/local/etc
1954 richard 479
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown -R root:apache $DIR_DEST_ETC ; chmod 770 $DIR_DEST_ETC ; chmod 660 $DIR_DEST_ETC/alcasar*
3269 rexy 480
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_BIN/alcasar-mariadb.sh
3222 rexy 481
# generate main conf file
628 richard 482
	cat <<EOF > $CONF_FILE
612 richard 483
##########################################
484
##                                      ##
485
##          ALCASAR Parameters          ##
486
##                                      ##
487
##########################################
1 root 488
 
612 richard 489
INSTALL_DATE=$DATE
490
VERSION=$VERSION
491
ORGANISM=$ORGANISME
492
EOF
628 richard 493
	chmod o-rwx $CONF_FILE
2724 rexy 494
} # End of init()
1 root 495
 
2552 rexy 496
#########################################################
2990 rexy 497
##                     "network"                       ##
2552 rexy 498
## - Define the several network address                ##
499
## - Define the DNS naming                             ##
500
## - INTIF parameters (consultation network)           ##
501
## - Write "/etc/hosts" file                           ##
502
## - write "hosts.allow" & "hosts.deny" files          ##
503
#########################################################
2724 rexy 504
network()
1 root 505
{
506
	header_install
636 richard 507
	if [ "$mode" != "update" ]
508
		then
509
		if [ $Lang == "fr" ]
510
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
511
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
512
		fi
513
		response=0
2760 lucas.echa 514
		PTN='^[oOyYnN]?$'
515
		until [[ "$response" =~ $PTN ]]
1 root 516
		do
595 richard 517
			if [ $Lang == "fr" ]
659 richard 518
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
618 richard 519
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
595 richard 520
			fi
1 root 521
			read response
522
		done
636 richard 523
		if [ "$response" = "n" ] || [ "$response" = "N" ]
524
		then
525
			PRIVATE_IP_MASK="0"
526
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
2760 lucas.echa 527
			until [[ $(expr "$PRIVATE_IP_MASK" : $PTN) -gt 0 ]]
1 root 528
			do
595 richard 529
				if [ $Lang == "fr" ]
597 richard 530
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
531
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
595 richard 532
				fi
597 richard 533
				read PRIVATE_IP_MASK
1 root 534
			done
636 richard 535
		else
2688 lucas.echa 536
			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
636 richard 537
		fi
595 richard 538
	else
2834 rexy 539
		PRIVATE_IP_MASK=`grep ^PRIVATE_IP= /var/tmp/conf/etc/alcasar.conf|cut -d"=" -f2`
540
		rm -rf /var/tmp/conf
1 root 541
	fi
861 richard 542
# Define LAN side global parameters
1740 richard 543
	hostnamectl set-hostname $HOSTNAME.$DOMAIN
977 richard 544
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
1499 richard 545
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
977 richard 546
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
1499 richard 547
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
3247 rexy 548
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`								# ALCASAR private ip address (consultation LAN side)
549
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]											# when entering network address instead of ip address
2688 lucas.echa 550
	then
2454 tom.houday 551
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`
1499 richard 552
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
2454 tom.houday 553
	fi
3247 rexy 554
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
555
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`	# private network broadcast (ie.: 192.168.182.255)
556
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`;				# ie.: 2=classe B, 3=classe C
1499 richard 557
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
3247 rexy 558
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`				# last octet of LAN broadcast
1499 richard 559
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
3244 rexy 560
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
3247 rexy 561
	classe=$((PRIVATE_PREFIX/8))												# ie.: 2=classe B, 3=classe C
562
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.		# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
1828 richard 563
	PRIVATE_MAC=`/usr/sbin/ip link show $INTIF | grep ether | cut -d" " -f6| sed 's/:/-/g'| awk '{print toupper($0)}'` 	# MAC address of INTIF
841 richard 564
# Define Internet parameters
2809 rexy 565
	DNS1=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS1='| cut -d"=" -f2`	# 1st DNS server
566
	DNS2=`cat /etc/sysconfig/network-scripts/ifcfg-$EXTIF | grep '^DNS2=' | cut -d"=" -f2`	# 2nd DNS server
2870 rexy 567
	DNS1=${DNS1:=208.67.220.220}
70 franck 568
	DNS2=${DNS2:=208.67.222.222}
1499 richard 569
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
1052 richard 570
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
1069 richard 571
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
2552 rexy 572
# Write network parameters in the conf file
2737 rexy 573
	echo "HOSTNAME=$HOSTNAME" >> $CONF_FILE
574
	echo "DOMAIN=$DOMAIN" >> $CONF_FILE
1469 richard 575
	echo "EXTIF=$EXTIF" >> $CONF_FILE
576
	echo "INTIF=$INTIF" >> $CONF_FILE
2770 rexy 577
# Retrieve NIC name of other consultation LAN
2282 richard 578
	INTERFACES=`/usr/sbin/ip link|grep '^[[:digit:]]:'|grep -v "^lo\|$EXTIF\|tun0"|cut -d " " -f2|tr -d ":"`
579
	for i in $INTERFACES
580
	do
581
		SUB=`echo ${i:0:2}`
582
		if [ $SUB = "wl" ]
583
			then WIFIF=$i
2454 tom.houday 584
		elif [ "$i" != "$INTIF" ] && [ $SUB != "ww" ]
2282 richard 585
			then LANIF=$i
586
		fi
587
	done
588
	if [ -n "$WIFIF" ]
589
		then echo "WIFIF=$WIFIF" >> $CONF_FILE
590
	elif [ -n "$LANIF" ]
591
		then echo "LANIF=$LANIF" >> $CONF_FILE
592
	fi
2552 rexy 593
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2` # test static or dynamic
1499 richard 594
	if [ $IP_SETTING == "dhcp" ]
2688 lucas.echa 595
	then
2947 rexy 596
		DHCP_DNS_servers=`cat /var/lib/dhclient/dhclient--$EXTIF.lease |grep domain-name-servers|sed -n "1 p"| rev|cut -d" " -f1|rev|tr -d ';'`
597
		DNS1=`echo $DHCP_DNS_servers | cut -d"," -f1`
598
		DNS2=`echo $DHCP_DNS_servers | cut -d"," -f2`
1499 richard 599
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
1585 richard 600
		echo "GW=dhcp" >> $CONF_FILE
1499 richard 601
	else
602
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
1585 richard 603
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
1499 richard 604
	fi
1587 richard 605
	echo "DNS1=$DNS1" >> $CONF_FILE
606
	echo "DNS2=$DNS2" >> $CONF_FILE
2956 rexy 607
	echo "PROXY=off" >> $CONF_FILE
608
	echo "PROXY_IP=\"192.168.0.100:80\"" >> $CONF_FILE
609
	echo "PUBLIC_WEIGHT=1" >> $CONF_FILE
994 franck 610
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
628 richard 611
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
1484 richard 612
	echo "DHCP=on" >> $CONF_FILE
2708 tom.houday 613
	echo "EXT_DHCP_IP=" >> $CONF_FILE
614
	echo "RELAY_DHCP_IP=" >> $CONF_FILE
615
	echo "RELAY_DHCP_PORT=" >> $CONF_FILE
2709 tom.houday 616
	echo "INT_DNS_DOMAIN=" >> $CONF_FILE
617
	echo "INT_DNS_IP=" >> $CONF_FILE
1610 franck 618
	echo "INT_DNS_ACTIVE=off" >> $CONF_FILE
1499 richard 619
# network default
597 richard 620
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
1 root 621
	cat <<EOF > /etc/sysconfig/network
622
NETWORKING=yes
623
FORWARD_IPV4=true
624
EOF
2552 rexy 625
# write "/etc/hosts"
1 root 626
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
627
	cat <<EOF > /etc/hosts
503 richard 628
127.0.0.1	localhost
2558 rexy 629
$PRIVATE_IP	$HOSTNAME
1 root 630
EOF
2552 rexy 631
# write EXTIF (Internet) config
1499 richard 632
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
633
	if [ $IP_SETTING == "dhcp" ]
2688 lucas.echa 634
	then
1499 richard 635
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
14 richard 636
DEVICE=$EXTIF
1585 richard 637
BOOTPROTO=dhcp
638
DNS1=127.0.0.1
639
PEERDNS=no
640
RESOLV_MODS=yes
641
ONBOOT=yes
1613 franck 642
NOZEROCONF=yes
1585 richard 643
METRIC=10
644
MII_NOT_SUPPORTED=yes
645
IPV6INIT=no
646
IPV6TO4INIT=no
647
ACCOUNTING=no
648
USERCTL=no
649
MTU=$MTU
650
EOF
2688 lucas.echa 651
	else
1585 richard 652
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
653
DEVICE=$EXTIF
14 richard 654
BOOTPROTO=static
597 richard 655
IPADDR=$PUBLIC_IP
656
NETMASK=$PUBLIC_NETMASK
657
GATEWAY=$PUBLIC_GATEWAY
2870 rexy 658
DNS1=$DNS1
659
DNS2=$DNS2
1499 richard 660
RESOLV_MODS=yes
14 richard 661
ONBOOT=yes
662
METRIC=10
1610 franck 663
NOZEROCONF=yes
14 richard 664
MII_NOT_SUPPORTED=yes
665
IPV6INIT=no
666
IPV6TO4INIT=no
667
ACCOUNTING=no
668
USERCTL=no
994 franck 669
MTU=$MTU
14 richard 670
EOF
1499 richard 671
	fi
2552 rexy 672
# write INTIF (consultation LAN) in normal mode
2868 rexy 673
cp -f /etc/sysconfig/network-scripts/ifcfg-$INTIF /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
841 richard 674
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
675
DEVICE=$INTIF
676
BOOTPROTO=static
677
ONBOOT=yes
678
NOZEROCONF=yes
679
MII_NOT_SUPPORTED=yes
680
IPV6INIT=no
681
IPV6TO4INIT=no
682
ACCOUNTING=no
683
USERCTL=no
684
EOF
2552 rexy 685
# write INTIF in bypass mode (see "alcasar-bypass.sh")
1554 richard 686
	cat <<EOF > /etc/sysconfig/network-scripts/bypass-ifcfg-$INTIF
1 root 687
DEVICE=$INTIF
688
BOOTPROTO=static
689
IPADDR=$PRIVATE_IP
604 richard 690
NETMASK=$PRIVATE_NETMASK
1 root 691
ONBOOT=yes
692
METRIC=10
693
NOZEROCONF=yes
694
MII_NOT_SUPPORTED=yes
14 richard 695
IPV6INIT=no
696
IPV6TO4INIT=no
697
ACCOUNTING=no
698
USERCTL=no
1 root 699
EOF
2282 richard 700
######### Config WIFIF (consultation WIFI) ou LANIF (consultation LAN) in normal mode #################
701
	if [ -n "$WIFIF" ] && [ "$WIFIF" != "$INTIF" ]
702
	then
703
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$WIFIF
704
DEVICE=$WIFIF
705
BOOTPROTO=static
706
ONBOOT=yes
707
NOZEROCONF=yes
708
MII_NOT_SUPPORTED=yes
709
IPV6INIT=no
710
IPV6TO4INIT=no
711
ACCOUNTING=no
712
USERCTL=no
713
EOF
714
	elif [ -n "$LANIF" ]
715
	then
716
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$LANIF
717
DEVICE=$LANIF
718
BOOTPROTO=static
719
ONBOOT=yes
720
NOZEROCONF=yes
721
MII_NOT_SUPPORTED=yes
722
IPV6INIT=no
723
IPV6TO4INIT=no
724
ACCOUNTING=no
725
USERCTL=no
726
EOF
727
	fi
2552 rexy 728
# write hosts.allow & hosts.deny
1 root 729
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
730
	cat <<EOF > /etc/hosts.allow
731
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
604 richard 732
sshd: ALL
1 root 733
ntpd: $PRIVATE_NETWORK_SHORT
734
EOF
735
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
736
	cat <<EOF > /etc/hosts.deny
737
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
738
EOF
790 richard 739
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
860 richard 740
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
1069 richard 741
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
790 richard 742
# load conntrack ftp module
743
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
1705 richard 744
	echo "nf_conntrack_ftp" >>  /etc/modprobe.preload
1159 crox53 745
# load ipt_NETFLOW module
746
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
1513 richard 747
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
2937 rexy 748
	cp /lib/systemd/system/iptables.service /etc/systemd/system/iptables.service
749
	$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /etc/systemd/system/iptables.service
2688 lucas.echa 750
	[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
751
	$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test (flush all rules & policies)
2956 rexy 752
# create the alcasar-network unit
753
	cat << EOF > /etc/systemd/system/alcasar-network.service
754
#  This file is part of systemd.
2454 tom.houday 755
#
2956 rexy 756
#  systemd is free software; you can redistribute it and/or modify it
757
#  under the terms of the GNU General Public License as published by
758
#  the Free Software Foundation; either version 2 of the License, or
759
#  (at your option) any later version.
760
 
761
# This unit starts alcasar-network.sh script.
762
[Unit]
763
Description=alcasar-network.sh execution
764
After=network.target iptables.service
765
 
766
[Service]
767
Type=oneshot
768
RemainAfterExit=yes
769
ExecStart=$DIR_DEST_BIN/alcasar-network.sh
770
ExecStop=$DIR_DEST_BIN/alcasar-network.sh
771
TimeoutSec=0
772
 
773
[Install]
774
WantedBy=multi-user.target
775
EOF
776
	/usr/bin/systemctl daemon-reload
777
 
778
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is started at the end of this script in order not to cut network flow in case of using ssh
2724 rexy 779
} # End of network()
1 root 780
 
2763 rexy 781
##################################################################
2990 rexy 782
##                           "CA"                               ##
3230 rexy 783
## - Creating the CA and the server certificate (httpd)         ##
2763 rexy 784
##################################################################
785
CA()
786
{
787
	$DIR_DEST_BIN/alcasar-CA.sh
2814 rexy 788
	chmod 755 /etc/pki/
2801 rexy 789
	chown root:apache /etc/pki/CA; chmod 750 /etc/pki/CA
2821 rexy 790
	chown root:apache /etc/pki/CA/alcasar-ca.crt; chmod 640 /etc/pki/CA/alcasar-ca.crt
2811 rexy 791
	chown root:root /etc/pki/CA/private; chmod 700 /etc/pki/CA/private
792
	chmod 600 /etc/pki/CA/private/*
793
	chown -R root:apache /etc/pki/tls/private; chmod 750 /etc/pki/tls/private
794
	chmod 640 /etc/pki/tls/private/*
3170 rexy 795
	chmod 644 /etc/pki/tls/certs/*
2763 rexy 796
} # End of CA()
797
 
2990 rexy 798
######################################################
799
##                       "ACC"                      ##
800
## - copy ALCASAR Control Center (ACC) files        ##
3230 rexy 801
## - configuration of the web server (Apache)       ##
2990 rexy 802
## - creation of the first ACC admin account        ##
803
## - secure the ACC access                          ##
804
######################################################
2724 rexy 805
ACC()
1 root 806
{
807
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
808
	mkdir $DIR_WEB
1833 richard 809
# Copy & adapt ACC files
316 richard 810
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
3240 rexy 811
	ln $DIR_WEB/images/favicon-48.ico $DIR_WEB/favicon.ico
316 richard 812
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
2815 rexy 813
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/welcome.php
814
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/welcome.php
815
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/welcome.php
3135 rexy 816
	$SED "s?^\$csrf_key = .*?\$csrf_key = \"$csrfkey\"\;?g" $DIR_ACC/manager/htdocs/activity.php
5 franck 817
	chown -R apache:apache $DIR_WEB/*
1833 richard 818
# copy & adapt "freeradius-web" files
819
	cp -rf $DIR_CONF/freeradius-web/ /etc/
820
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
821
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
822
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
823
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
824
	cat <<EOF > /etc/freeradius-web/naslist.conf
825
nas1_name: alcasar-$ORGANISME
826
nas1_model: Network Access Controler
827
nas1_ip: $PRIVATE_IP
828
nas1_port_num: 0
829
nas1_community: public
830
EOF
831
	chown -R apache:apache /etc/freeradius-web/
832
# create the log & backup structure :
1489 richard 833
# - base = users database
834
# - archive = tarball of "base + http firewall + netflow"
1833 richard 835
# - security = watchdog log
2829 rexy 836
# - conf_file = archive conf file (usefull in updating process)
2887 rexy 837
	for i in base archive security activity_report iot_captures;
1 root 838
	do
839
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
840
	done
5 franck 841
	chown -R root:apache $DIR_SAVE
1833 richard 842
# Configuring & securing php
2937 rexy 843
	[ -e /etc/php.d/05_date.ini.default ] || cp /etc/php.d/05_date.ini /etc/php.d/05_date.ini.default
2887 rexy 844
	timezone=`timedatectl show --property=Timezone|cut -d"=" -f2`
845
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.d/05_date.ini
71 richard 846
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
411 richard 847
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
848
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
2397 tom.houday 849
	$SED "s?^display_errors.*?display_errors = Off?" /etc/php.ini
850
	$SED "s?^display_startup_errors.*?display_startup_errors = Off?" /etc/php.ini
71 richard 851
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
852
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
2397 tom.houday 853
	$SED "s?^allow_url_fopen.*?allow_url_fopen = Off?" /etc/php.ini
3230 rexy 854
# Configuring & securing Apache
790 richard 855
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
3230 rexy 856
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
857
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
858
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
859
	$SED "s?Options Indexes.*?Options -Indexes?g" /etc/httpd/conf/httpd.conf
860
	echo "ServerTokens Prod" >> /etc/httpd/conf/httpd.conf
861
	echo "ServerSignature Off" >> /etc/httpd/conf/httpd.conf
862
	[ -e /etc/httpd/conf/modules.d/00_base.conf.default ] || cp /etc/httpd/conf/modules.d/00_base.conf /etc/httpd/conf/modules.d/00_base.conf.default
863
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/modules.d/00_base.conf
864
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/modules.d/00_base.conf
865
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/modules.d/00_base.conf
866
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/modules.d/00_base.conf
3240 rexy 867
	$SED "s?^#LoadModule rewrite_module.*?LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/modules.d/00_base.conf
3230 rexy 868
	$SED "s?^LoadModule speling_module.*?#LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/modules.d/00_base.conf
869
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
870
	echo "Listen $PRIVATE_IP:443" > /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
871
	echo "SSLProtocol all -SSLv2 -SSLv3" >> /etc/httpd/conf/conf.d/ssl.conf  # exclude vulnerable protocols
872
	echo "SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS" >> /etc/httpd/conf/conf.d/ssl.conf # Define the cipher suite
873
	echo "SSLHonorCipherOrder on" >> /etc/httpd/conf/conf.d/ssl.conf # The Browser must respect the order of the cipher suite
874
	echo "SSLPassPhraseDialog  builtin" >> /etc/httpd/conf/conf.d/ssl.conf # in case of passphrase the dialog will be perform on stdin
875
	echo "SSLSessionCache \"shmcb:/run/httpd/ssl_scache(512000)\"" >> /etc/httpd/conf/conf.d/ssl.conf # default cache size
876
	echo "SSLSessionCacheTimeout 300" >> /etc/httpd/conf/conf.d/ssl.conf # default cache time in seconds
3252 rexy 877
	[ -e /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf.default ] || cp /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf.default
878
	$SED "s?^    SSLCertificateFile.*?    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt?g" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
879
	$SED "s?^    SSLCertificateKeyFile.*?    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key?g" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
3271 rexy 880
	$SED "/^    SSLCertificateKeyFile/a\    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.pem" /etc/httpd/conf/vhosts.d/00_default_ssl_vhost.conf
3230 rexy 881
# Error page management
882
	[ -e /etc/httpd/conf/conf.d/multilang-errordoc.conf.default ] || cp /etc/httpd/conf/conf.d/multilang-errordoc.conf /etc/httpd/conf/conf.d/multilang-errordoc.conf.default
883
	cat <<EOF > /etc/httpd/conf/conf.d/multilang-errordoc.conf
884
Alias /error/ "/var/www/html/"
885
<Directory "/usr/share/httpd/error">
886
    AllowOverride None
887
    Options IncludesNoExec
888
    AddOutputFilter Includes html
889
    AddHandler type-map var
890
    Require all granted
891
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
892
    ForceLanguagePriority Prefer Fallback
893
</Directory>
894
ErrorDocument 400 /error/error.php?error=400
895
ErrorDocument 401 /error/error.php?error=401
896
ErrorDocument 403 /error/error.php?error=403
897
ErrorDocument 404 /error/index.php
898
ErrorDocument 405 /error/error.php?error=405
899
ErrorDocument 408 /error/error.php?error=408
900
ErrorDocument 410 /error/error.php?error=410
901
ErrorDocument 411 /error/error.php?error=411
902
ErrorDocument 412 /error/error.php?error=412
903
ErrorDocument 413 /error/error.php?error=413
904
ErrorDocument 414 /error/error.php?error=414
905
ErrorDocument 415 /error/error.php?error=415
906
ErrorDocument 500 /error/error.php?error=500
907
ErrorDocument 501 /error/error.php?error=501
908
ErrorDocument 502 /error/error.php?error=502
909
ErrorDocument 503 /error/error.php?error=503
910
ErrorDocument 506 /error/error.php?error=506
911
EOF
912
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
913
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
914
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
915
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
916
</body>
917
</html>
918
EOF
919
# ACC partitioning
920
	rm -f /etc/httpd/conf/vhosts.d/alcasar*
921
	cat <<EOF > /etc/httpd/conf/vhosts.d/alcasar.conf
922
<Directory $DIR_WEB>
923
        AllowOverride None
924
        Order deny,allow
925
        Deny from all
926
        Allow from 127.0.0.1
927
        Allow from $PRIVATE_NETWORK_MASK
928
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
929
</Directory>
930
<Directory $DIR_WEB/certs>
931
        AddType application/x-x509-ca-cert crt
932
</Directory>
933
<Directory $DIR_ACC>
934
        SSLRequireSSL
935
        AllowOverride None
936
        Order deny,allow
937
        Deny from all
938
        Allow from 127.0.0.1
939
        Allow from $PRIVATE_NETWORK_MASK
940
        require valid-user
941
        AuthType digest
942
        AuthName "ALCASAR Control Center (ACC)"
943
        AuthDigestDomain $HOSTNAME.$DOMAIN
944
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
945
        AuthUserFile $DIR_DEST_ETC/digest/key_all
946
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
947
</Directory>
948
<Directory $DIR_ACC/admin>
949
        SSLRequireSSL
950
        AllowOverride None
951
        Order deny,allow
952
        Deny from all
953
        Allow from 127.0.0.1
954
        Allow from $PRIVATE_NETWORK_MASK
955
        require valid-user
956
        AuthType digest
957
        AuthName "ALCASAR Control Center (ACC)"
958
        AuthDigestDomain $HOSTNAME.$DOMAIN
959
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
960
        AuthUserFile $DIR_DEST_ETC/digest/key_admin
961
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
962
</Directory>
963
<Directory $DIR_ACC/manager>
964
        SSLRequireSSL
965
        AllowOverride None
966
        Order deny,allow
967
        Deny from all
968
        Allow from 127.0.0.1
969
        Allow from $PRIVATE_NETWORK_MASK
970
        require valid-user
971
        AuthType digest
972
        AuthName "ALCASAR Control Center (ACC)"
973
        AuthDigestDomain $HOSTNAME.$DOMAIN
974
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
975
        AuthUserFile $DIR_DEST_ETC/digest/key_manager
976
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
977
</Directory>
3240 rexy 978
<Directory $DIR_ACC/manager/nfsen>
979
        AllowOverride None
980
        <IfModule mod_rewrite.c>
981
                RewriteEngine On
982
                RewriteCond %{REQUEST_FILENAME} !-f
983
                RewriteCond %{REQUEST_FILENAME} !-d
3247 rexy 984
                RewriteRule ^api/(.*)$ backend/index.php?request=\$1 [QSA,NC,L]
3240 rexy 985
                RewriteRule ^$ frontend [L]
986
        </IfModule>
987
</Directory>
3230 rexy 988
<Directory $DIR_ACC/backup>
989
        SSLRequireSSL
990
        AllowOverride None
991
        Order deny,allow
992
        Deny from all
993
        Allow from 127.0.0.1
994
        Allow from $PRIVATE_NETWORK_MASK
995
        require valid-user
996
        AuthType digest
997
        AuthName "ALCASAR Control Center (ACC)"
998
        AuthDigestDomain $HOSTNAME.$DOMAIN
999
        BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
1000
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
1001
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1002
</Directory>
1003
Alias /save/ "$DIR_SAVE/"
1004
<Directory $DIR_SAVE>
1005
        SSLRequireSSL
1006
        Options Indexes
1007
        Order deny,allow
1008
        Deny from all
1009
        Allow from 127.0.0.1
1010
        Allow from $PRIVATE_NETWORK_MASK
1011
        require valid-user
1012
        AuthType digest
1013
        AuthName "ALCASAR Control Center (ACC)"
1014
        AuthDigestDomain $HOSTNAME.$DOMAIN
1015
        AuthUserFile $DIR_DEST_ETC/digest/key_backup
1016
        ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
1017
</Directory>
1018
EOF
2552 rexy 1019
# Creation of the first account (in 'admin' profile)
2293 tom.houday 1020
	if [ "$mode" = "install" ]
2688 lucas.echa 1021
	then
1022
		header_install
1268 richard 1023
# Creation of keys file for the admin account ("admin")
2688 lucas.echa 1024
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1025
		mkdir -p $DIR_DEST_ETC/digest
1026
		chmod 755 $DIR_DEST_ETC/digest
2737 rexy 1027
		if [ $Lang == "fr" ]
2760 lucas.echa 1028
			then echo "Création du premier compte administrateur : "
1029
			else echo "Creation of the first admin account : "
2737 rexy 1030
		fi
2688 lucas.echa 1031
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
1032
		do
1033
			$DIR_DEST_BIN/alcasar-profil.sh --add admin
1034
		done
2293 tom.houday 1035
	fi
3252 rexy 1036
# Link CAcerts in ACC
2818 rexy 1037
	[ -d /var/www/html/certs ] || mkdir /var/www/html/certs
1038
	ln -s /etc/pki/CA/alcasar-ca.crt /var/www/html/certs/certificat_alcasar_ca.crt
3230 rexy 1039
# Run Apache after coova (in order waiting tun0 to be up)
1040
	cp /lib/systemd/system/httpd.service /etc/systemd/system/httpd.service
1041
	$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /etc/systemd/system/httpd.service
2293 tom.houday 1042
	# Log file for ACC access imputability
2887 rexy 1043
	[ -e $DIR_SAVE/security/acc_access.log ] || touch $DIR_SAVE/security/acc_access.log
1044
	chown root:apache $DIR_SAVE/security/acc_access.log
1045
	chmod 664 $DIR_SAVE/security/acc_access.log
2724 rexy 1046
} # End of ACC()
1 root 1047
 
2552 rexy 1048
#############################################################
2990 rexy 1049
##                     "time_server"                       ##
2552 rexy 1050
## - Configuring NTP server                                ##
1051
#############################################################
2724 rexy 1052
time_server()
1837 richard 1053
{
3192 rexy 1054
[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
1055
$SED "s?^pool.*?pool fr.pool.ntp.org iburst?g" /etc/ntp.conf
3193 rexy 1056
echo "interface ignore wildcard" >> /etc/ntp.conf
1057
echo "interface listen lo" >> /etc/ntp.conf
3197 rexy 1058
echo "interface listen tun0" >> /etc/ntp.conf
1837 richard 1059
# Synchronize now
3192 rexy 1060
	ntpdate fr.pool.ntp.org &
3193 rexy 1061
sleep 2 # wait for time server responce
2724 rexy 1062
} # End of time_server()
1837 richard 1063
 
2541 rexy 1064
#####################################################################
2990 rexy 1065
##                           "init_db"                             ##
3269 rexy 1066
## - MariaDb initialization                                          ##
2541 rexy 1067
## - Set admin (root) password                                     ##
1068
## - Remove unused users & databases                               ##
1069
## - Radius database creation                                      ##
1070
## - Copy of accounting tables (mtotacct, totacct) & userinfo      ##
1071
#####################################################################
2724 rexy 1072
init_db()
1 root 1073
{
3269 rexy 1074
	if [ "`systemctl is-active mariadb`" == "active" ]
1990 richard 1075
	then
3269 rexy 1076
		systemctl stop mariadb
1990 richard 1077
	fi
1355 richard 1078
	rm -rf /var/lib/mysql # to be sure that there is no former installation
1 root 1079
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
1979 richard 1080
	$SED "s?^port.*?#&?g" /etc/my.cnf # we use unix socket only
3269 rexy 1081
	[ -e /etc/my.cnf.d/server.cnf.default ] || cp /etc/my.cnf.d/server.cnf /etc/my.cnf.d/server.cnf.default
1082
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf.d/server.cnf
1083
	$SED "s?^;collation_server =.*?collation_server = utf8_unicode_ci?g" /etc/my.cnf.d/server.cnf
1084
	$SED "s?^;character_set_server =.*?character_set_server = utf8?g" /etc/my.cnf.d/server.cnf  # accentuated user names are allowed
1085
	/usr/sbin/mariadb-prepare-db-dir > /dev/null 2>&1
2416 richard 1086
	/usr/bin/systemctl set-environment MYSQLD_OPTS="--skip-grant-tables --skip-networking"
1087
	/usr/bin/systemctl start mysqld
1963 richard 1088
	nb_round=1
1981 richard 1089
	while [ ! -S /var/lib/mysql/mysql.sock ] && [ $nb_round -lt 10 ] # we wait until mariadb is on
1963 richard 1090
	do
1091
		nb_round=`expr $nb_round + 1`
1092
		sleep 2
1093
	done
1981 richard 1094
	if [ ! -S /var/lib/mysql/mysql.sock ]
1963 richard 1095
	then
1981 richard 1096
		echo "Problème : la base données 'MariaDB' ne s'est pas lancée !"
1963 richard 1097
		exit
1955 richard 1098
	fi
1355 richard 1099
# Secure the server
3269 rexy 1100
	/usr/bin/mariadb --execute "GRANT ALL PRIVILEGES ON *.* TO root@'localhost' IDENTIFIED BY '$dbpwd';"
1101
	SQL="/usr/bin/mariadb -uroot -p$dbpwd --execute"
1102
	$SQL "DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
1103
	$SQL "CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;"
615 richard 1104
# Create 'radius' database
3269 rexy 1105
	$SQL "CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
615 richard 1106
# Add an empty radius database structure
3269 rexy 1107
	/usr/bin/mariadb -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/empty-radiusd-db.sql
615 richard 1108
# modify the start script in order to close accounting connexion when the system is comming down or up
3269 rexy 1109
	cp /lib/systemd/system/mysqld.service /etc/systemd/system/mariadb.service
1110
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/mariadbd?g" /etc/systemd/system/mariadb.service
1111
	$SED "/^ExecStart=/a ExecStop=$DIR_DEST_BIN/alcasar-mariadb.sh -acct_stop" /etc/systemd/system/mariadb.service
1112
	$SED "/^ExecStop=/a ExecStartPost=$DIR_DEST_BIN/alcasar-mariadb.sh -acct_stop" /etc/systemd/system/mariadb.service
2416 richard 1113
	/usr/bin/systemctl unset-environment MYSQLD_OPTS
3269 rexy 1114
	/usr/bin/systemctl stop mysqld
1115
	/usr/bin/systemctl start mariadb
2724 rexy 1116
} # End of init_db()
1 root 1117
 
2423 richard 1118
###################################################################
2990 rexy 1119
##                           "freeradius"                        ##
2423 richard 1120
## - Set the configuration files                                 ##
1121
## - Set the shared secret between coova-chilli and freeradius   ##
3269 rexy 1122
## - Adapt the MariaDB conf file and counters                      ##
2423 richard 1123
###################################################################
2724 rexy 1124
freeradius()
1 root 1125
{
1800 richard 1126
	cp -f $DIR_CONF/empty-radiusd-db.sql /etc/raddb/
1 root 1127
	chown -R radius:radius /etc/raddb
1128
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
2420 richard 1129
# Set radius global parameters (radius.conf)
1 root 1130
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
1131
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
1132
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
2420 richard 1133
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf # remove the proxy function
1134
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf # remove the proxy function
2728 rexy 1135
# Add ALCASAR & Coovachilli dictionaries
1136
	[ -e /etc/raddb/dictionary.default ] || cp /etc/raddb/dictionary /etc/raddb/dictionary.default
2730 rexy 1137
	cp $DIR_CONF/radius/dictionary.alcasar /etc/raddb/
1138
	echo '$INCLUDE dictionary.alcasar' > /etc/raddb/dictionary
1139
	cp /usr/share/doc/coova-chilli/dictionary.coovachilli /etc/raddb/
1140
	echo '$INCLUDE dictionary.coovachilli' >> /etc/raddb/dictionary
2420 richard 1141
# Set "client.conf" to describe radius clients (coova on 127.0.0.1)
1 root 1142
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
1143
	cat << EOF > /etc/raddb/clients.conf
2438 richard 1144
client localhost {
1145
	ipaddr = 127.0.0.1
1 root 1146
	secret = $secretradius
2438 richard 1147
	shortname = chilli
2454 tom.houday 1148
	nas_type = other
1 root 1149
}
1150
EOF
2758 rexy 1151
# Set Virtual server
1152
    # Remvoveing all except "alcasar virtual site")
1153
	# INFO : To enable 802.1X, add the "innser-tunnel" virtual server (link in sites-enabled)  Change the firewall rules to allow "radius" extern connections.
2467 richard 1154
	cp $DIR_CONF/radius/alcasar /etc/raddb/sites-available/alcasar
1155
	cp $DIR_CONF/radius/alcasar-with-ldap /etc/raddb/sites-available/alcasar-with-ldap
1156
	chown radius:apache /etc/raddb/sites-available/alcasar*
1157
	chmod 660 /etc/raddb/sites-available/alcasar*
2758 rexy 1158
	rm -f /etc/raddb/sites-enabled/*
2420 richard 1159
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
2454 tom.houday 1160
# Set modules
2728 rexy 1161
	# Add custom LDAP "available module"
2758 rexy 1162
	# INFO : To enable 802.1X, add the "eap" module and verify access to the keys (/etc/pki/tls/private/radius.pem). Change the firewall rules to allow "radius" extern connections.
2465 richard 1163
	cp -f $DIR_CONF/radius/ldap-alcasar /etc/raddb/mods-available/
1164
	chown -R radius:radius /etc/raddb/mods-available/ldap-alcasar
2728 rexy 1165
	# Set only usefull modules for ALCASAR (! the module 'ldap-alcasar' is enabled only via ACC)
2454 tom.houday 1166
	rm -rf  /etc/raddb/mods-enabled/*
2615 tom.houday 1167
	for mods in sql sqlcounter attr_filter expiration logintime pap expr always
2454 tom.houday 1168
	do
1169
		ln -s /etc/raddb/mods-available/$mods /etc/raddb/mods-enabled/$mods
1170
	done
2758 rexy 1171
# Configure SQL module
2420 richard 1172
	[ -e /etc/raddb/mods-available/sql.default ] || cp /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.default
2423 richard 1173
	$SED "s?^[\t ]*driver =.*?driver = \"rlm_sql_mysql\"?g" /etc/raddb/mods-available/sql
1174
	$SED "s?^[\t ]*dialect =.*?dialect = \"mysql\"?g" /etc/raddb/mods-available/sql
2420 richard 1175
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/mods-available/sql
2423 richard 1176
	$SED "s?^#[\t ]*server =.*?server = \"localhost\"?g" /etc/raddb/mods-available/sql
1177
	$SED "s?^#[\t ]*port =.*?port = \"3306\"?g" /etc/raddb/mods-available/sql
1178
	$SED "s?^#[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/mods-available/sql
1179
	$SED "s?^#[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/mods-available/sql
2758 rexy 1180
	# no TLS encryption on 127.0.0.1
2763 rexy 1181
	$SED "s?^[\t ]*ca_file =.*?#&?g" /etc/raddb/mods-available/sql
1182
	$SED "s?^[\t ]*ca_path =.*?#&?g" /etc/raddb/mods-available/sql
1183
	$SED "s?^[\t ]*certificate_file =.*?#&?g" /etc/raddb/mods-available/sql
1184
	$SED "s?^[\t ]*private_key_file =.*?#&?g" /etc/raddb/mods-available/sql
1185
	$SED "s?^[\t ]*cipher =.*?#&?g" /etc/raddb/mods-available/sql
1186
	$SED "s?^[\t ]*tls_required =.*?tls_required = no?g" /etc/raddb/mods-available/sql
2454 tom.houday 1187
# queries.conf modifications : case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.
2420 richard 1188
	[ -e /etc/raddb/mods-config/sql/main/mysql/queries.conf.default ] || cp /etc/raddb/mods-config/sql/main/mysql/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf.default
1189
	cp -f $DIR_CONF/radius/queries.conf /etc/raddb/mods-config/sql/main/mysql/queries.conf
1190
	chown -R radius:radius /etc/raddb/mods-config/sql/main/mysql/queries.conf
2421 richard 1191
# sqlcounter modifications
2470 richard 1192
	[ -e /etc/raddb/mods-available/sqlcounter.default ] || cp /etc/raddb/mods-available/sqlcounter /etc/raddb/mods-available/sqlcounter.default
1193
	cp -f $DIR_CONF/radius/sqlcounter /etc/raddb/mods-available/sqlcounter
1194
	chown -R radius:radius /etc/raddb/mods-available/sqlcounter
3269 rexy 1195
# make certain that mariaDB is up before freeradius start
2937 rexy 1196
	cp /lib/systemd/system/radiusd.service /etc/systemd/system/radiusd.service
3269 rexy 1197
	$SED "s?^After=.*?After=syslog.target network.target mariadb.service?g" /etc/systemd/system/radiusd.service
1574 richard 1198
	/usr/bin/systemctl daemon-reload
2597 tom.houday 1199
# Allow apache to change some conf files (ie : ldap on/off)
1200
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2770 rexy 1201
	chmod 750 /etc/raddb /etc/raddb/sites-available /etc/raddb/mods-available
2724 rexy 1202
} # End of freeradius()
1 root 1203
 
2423 richard 1204
#############################################################################
2990 rexy 1205
##                                "chilli"                                 ##
2423 richard 1206
## - Creation of the conf file and init file (systemd) for coova-chilli    ##
1207
## - Adapt the authentication web page (intercept.php)                     ##
1208
#############################################################################
2724 rexy 1209
chilli()
1 root 1210
{
1370 richard 1211
# chilli unit for systemd
2937 rexy 1212
	cat << EOF > /etc/systemd/system/chilli.service
1372 richard 1213
#  This file is part of systemd.
1214
#
1215
#  systemd is free software; you can redistribute it and/or modify it
1216
#  under the terms of the GNU General Public License as published by
1217
#  the Free Software Foundation; either version 2 of the License, or
1218
#  (at your option) any later version.
2771 rexy 1219
 
1220
# This unit launches coova-chilli a captive portal
1370 richard 1221
[Unit]
1222
Description=chilli is a captive portal daemon
1223
After=network.target
1224
 
1225
[Service]
1379 richard 1226
Type=forking
1370 richard 1227
ExecStart=/usr/libexec/chilli start
1228
ExecStop=/usr/libexec/chilli stop
1229
ExecReload=/usr/libexec/chilli reload
2775 rexy 1230
PIDFile=/run/chilli.pid
1370 richard 1231
 
1232
[Install]
1233
WantedBy=multi-user.target
1234
EOF
799 richard 1235
# init file creation
1370 richard 1236
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1801 richard 1237
	cat <<EOF > /etc/init.d/chilli
799 richard 1238
#!/bin/sh
1239
#
1240
# chilli CoovaChilli init
1241
#
1242
# chkconfig: 2345 65 35
1243
# description: CoovaChilli
1244
### BEGIN INIT INFO
1245
# Provides:       chilli
2454 tom.houday 1246
# Required-Start: network
1247
# Should-Start:
799 richard 1248
# Required-Stop:  network
2454 tom.houday 1249
# Should-Stop:
799 richard 1250
# Default-Start:  2 3 5
1251
# Default-Stop:
1252
# Description:    CoovaChilli access controller
1253
### END INIT INFO
1254
 
1255
[ -f /usr/sbin/chilli ] || exit 0
1256
. /etc/init.d/functions
1257
CONFIG=/etc/chilli.conf
2775 rexy 1258
pidfile=/run/chilli.pid
799 richard 1259
[ -f \$CONFIG ] || {
2394 tom.houday 1260
	echo "\$CONFIG Not found"
1261
	exit 0
799 richard 1262
}
2882 rexy 1263
current_users_file="/tmp/current_users.txt"	# file containing active users
799 richard 1264
RETVAL=0
1265
prog="chilli"
1266
case \$1 in
2394 tom.houday 1267
	start)
2454 tom.houday 1268
		if [ -f \$pidfile ] ; then
2394 tom.houday 1269
			gprintf "chilli is already running"
1270
		else
1271
			gprintf "Starting \$prog: "
2884 rexy 1272
			echo '' > \$current_users_file && chown root:apache \$current_users_file && chmod 660 \$current_users_file
2775 rexy 1273
			rm -f /run/chilli* # cleaning
2394 tom.houday 1274
			/usr/sbin/modprobe tun >/dev/null 2>&1
1275
			echo 1 > /proc/sys/net/ipv4/ip_forward
1276
			[ -e /dev/net/tun ] || {
2454 tom.houday 1277
				(cd /dev;
1278
				mkdir net;
1279
				cd net;
2394 tom.houday 1280
				mknod tun c 10 200)
1281
			}
1282
			ifconfig $INTIF 0.0.0.0
1283
			/usr/sbin/ethtool -K $INTIF gro off
1284
			daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1285
			RETVAL=\$?
1286
		fi
1287
		;;
799 richard 1288
 
2394 tom.houday 1289
	reload)
1290
		killall -HUP chilli
1291
		;;
799 richard 1292
 
2394 tom.houday 1293
	restart)
1294
		\$0 stop
1295
		sleep 2
1296
		\$0 start
1297
		;;
799 richard 1298
 
2394 tom.houday 1299
	status)
1300
		status chilli
1301
		RETVAL=0
1302
		;;
1303
 
1304
	stop)
2454 tom.houday 1305
		if [ -f \$pidfile ] ; then
2394 tom.houday 1306
			gprintf "Shutting down \$prog: "
1307
			killproc /usr/sbin/chilli
1308
			RETVAL=\$?
1309
			[ \$RETVAL = 0 ] && rm -f \$pidfile
1310
			[ -e \$current_users_file ] && rm -f \$current_users_file
2454 tom.houday 1311
		else
2394 tom.houday 1312
			gprintf "chilli is not running"
1313
		fi
1314
		;;
1315
 
1316
	*)
1317
		echo "Usage: \$0 {start|stop|restart|reload|status}"
1318
		exit 1
799 richard 1319
esac
1320
echo
1321
EOF
2324 tom.houday 1322
	chmod a+x /etc/init.d/chilli
1323
	ln -s /etc/init.d/chilli /usr/libexec/chilli
799 richard 1324
# conf file creation
346 richard 1325
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
2016 raphael.pi 1326
	#NTP Option configuration for DHCP
2032 richard 1327
	#DHCP Options : rfc2132
1328
		#dhcp option value will be convert in hexa.
1329
		#NTP option (or 'option 42') is like :
2454 tom.houday 1330
		#
2032 richard 1331
		#    Code   Len         Address 1               Address 2
1332
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1333
		#   |  42 |  n  |  a1 |  a2 |  a3 |  a4 |  a1 |  a2 |  ...
1334
		#   +-----+-----+-----+-----+-----+-----+-----+-----+--
1335
		#
1336
		#Code : 42 => 2a
1337
		#Len : 4 => 04
2688 lucas.echa 1338
	PRIVATE_IP_HEXA=$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f1)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f2)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f3)")$(printf "%02x\n" "$(echo $PRIVATE_IP | cut -d'.' -f4)")
346 richard 1339
	cat <<EOF > /etc/chilli.conf
1340
# coova config for ALCASAR
2775 rexy 1341
cmdsocket	/run/chilli.sock
1336 richard 1342
unixipc		chilli.$INTIF.ipc
2775 rexy 1343
pidfile		/run/chilli.pid
346 richard 1344
net		$PRIVATE_NETWORK_MASK
595 richard 1345
dhcpif		$INTIF
841 richard 1346
ethers		$DIR_DEST_ETC/alcasar-ethers
861 richard 1347
#nodynip
865 richard 1348
#statip
1349
dynip		$PRIVATE_NETWORK_MASK
1249 richard 1350
domain		$DOMAIN
355 richard 1351
dns1		$PRIVATE_IP
1352
dns2		$PRIVATE_IP
346 richard 1353
uamlisten	$PRIVATE_IP
503 richard 1354
uamport		3990
2370 tom.houday 1355
uamuiport	3991
837 richard 1356
macauth
1357
macpasswd	password
1697 richard 1358
strictmacauth
1243 richard 1359
locationname	$HOSTNAME.$DOMAIN
346 richard 1360
radiusserver1	127.0.0.1
1361
radiusserver2	127.0.0.1
1362
radiussecret	$secretradius
1363
radiusauthport	1812
1364
radiusacctport	1813
2818 rexy 1365
uamserver	http://$HOSTNAME.$DOMAIN/intercept.php
2374 tom.houday 1366
redirurl
1243 richard 1367
radiusnasid	$HOSTNAME.$DOMAIN
346 richard 1368
uamsecret	$secretuam
1249 richard 1369
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
346 richard 1370
coaport		3799
1379 richard 1371
conup		$DIR_DEST_BIN/alcasar-conup.sh
1372
condown		$DIR_DEST_BIN/alcasar-condown.sh
2594 tom.houday 1373
macup		$DIR_DEST_BIN/alcasar-macup.sh
503 richard 1374
include		$DIR_DEST_ETC/alcasar-uamallowed
1375
include		$DIR_DEST_ETC/alcasar-uamdomain
2016 raphael.pi 1376
dhcpopt		2a04$PRIVATE_IP_HEXA
1613 franck 1377
#dhcpgateway		none
1378
#dhcprelayagent		none
1610 franck 1379
#dhcpgatewayport	none
2234 richard 1380
sslkeyfile	/etc/pki/tls/private/alcasar.key
1381
sslcertfile	/etc/pki/tls/certs/alcasar.crt
2922 rexy 1382
sslcafile	/etc/pki/tls/certs/server-chain.pem
2818 rexy 1383
#redirssl
1384
#uamuissl
346 richard 1385
EOF
2274 richard 1386
# create files for "DHCP static ip" and "DHCP static ip info". Reserve the second IP address for INTIF (the first one is for tun0)
977 richard 1387
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
2274 richard 1388
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers-info
840 richard 1389
# create files for trusted domains and urls
1148 crox53 1390
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
503 richard 1391
	chown root:apache $DIR_DEST_ETC/alcasar-*
1392
	chmod 660 $DIR_DEST_ETC/alcasar-*
847 richard 1393
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
526 stephane 1394
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
796 richard 1395
# user 'chilli' creation (in order to run conup/off and up/down scripts
2396 tom.houday 1396
	chilli_exist=`grep -c ^chilli: /etc/passwd`
796 richard 1397
	if [ "$chilli_exist" == "1" ]
1398
	then
2454 tom.houday 1399
		userdel -r chilli 2>/dev/null
796 richard 1400
	fi
1401
	groupadd -f chilli
1402
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
2724 rexy 1403
}  # End of chilli()
1349 richard 1404
 
2541 rexy 1405
################################################################
2990 rexy 1406
##                        "e2guardian"                        ##
3193 rexy 1407
## - Set the parameters of this HTTP proxy (as controler)     ##
2541 rexy 1408
################################################################
2724 rexy 1409
e2guardian()
1 root 1410
{
2758 rexy 1411
# Adapt systemd unit
2937 rexy 1412
	cp /lib/systemd/system/e2guardian.service /etc/systemd/system/e2guardian.service
1413
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/e2guardian -c /etc/e2guardian/e2guardian.conf?g" /etc/systemd/system/e2guardian.service
3177 rexy 1414
	$SED "s?^After=.*?After=network-online.target chilli.service?g" /etc/systemd/system/e2guardian.service
1415
	$SED "/^PIDFile=/d" /etc/systemd/system/e2guardian.service
1416
 
2937 rexy 1417
# Adapt the main conf file
3197 rexy 1418
	[ -e $DIR_E2G/e2guardian.conf.default ] || cp $DIR_E2G/e2guardian.conf $DIR_E2G/e2guardian.conf.default
1293 richard 1419
# French deny HTML page
3197 rexy 1420
	$SED "s?^language =.*?language = 'french'?g" $DIR_E2G/e2guardian.conf
3200 rexy 1421
# Listen & loop prevention on loopback
3197 rexy 1422
	$SED "s?^#checkip = 127.0.0.1.*?checkip = 127.0.0.1?g" $DIR_E2G/e2guardian.conf
3238 rexy 1423
# 2 filtergroups (8080 & 8081)
3197 rexy 1424
	$SED "s?^#filtergroups =.*?filtergroups = 2?g" $DIR_E2G/e2guardian.conf
3193 rexy 1425
# Listen on LAN only
3197 rexy 1426
	$SED "s?^#filterip =.*?filterip = $PRIVATE_IP?g" $DIR_E2G/e2guardian.conf
3193 rexy 1427
# Listen on 8080 (group1 : BL users on HTTP)
3238 rexy 1428
	$SED "s?^#filterports = 8080:8081.*?filterports = 8080:8081?g" $DIR_E2G/e2guardian.conf
3193 rexy 1429
# Listen on 8081 (group2 : previously AV users --> to be redefine)
3197 rexy 1430
#	$SED "/^filterip = $PRIVATE_IP/a filterip = $PRIVATE_IP" $DIR_E2G/e2guardian.conf
1431
	$SED "s?^#filterports = 8081.*?filterports = 8081?g" $DIR_E2G/e2guardian.conf
3193 rexy 1432
# for now we don't listen transparently on 8443 (HTTPS) (only in future version)
3197 rexy 1433
	$SED "s?^transparenthttpsport =.*?#transparenthttpsport = 8443?g" $DIR_E2G/e2guardian.conf
1293 richard 1434
# Don't log
3197 rexy 1435
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_E2G/e2guardian.conf
2775 rexy 1436
# Disable HTML content control (weighted & banned)
3197 rexy 1437
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_E2G/e2guardian.conf
2840 rexy 1438
# Enable authport plugin
3197 rexy 1439
	$SED "s?^#authplugin = '/etc/e2guardian/authplugins/port.conf'?authplugin = '/etc/e2guardian/authplugins/port.conf'?g" $DIR_E2G/e2guardian.conf
1440
	$SED "s?^#mapauthtoports =.*?mapauthtoports = off?g" $DIR_E2G/e2guardian.conf
3193 rexy 1441
	# !!! Set Max RAM cache to 10Mb (for antimalware/EDR)
3197 rexy 1442
	#$SED "s?^maxcontentramcachescansize =.*?maxcontentramcachescansize = 10240?g" $DIR_E2G/e2guardian.conf
3193 rexy 1443
	# !!! Set Max file size cache to 20Mb (for antimalware/EDR)
3197 rexy 1444
	#$SED "s?^maxcontentfilecachescansize =.*?maxcontentfilecachescansize = 20480?g" $DIR_E2G/e2guardian.conf
2841 rexy 1445
 
2867 rexy 1446
# copy & adapt HTML templates
2866 rexy 1447
	cp $DIR_CONF/alcasar-e2g-fr.html /usr/share/e2guardian/languages/french/alcasar-e2g.html
1448
	cp $DIR_CONF/alcasar-e2g-en.html /usr/share/e2guardian/languages/ukenglish/alcasar-e2g.html
2867 rexy 1449
	$SED "s?\/\/[a-z.]*\/?\/\/$HOSTNAME.$DOMAIN\/?g" /usr/share/e2guardian/languages/french/alcasar-e2g.html
1450
	$SED "s?\/\/[a-z.]*\/?\/\/$HOSTNAME.$DOMAIN\/?g" /usr/share/e2guardian/languages/ukenglish/alcasar-e2g.html
2866 rexy 1451
 
3193 rexy 1452
###### ALCASAR filtering for group1 (blacklisted_users) ####
1453
# Adapt group1 conf file
3197 rexy 1454
	[ -e $DIR_E2G/e2guardianf1.conf.default ] || cp $DIR_E2G/e2guardianf1.conf $DIR_E2G/e2guardianf1.conf.default
3200 rexy 1455
	$SED "s?^#reportinglevel =.*?reportinglevel = 3?g" $DIR_E2G/e2guardianf1.conf
1456
	$SED "s?^#groupname =.*?groupname = 'blacklisted_users'?g" $DIR_E2G/e2guardianf1.conf
1457
	$SED "s?^#htmltemplate =.*?htmltemplate = 'alcasar-e2g.html'?g" $DIR_E2G/e2guardianf1.conf
1458
	$SED "s?^\.Define LISTDIR.*?\.Define LISTDIR <$DIR_E2G/lists/group1>?g" $DIR_E2G/e2guardianf1.conf
3197 rexy 1459
	DIR_E2G_GROUP1="$DIR_E2G/lists/group1"
1460
	cp -r $DIR_E2G/lists/example.group $DIR_E2G_GROUP1
3243 rexy 1461
 
2840 rexy 1462
# RAZ bannedphraselist
3197 rexy 1463
	$SED "s?^[^#]?#&?g" $DIR_E2G_GROUP1/bannedphraselist # (comment what is not)
2519 rexy 1464
# Disable URL control with regex
3197 rexy 1465
	$SED "s?^[^#]?#&?g" $DIR_E2G_GROUP1/bannedregexpurllist # (comment what is not)
2758 rexy 1466
# Dont filtering files by extension or mime-type (empty list)
3197 rexy 1467
	> $DIR_E2G_GROUP1/bannedextensionlist
1468
	> $DIR_E2G_GROUP1/bannedmimetypelist
2758 rexy 1469
# Creation of ALCASAR banned site list
3197 rexy 1470
	cat <<EOF > $DIR_E2G_GROUP1/greysitelist
2775 rexy 1471
# E2guardian filter config for ALCASAR
1472
# In ALCASAR E2guardian filters only URLs (domains are filtered with unbound)
2758 rexy 1473
# block all SSL and CONNECT tunnels
1474
**s
1475
# block all SSL and CONNECT tunnels specified only as an IP
1476
*ips
1477
# block all sites specified only by an IP
1478
*ip
1479
EOF
3195 rexy 1480
# Creation of file for banned URLs (filled later with Toulouse BL --> see BL function)
3197 rexy 1481
	cat <<EOF > $DIR_E2G_GROUP1/bannedurllist
3193 rexy 1482
# E2guardian URL filter config for ALCASAR
2758 rexy 1483
EOF
3195 rexy 1484
# Creation of files for rehabilited domains
3197 rexy 1485
	> $DIR_E2G_GROUP1/exceptionsitelist
3195 rexy 1486
# Creation of files for rehabilited IP
3243 rexy 1487
	[ -e $DIR_E2G_GROUP1/exceptionsiteiplist.default ] || mv $DIR_E2G_GROUP1/exceptionsiteiplist $DIR_E2G_GROUP1/exceptionsiteiplist.default
1488
	> $DIR_E2G_GROUP1/exceptionsiteiplist
3193 rexy 1489
# Create & adapt group2 conf file (av + av_wl)
3197 rexy 1490
	cp $DIR_E2G/e2guardianf1.conf.default $DIR_E2G/e2guardianf2.conf
1491
	$SED "s?^#reportinglevel =.*?reportinglevel = 3?g" $DIR_E2G/e2guardianf2.conf
1492
	$SED "s?^#groupname =.*?groupname = 'antimalware + whitelested users'?g" $DIR_E2G/e2guardianf2.conf
2775 rexy 1493
# create log folder
3193 rexy 1494
	mkdir -p /var/log/e2guardian
2775 rexy 1495
	chown -R e2guardian /etc/e2guardian /var/log/e2guardian
2724 rexy 1496
} # End of e2guardian()
1 root 1497
 
2724 rexy 1498
##############################################################
2990 rexy 1499
##                        "ulogd"                           ##
2724 rexy 1500
## - Ulog config for multi-log files                        ##
1501
##############################################################
1502
ulogd()
476 richard 1503
{
1504
# Three instances of ulogd (three different logfiles)
1505
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
478 richard 1506
	nl=1
1358 richard 1507
	for log_type in traceability ssh ext-access
478 richard 1508
	do
2937 rexy 1509
		cp -f /lib/systemd/system/ulogd.service /etc/systemd/system/ulogd-$log_type.service
1369 richard 1510
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1375 richard 1511
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1704 richard 1512
		$SED "s?^group=.*?group=$nl?g" /etc/ulogd-$log_type.conf
478 richard 1513
		cat << EOF >> /etc/ulogd-$log_type.conf
1452 richard 1514
[emu1]
478 richard 1515
file="/var/log/firewall/$log_type.log"
1516
sync=1
1517
EOF
2938 rexy 1518
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /etc/systemd/system/ulogd-$log_type.service
478 richard 1519
		nl=`expr $nl + 1`
1520
	done
476 richard 1521
	chown -R root:apache /var/log/firewall
1522
	chmod 750 /var/log/firewall
1523
	chmod 640 /var/log/firewall/*
2724 rexy 1524
}  # End of ulogd()
476 richard 1525
 
1159 crox53 1526
##########################################################
2990 rexy 1527
##                     "nfsen"                          ##
2771 rexy 1528
## - configure NetFlow collector (nfcapd)               ##
1529
## - configure NetFlow grapher (nfsen-ng)               ##
1159 crox53 1530
##########################################################
1389 richard 1531
nfsen()
1 root 1532
{
2772 rexy 1533
	groupadd -f nfcapd
2868 rexy 1534
	id -u nfcapd >/dev/null 2>&1 || useradd -r -g nfcapd -s /bin/false -c "system user for nfcapd" nfcapd
2771 rexy 1535
# nfcapd unit for systemd
2937 rexy 1536
	cat << EOF > /etc/systemd/system/nfcapd.service
1372 richard 1537
#  This file is part of systemd.
1538
#
1539
#  systemd is free software; you can redistribute it and/or modify it
1540
#  under the terms of the GNU General Public License as published by
1541
#  the Free Software Foundation; either version 2 of the License, or
1542
#  (at your option) any later version.
1543
 
2771 rexy 1544
# This unit launches nfcapd (a Netflow collector).
1372 richard 1545
[Unit]
2771 rexy 1546
Description=Netflow Capture Daemon
1547
After=network-online.target iptables.service
1372 richard 1548
 
1549
[Service]
3079 rexy 1550
Type=simple
3242 rexy 1551
ExecStartPre=/bin/mkdir -p /run/nfcapd
1552
ExecStartPre=/bin/chown nfcapd:nfcapd /run/nfcapd
2771 rexy 1553
PIDFile=/run/nfcapd/nfcapd.pid
3240 rexy 1554
ExecStart=/usr/bin/nfcapd -D -b 127.0.0.1 -p 2055 -u nfcapd -g nfcapd -B 200000 -t 300 -S 1 -z -P /run/nfcapd/nfcapd.pid -I alcasar_netflow -w /var/log/nfsen/profiles-data/live/alcasar_netflow
2771 rexy 1555
ExecReload=/bin/kill -HUP $MAINPID
1372 richard 1556
 
1557
[Install]
1558
WantedBy=multi-user.target
1559
EOF
2825 rexy 1560
    [ -d /var/log/nfsen/profiles-data/live/alcasar_netflow ] || mkdir -p /var/log/nfsen/profiles-data/live/alcasar_netflow
3240 rexy 1561
    touch /var/log/nfsen/profiles-data/live/alcasar_netflow/.nfstat
3242 rexy 1562
    chown -R nfcapd:nfcapd /var/log/nfsen
3240 rexy 1563
# nfsen-ng
3248 rexy 1564
# initializing and populating the RRD database (see if it should be usefull)
1565
#su - apache --shell=/bin/bash -c '/var/www/html/acc/manager/nfsen/backend/cli.php -f -p -ps import'
1566
# nfsen-ng unit for systemd
1567
	cat << EOF > /etc/systemd/system/nfsen-ng.service
1568
#  This file is part of systemd.
1569
#
1570
#  systemd is free software; you can redistribute it and/or modify it
1571
#  under the terms of the GNU General Public License as published by
1572
#  the Free Software Foundation; either version 2 of the License, or
1573
#  (at your option) any later version.
3240 rexy 1574
 
3248 rexy 1575
# This unit launches nfsen-ng (a Netflow grapher).
1576
[Unit]
1577
Description=nfsen-ng daemon (netflow grapher)
1578
After=network-online.target
1579
 
1580
[Service]
1581
Type=simple
1582
User=apache
1583
Group=apache
1584
PIDFile=/var/www/html/acc/manager/nfsen/backend/nfsen-ng.pid
1585
WorkingDirectory=/var/www/html/acc/manager/nfsen/backend/
1586
ExecStart=/usr/bin/php /var/www/html/acc/manager/nfsen/backend/listen.php
1587
 
1588
[Install]
1589
WantedBy=multi-user.target
1590
EOF
1591
 
2724 rexy 1592
} # End of nfsen()
1 root 1593
 
2552 rexy 1594
###########################################################
2990 rexy 1595
##                       "vnstat"                        ##
2809 rexy 1596
## - Initialization of vnstat and vnstat-dashboard       ##
2552 rexy 1597
###########################################################
2724 rexy 1598
vnstat()
1541 richard 1599
{
2990 rexy 1600
# vnstat
2933 rexy 1601
	[ -e /etc/vnstat.conf.default ] || cp /etc/vnstat.conf /etc/vnstat.conf.default
2589 rexy 1602
	$SED "s?^Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
2688 lucas.echa 1603
	$SED "s?^DatabaseDir.*?DatabaseDir /var/log/vnstat?g" /etc/vnstat.conf
2933 rexy 1604
	$SED "s?^MaxBandwidth.*?MaxBandwidth 10000?g" /etc/vnstat.conf
2990 rexy 1605
# vnstat-dashboard
2933 rexy 1606
	$SED "s?^\$thisInterface.*?\$thisInterface = \"$EXTIF\";?" $DIR_ACC/manager/vnstat/index.php
2937 rexy 1607
	cp /lib/systemd/system/vnstat.service /etc/systemd/system/vnstat.service
3077 rexy 1608
	$SED "s?^ReadWritePaths=.*?ReadWritePaths=/var/log?g" /etc/systemd/system/vnstat.service
2724 rexy 1609
} # End of vnstat()
2281 tom.houday 1610
 
2724 rexy 1611
#########################################################
2990 rexy 1612
##                     "unbound"                       ##
2724 rexy 1613
## - create the conf files for 4 unbound services      ##
1614
## - create the systemd files for 4 unbound services   ##
1615
#########################################################
2688 lucas.echa 1616
unbound ()
1617
{
1618
	[ -d /etc/unbound/conf.d ] || mkdir -p /etc/unbound/conf.d
1619
	[ -d /etc/unbound/conf.d/common ] || mkdir /etc/unbound/conf.d/common
1620
	[ -d /etc/unbound/conf.d/common/local-forward ] || mkdir /etc/unbound/conf.d/common/local-forward
1621
	[ -d /etc/unbound/conf.d/common/local-dns ] || mkdir /etc/unbound/conf.d/common/local-dns
1622
	[ -d /etc/unbound/conf.d/forward ] || mkdir /etc/unbound/conf.d/forward
1623
	[ -d /etc/unbound/conf.d/blacklist ] || mkdir /etc/unbound/conf.d/blacklist
1624
	[ -d /etc/unbound/conf.d/whitelist ] || mkdir /etc/unbound/conf.d/whitelist
1625
	[ -d /etc/unbound/conf.d/blackhole ] || mkdir /etc/unbound/conf.d/blackhole
2833 rexy 1626
	[ -d /var/log/unbound ] || mkdir /var/log/unbound
1627
	chown unbound:unbound /var/log/unbound
2688 lucas.echa 1628
	[ -e /etc/unbound/unbound.conf.default ] || cp /etc/unbound/unbound.conf /etc/unbound/unbound.conf.default
1629
 
2724 rexy 1630
# Forward zone configuration file for all unbound dns servers
2688 lucas.echa 1631
	cat << EOF > /etc/unbound/conf.d/common/forward-zone.conf
1632
forward-zone:
1633
	name: "."
1634
	forward-addr: $DNS1
1635
	forward-addr: $DNS2
1472 richard 1636
EOF
1637
 
2724 rexy 1638
# Custom configuration file for manual DNS configuration
2688 lucas.echa 1639
	cat << EOF > /etc/unbound/conf.d/common/local-forward/custom.conf
1640
## Ajouter un bloc pour chaque nom de domaine géré par un autre seveur DNS
1641
## Add one block for each domain name managed by an other DNS server
1642
##
1643
## Example:
1644
##
1645
## server:
1646
##     local-zone: "<your_domain>." transparent
1647
## forward-zone:
1648
##     name: "<your_domain>."
1649
##     forward-addr: <@IP_domain_server>
1650
##
2558 rexy 1651
EOF
1652
 
2724 rexy 1653
# Configuration file of ALCASAR main domains for $INTIF
2688 lucas.echa 1654
	cat << EOF > /etc/unbound/conf.d/common/local-dns/${INTIF}.conf
1655
server:
1656
	local-data: "$HOSTNAME.$DOMAIN A $PRIVATE_IP"
2831 rexy 1657
	local-data-ptr: "$PRIVATE_IP $HOSTNAME.$DOMAIN"
2688 lucas.echa 1658
EOF
1659
 
2724 rexy 1660
# Configuration file for lo of forward unbound
2688 lucas.echa 1661
	cat << EOF > /etc/unbound/conf.d/forward/iface.lo.conf
1662
server:
1663
	interface: 127.0.0.1@53
1664
	access-control-view: 127.0.0.1/8 lo
1665
view:
1666
	name: "lo"
2864 rexy 1667
	local-data: "$HOSTNAME A 127.0.0.1"
2688 lucas.echa 1668
	local-data: "$HOSTNAME.$DOMAIN A 127.0.0.1"
2864 rexy 1669
	local-data-ptr: "127.0.0.1 $HOSTNAME.$DOMAIN"
2688 lucas.echa 1670
	view-first: yes
1671
EOF
1672
 
2724 rexy 1673
# Configuration file for $INTIF of forward unbound
2688 lucas.echa 1674
	cat << EOF > /etc/unbound/conf.d/forward/iface.${INTIF}.conf
1675
server:
1676
	interface: ${PRIVATE_IP}@53
1677
	access-control-view: $PRIVATE_NETWORK_MASK $INTIF
1678
view:
1679
	name: "$INTIF"
1680
	view-first: yes
1681
EOF
1682
 
2831 rexy 1683
# Configuration file for main unbound
2688 lucas.echa 1684
	cat << EOF > /etc/unbound/unbound.conf
1685
server:
1686
	verbosity: 1
1687
	hide-version: yes
1688
	hide-identity: yes
1689
	do-ip6: no
1690
	include: /etc/unbound/conf.d/common/forward-zone.conf
1691
	include: /etc/unbound/conf.d/common/local-forward/*
1692
	include: /etc/unbound/conf.d/common/local-dns/*
1693
	include: /etc/unbound/conf.d/forward/*
1694
EOF
1695
 
2724 rexy 1696
# Configuration file for $INTIF of blacklist unbound
2688 lucas.echa 1697
	cat << EOF > /etc/unbound/conf.d/blacklist/iface.${INTIF}.conf
1698
server:
1699
	interface: ${PRIVATE_IP}@54
1700
	access-control: $PRIVATE_IP_MASK allow
1701
	access-control-tag: $PRIVATE_IP_MASK "blacklist"
1702
	access-control-tag-action: $PRIVATE_IP_MASK "blacklist" redirect
1703
	access-control-tag-data: $PRIVATE_IP_MASK "blacklist" "A $PRIVATE_IP"
1704
EOF
1705
 
2724 rexy 1706
# Configuration file for blacklist unbound
2688 lucas.echa 1707
	cat << EOF > /etc/unbound/unbound-blacklist.conf
1708
server:
1709
	verbosity: 1
1710
	hide-version: yes
1711
	hide-identity: yes
1712
	do-ip6: no
1713
	logfile: "/var/log/unbound/unbound-blacklist.log"
1714
	chroot: ""
1715
	define-tag: "blacklist"
1716
	log-local-actions: yes
1717
	include: /etc/unbound/conf.d/common/forward-zone.conf
1718
	include: /etc/unbound/conf.d/common/local-forward/*
1719
	include: /etc/unbound/conf.d/common/local-dns/*
1720
	include: /etc/unbound/conf.d/blacklist/*
1721
	include: /usr/local/share/unbound-bl-enabled/*
1722
EOF
1723
 
2724 rexy 1724
# Configuration file for $INTIF of whitelist unbound
2688 lucas.echa 1725
	cat << EOF > /etc/unbound/conf.d/whitelist/iface.${INTIF}.conf
1726
server:
1727
	interface: ${PRIVATE_IP}@55
1728
	access-control: $PRIVATE_IP_MASK allow
1729
	access-control-tag: $PRIVATE_IP_MASK "whitelist"
1730
	access-control-tag-action: $PRIVATE_IP_MASK "whitelist" redirect
1731
	access-control-tag-data: $PRIVATE_IP_MASK "whitelist" "A $PRIVATE_IP"
1732
EOF
1733
 
2724 rexy 1734
# Configuration file for whitelist unbound
2688 lucas.echa 1735
	cat << EOF > /etc/unbound/unbound-whitelist.conf
1736
server:
3099 rexy 1737
	module-config: "ipset validator iterator"
2688 lucas.echa 1738
	verbosity: 1
1739
	hide-version: yes
1740
	hide-identity: yes
1741
	do-ip6: no
1742
	do-not-query-localhost: no
1743
	define-tag: "whitelist"
1744
	local-zone: "." transparent
1745
	local-zone-tag: "." "whitelist"
3099 rexy 1746
	include: /etc/unbound/conf.d/common/forward-zone.conf
2861 rexy 1747
	include: /etc/unbound/conf.d/common/local-forward/*
1748
	include: /etc/unbound/conf.d/common/local-dns/*
1749
	include: /etc/unbound/conf.d/whitelist/*
2688 lucas.echa 1750
	include: /usr/local/share/unbound-wl-enabled/*
3099 rexy 1751
	username: ""
1752
ipset:
1753
	name-v4: "wl_ip_allowed"
2688 lucas.echa 1754
EOF
1755
 
2724 rexy 1756
# Configuration file for $INTIF of blackhole unbound
2688 lucas.echa 1757
	cat << EOF > /etc/unbound/conf.d/blackhole/iface.${INTIF}.conf
1758
server:
1759
	interface: ${PRIVATE_IP}@56
1760
	access-control-view: $PRIVATE_NETWORK_MASK $INTIF
1761
view:
1762
	name: "$INTIF"
1763
	local-zone: "." redirect
1764
	local-data: ". A $PRIVATE_IP"
1765
EOF
1766
 
2724 rexy 1767
# Configuration file for blackhole unbound
2688 lucas.echa 1768
	cat << EOF > /etc/unbound/unbound-blackhole.conf
1769
server:
1770
	verbosity: 1
1771
	hide-version: yes
1772
	hide-identity: yes
1773
	do-ip6: no
2861 rexy 1774
	include: /etc/unbound/conf.d/common/local-forward/*
1775
	include: /etc/unbound/conf.d/common/local-dns/*
2688 lucas.echa 1776
	include: /etc/unbound/conf.d/blackhole/*
1777
EOF
3257 rexy 1778
 
1779
# Add the safesearch conf file to blacklist & whitelist
1780
	cp $DIR_CONF/safe-searching /etc/unbound/conf.d/blacklist/
1781
	cp $DIR_CONF/safe-searching /etc/unbound/conf.d/whitelist/
1782
 
1783
# Adapt systemd unit for the 4 instances of unbound
2937 rexy 1784
	cp /lib/systemd/system/unbound.service /etc/systemd/system/unbound.service
1785
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/unbound -d -c /etc/unbound/unbound.conf?g" /etc/systemd/system/unbound.service
1786
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /etc/systemd/system/unbound.service
3177 rexy 1787
	$SED "/^PIDFile=/d" /etc/systemd/system/unbound.service
2688 lucas.echa 1788
	for list in blacklist blackhole whitelist
1474 richard 1789
	do
3177 rexy 1790
		cp -f /etc/systemd/system/unbound.service /etc/systemd/system/unbound-$list.service
2937 rexy 1791
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/unbound -d -c /etc/unbound/unbound-$list.conf?g" /etc/systemd/system/unbound-$list.service
1474 richard 1792
	done
2724 rexy 1793
} # End of unbound()
2688 lucas.echa 1794
 
2689 lucas.echa 1795
##################################################
2990 rexy 1796
##                   "dhcpd"                    ##
2689 lucas.echa 1797
##################################################
2724 rexy 1798
dhcpd()
2689 lucas.echa 1799
{
1800
	[ -e /etc/dhcpd.conf.default ] || cp /etc/dhcpd.conf /etc/dhcpd.conf.default
1801
	cat <<EOF > /etc/dhcpd.conf
1802
ddns-update-style none;
1803
subnet $PRIVATE_NETWORK netmask $PRIVATE_NETMASK {
1804
	option routers $PRIVATE_IP;
1805
	option subnet-mask $PRIVATE_NETMASK;
1806
	option domain-name-servers $PRIVATE_IP;
1807
	range dynamic-bootp $PRIVATE_SECOND_IP $PRIVATE_LAST_IP;
1808
	default-lease-time 21600;
1809
	max-lease-time 43200;
1810
}
1811
EOF
3238 rexy 1812
chown -R dhcpd:dhcpd /var/lib/dhcpd
2724 rexy 1813
} # End of dhcpd()
2689 lucas.echa 1814
 
2552 rexy 1815
##########################################################
2990 rexy 1816
##                         "BL"                         ##
2769 rexy 1817
## - copy & adapt Toulouse BL to ALCASAR architecture   ##
2688 lucas.echa 1818
##     - domain names for unbound-bl & unbound-wl       ##
2552 rexy 1819
##     - URLs for E²guardian                            ##
1820
##     - IPs for NetFilter                              ##
2769 rexy 1821
## - copy additional BLs (TOR + Ultrasurf + C&C)        ##
2552 rexy 1822
##########################################################
2724 rexy 1823
BL()
308 richard 1824
{
2990 rexy 1825
# copy the Toulouse university BL in order to be adapted to ALCASAR architecture (alcasar-bl.sh -adapt)
3197 rexy 1826
	rm -rf $DIR_E2G/lists/blacklists
1930 richard 1827
	mkdir -p /tmp/blacklists
1938 richard 1828
	cp $DIR_BLACKLIST/blacklists.tar.gz /tmp/blacklists/
2769 rexy 1829
# creation of the additional BL and WL categorie named "ossi" (for domain names & ip only)
3197 rexy 1830
	mkdir -p $DIR_E2G/lists/blacklists/ossi-bl
1831
	touch $DIR_E2G/lists/blacklists/ossi-bl/domains
1957 richard 1832
	echo "ossi-bl" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
3197 rexy 1833
	mkdir -p $DIR_E2G/lists/blacklists/ossi-wl
1834
	touch $DIR_E2G/lists/blacklists/ossi-wl/domains
1957 richard 1835
	echo "ossi-wl" >> $DIR_DEST_ETC/alcasar-wl-categories-enabled
2769 rexy 1836
# add additional BL files
2770 rexy 1837
	for x in $(ls $DIR_BLACKLIST | grep -v "^blacklists")
1957 richard 1838
	do
3197 rexy 1839
		mkdir $DIR_E2G/lists/blacklists/ossi-bl-$x
1840
		cp $DIR_BLACKLIST/$x  $DIR_E2G/lists/blacklists/ossi-bl-$x/domains
1957 richard 1841
		echo "ossi-bl-$x" >> $DIR_DEST_ETC/alcasar-bl-categories-enabled
1842
	done
3197 rexy 1843
	chown -R e2guardian:apache $DIR_E2G
1957 richard 1844
	chown -R root:apache $DIR_DEST_SHARE
3197 rexy 1845
	chmod -R g+rw $DIR_E2G $DIR_DEST_SHARE
1927 richard 1846
# adapt the Toulouse BL to ALCASAR architecture
1957 richard 1847
	$DIR_DEST_BIN/alcasar-bl.sh --adapt
1925 richard 1848
# enable the default categories
1957 richard 1849
	$DIR_DEST_BIN/alcasar-bl.sh --cat_choice
2560 rexy 1850
	rm -rf /tmp/blacklists
2724 rexy 1851
} # End of BL()
219 jeremy 1852
 
2552 rexy 1853
#######################################################
2990 rexy 1854
##                    "cron"                         ##
2552 rexy 1855
## - write all cron & anacron files                  ##
1856
#######################################################
2724 rexy 1857
cron()
1 root 1858
{
2640 rexy 1859
# 'crontab' with standard cron at midnight instead of 4:0 am (default)
1 root 1860
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1861
	cat <<EOF > /etc/crontab
1828 richard 1862
SHELL=/usr/bin/bash
2640 rexy 1863
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1 root 1864
MAILTO=root
1865
HOME=/
1866
 
1867
# run-parts
1868
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1869
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1870
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1871
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1872
EOF
1873
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1874
	cat <<EOF >> /etc/anacrontab
3269 rexy 1875
7	8	cron.MariaDBDump	nice /etc/cron.d/alcasar-mariadb
2454 tom.houday 1876
7	10	cron.logExport		nice /etc/cron.d/alcasar-archive
1 root 1877
EOF
3269 rexy 1878
	cat <<EOF > /etc/cron.d/alcasar-mariadb
2640 rexy 1879
# Verify, repair and export users database (every monday at 4:45 am)
3269 rexy 1880
45 4 * * 1 root $DIR_DEST_BIN/alcasar-mariadb.sh --dump
2640 rexy 1881
# Remove users whose expiration date is exceeded for more more than 7 days (every Monday at 4:40 am)
3269 rexy 1882
40 4 * * * root $DIR_DEST_BIN/alcasar-mariadb.sh --expire_user 2>&1 >/dev/null
1 root 1883
EOF
952 franck 1884
	cat <<EOF > /etc/cron.d/alcasar-archive
2640 rexy 1885
# Archiving logs (traceability & users database) (every Monday at 5:35 am)
952 franck 1886
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1887
EOF
2454 tom.houday 1888
	cat <<EOF > /etc/cron.d/alcasar-ticket-clean
2640 rexy 1889
# Remove password files (created when importing users by CSV files) and user's PDF voucher (every hours at 30')
1566 richard 1890
30 * * * *  root $DIR_DEST_BIN/alcasar-ticket-clean.sh
168 franck 1891
EOF
2454 tom.houday 1892
	cat <<EOF > /etc/cron.d/alcasar-distrib-updates
2967 rexy 1893
# Update the system and reboot if needed (everyday at 3:30 am)
1894
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1 ; /usr/local/bin/alcasar-daemon.sh -after-update
722 franck 1895
EOF
2454 tom.houday 1896
	cat <<EOF > /etc/cron.d/alcasar-connections-stats
1808 richard 1897
# Connection stats update (accounting). These Perl scripts are from "dialup_admin" (cf. wiki.freeradius.org/Dialup_admin).
2640 rexy 1898
# 'alcasar-tot_stats' : aggregate the daily connections of users and write it in the table 'totacct' (everyday at 1:01 pm)
1899
# 'alcasar-monthly_tot_stat' : aggregate the monthly connections of users and write it in table 'mtotacct' (everyday at 1h05 pm)
1900
# 'alcasar-truncate_raddact' : remove the user' session log older than 365 days (applying French law : "LCEN") (every month, the first at 01:10 pm)
1901
# 'alcasar-clean_radacct' : close the sessions openned for more than 30 days (every month, the first at 01:15 pm)
1902
# 'alcasar-activity_report.sh' : generate an activity report in PDF (every sunday at 5:35 pm)
1808 richard 1903
1 1 * * * root $DIR_DEST_BIN/alcasar-tot_stats > /dev/null 2>&1
1904
5 1 * * * root $DIR_DEST_BIN/alcasar-monthly_tot_stats > /dev/null 2>&1
1905
10 1 1 * * root $DIR_DEST_BIN/alcasar-truncate_radacct > /dev/null 2>&1
1906
15 1 1 * * root $DIR_DEST_BIN/alcasar-clean_radacct > /dev/null 2>&1
2009 raphael.pi 1907
35 5 * * 0 root $DIR_DEST_BIN/alcasar-activity_report.sh > /dev/null 2>&1
1 root 1908
EOF
2454 tom.houday 1909
	cat <<EOF > /etc/cron.d/alcasar-watchdog
2640 rexy 1910
# 'alcasar-watchdog.sh' : run the "watchdog" (every 10')
3099 rexy 1911
# 'alcasar-flush_ipset_wl.sh' : empty the IPSET of the whitelisted IP loaded dynamically with unbound-whitelist hook (every sunday at 0:05 am)
2886 rexy 1912
# 'alcasar-watchdog.sh --disconnect-permanent-users' : disconnect users with attribute "Alcasar-Status-Page-Must-Stay-Open" (daily --> see "cron.daily")
2640 rexy 1913
# 'alcasar-watchdog-hl.sh' : (optionnaly) remove the IP 0.0.0.0 from chilli cache memory
2395 tom.houday 1914
*/10 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1905 raphael.pi 1915
 
2886 rexy 1916
@daily root $DIR_DEST_BIN/alcasar-watchdog.sh --disconnect-permanent-users > /dev/null 2>&1
2228 franck 1917
#* * * * * root $DIR_DEST_BIN/alcasar-watchdog-hl.sh > /dev/null 2>&1
1 root 1918
EOF
2454 tom.houday 1919
	cat <<EOF > /etc/cron.d/alcasar-daemon-watchdog
2886 rexy 1920
# start dead daemons (after boot process and every 20')
1851 franck 1921
@reboot root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
2886 rexy 1922
*/20 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
808 franck 1923
EOF
2454 tom.houday 1924
	cat <<EOF > /etc/cron.d/alcasar-rsync-bl
2769 rexy 1925
# Automatic update the BL (every 12 hours). The enabled categories are listed in '/usr/local/etc/update_cat.conf' (no sync if empty).
1926
 
1874 raphael.pi 1927
EOF
2769 rexy 1928
	cat <<EOF > /etc/cron.d/alcasar-rsync-ossi_bl
1929
# Automatic update the OSSI BLs (every 12 hours) by running the custom update scripts specified in '/usr/local/etc/update_ossi_cat.conf'.
1930
 
1931
EOF
2304 tom.houday 1932
	cat <<EOF > /etc/cron.d/alcasar-letsencrypt
2640 rexy 1933
# Automatic renew the Let's Encrypt certificate (daily --> see "cron.daily")
2304 tom.houday 1934
@daily root $DIR_DEST_BIN/alcasar-letsencrypt.sh --cron > /dev/null 2>&1
1935
EOF
2771 rexy 1936
	cat <<EOF > /etc/cron.d/alcasar-nfcapd-expire
2886 rexy 1937
# Remove netflow files older than one year (daily --> see "cron.daily")
2825 rexy 1938
@daily root /usr/bin/nfexpire -e /var/log/nfsen/profiles-data/live/alcasar_netflow -t 365d
2771 rexy 1939
EOF
1808 richard 1940
# removing the users crons
522 richard 1941
	rm -f /var/spool/cron/*
2724 rexy 1942
} # End of cron()
1 root 1943
 
2867 rexy 1944
########################################################################
2990 rexy 1945
##                              "Fail2Ban"                            ##
2867 rexy 1946
##- Adapt conf file to ALCASAR                                        ##
3231 rexy 1947
##- Secure items : SSH, intercept & ACC brute-Force + evasive + pwd   ##
2867 rexy 1948
########################################################################
1163 crox53 1949
fail2ban()
1950
{
2868 rexy 1951
# adapt fail2ban to Mageia (fedora like) & ALCASAR behaviour
2990 rexy 1952
	[ -e /etc/fail2ban/jail.conf.default ] || cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.conf.default
3191 rexy 1953
	$SED "s?^before =.*?before = paths-mageia.conf?g" /etc/fail2ban/jail.conf
2867 rexy 1954
 
1955
# add 5 jails and their filters
3231 rexy 1956
## sshd : Ban after 5 failed attempts (ie. brute-force). This "jail" uses the default "sshd" f2b filter.
2990 rexy 1957
	cat << EOF > /etc/fail2ban/jail.d/01-alcasar_sshd.conf
2867 rexy 1958
[sshd]
1959
enabled = true
1960
#enabled  = false
3231 rexy 1961
maxretry = 5
2868 rexy 1962
bantime = 3m
3231 rexy 1963
findtime = 3m
2867 rexy 1964
EOF
1965
 
3231 rexy 1966
## alcasar_httpd-auth : Ban after 3 failed attempts on ACC. This "jail" uses the default "apache-auth" f2b filter.
1967
	cat << EOF > /etc/fail2ban/jail.d/02-alcasar_httpd-auth.conf
1968
[apache-auth]
1969
enabled = true
2867 rexy 1970
#enabled  = false
3231 rexy 1971
maxretry = 3
1972
bantime = 3m
1973
findtime = 3m
1974
EOF
2867 rexy 1975
 
1976
## mod-evasive : Ban after 3 failed retrieve page attempts (ie : unknown page)
2990 rexy 1977
	cat << EOF > /etc/fail2ban/jail.d/03-alcasar_mod-evasive.conf
2867 rexy 1978
[alcasar_mod-evasive]
3231 rexy 1979
enabled = true
1980
#enabled = false
2867 rexy 1981
backend = auto
1982
filter = alcasar_mod-evasive
1983
action = iptables-allports[name=alcasar_mod-evasive]
3231 rexy 1984
logpath = /var/log/httpd/access_log
2867 rexy 1985
maxretry = 3
2868 rexy 1986
bantime = 3m
1987
findtime = 3m
2867 rexy 1988
EOF
2990 rexy 1989
	cat << EOF > /etc/fail2ban/filter.d/alcasar_mod-evasive.conf
2867 rexy 1990
[Definition]
1991
failregex =  <HOST> .+\] "[^"]+" 403
1992
ignoreregex =
1993
EOF
1994
 
1995
### alcasar_intercept : ban after 5 failed user login attemps on intercept.php
2990 rexy 1996
	cat << EOF > /etc/fail2ban/jail.d/04-alcasar_intercept.conf
2867 rexy 1997
[alcasar_intercept]
1998
enabled = true
1999
#enabled = false
2000
backend = auto
2001
filter = alcasar_intercept
2002
action = iptables-allports[name=alcasar_intercept]
3231 rexy 2003
logpath = /var/log/httpd/access_log
2867 rexy 2004
maxretry = 5
2868 rexy 2005
bantime = 3m
2006
findtime = 3m
2007
EOF
2990 rexy 2008
	cat << EOF > /etc/fail2ban/filter.d/alcasar_intercept.conf
2867 rexy 2009
[Definition]
2010
failregex = <HOST> .* \"GET \/intercept\.php\?res=failed\&reason=reject
2011
ignoreregex =
2012
EOF
2013
 
2014
## alcasar_change-pwd : ban after 5 failed user change password attempts
2990 rexy 2015
	cat << EOF > /etc/fail2ban/jail.d/05-alcasar_change-pwd.conf
2867 rexy 2016
[alcasar_change-pwd]
2017
enabled = true
2018
#enabled = false
2019
backend = auto
2020
filter = alcasar_change-pwd
2021
action = iptables-allports[name=alcasar_change-pwd]
3231 rexy 2022
logpath = /var/log/httpd/access_log
2867 rexy 2023
maxretry = 5
2868 rexy 2024
bantime = 3m
2025
findtime = 3m
2867 rexy 2026
EOF
2990 rexy 2027
	cat << EOF > /etc/fail2ban/filter.d/alcasar_change-pwd.conf
2867 rexy 2028
[Definition]
2029
failregex = <HOST> .* \"POST \/password\.php
2030
ignoreregex =
2031
EOF
2032
 
2840 rexy 2033
# allow reading of 2 log files (fail2ban & watchdog).
2744 rexy 2034
	[ -e /var/log/fail2ban.log ] || /usr/bin/touch /var/log/fail2ban.log
2887 rexy 2035
	[ -e $DIR_SAVE/security/watchdog.log ] || /usr/bin/touch $DIR_SAVE/security/watchdog.log
1165 crox53 2036
	chmod 644 /var/log/fail2ban.log
2887 rexy 2037
	chmod 644 $DIR_SAVE/security/watchdog.log
1418 richard 2038
	/usr/bin/touch /var/log/auth.log
1515 richard 2039
# fail2ban unit
2990 rexy 2040
	cp /lib/systemd/system/fail2ban.service /etc/systemd/system/fail2ban.service
2041
	$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /etc/systemd/system/fail2ban.service
2042
	$SED '/Type=/a\PIDFile=/run/fail2ban/fail2ban.pid' /etc/systemd/system/fail2ban.service
3230 rexy 2043
	$SED '/After=*/c After=syslog.target network.target httpd.service' /etc/systemd/system/fail2ban.service
2724 rexy 2044
} # End of fail2ban()
1163 crox53 2045
 
2990 rexy 2046
########################################################
2047
##                  "gammu_smsd"                      ##
2048
## - Creating of SMS management database              ##
2049
## - Write the gammu a gammu_smsd conf files          ##
2050
########################################################
1376 richard 2051
gammu_smsd()
2052
{
2601 tom.houday 2053
# Create 'gammu' system user
2054
	groupadd -f gammu_smsd
2868 rexy 2055
	useradd -r -g gammu_smsd -s /bin/false -c "system user for gammu_smsd" gammu_smsd
2601 tom.houday 2056
	usermod -a -G dialout gammu_smsd
2057
 
2058
# Create 'gammu' database
3269 rexy 2059
	SQL="/usr/bin/mariadb -uroot -p$dbpwd --execute"
2060
	$SQL "CREATE DATABASE IF NOT EXISTS $DB_GAMMU; GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd'; FLUSH PRIVILEGES;"
1376 richard 2061
# Add a gammu database structure
3269 rexy 2062
	/usr/bin/mariadb -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/empty-gammu-smsd-db.sql
1376 richard 2063
 
2552 rexy 2064
# Config file for the gammu_smsd daemon & gammu (ttyUSB0 as default com port)
2601 tom.houday 2065
	cat << EOF > /etc/gammurc
2552 rexy 2066
[gammu]
2067
device = /dev/ttyUSB0
2068
connection = at115200
2069
EOF
2070
 
2601 tom.houday 2071
	cat << EOF > /etc/gammu_smsd_conf
1376 richard 2072
[gammu]
2073
port = /dev/ttyUSB0
2074
connection = at115200
2075
 
2076
[smsd]
2077
PIN = 1234
2078
logfile = /var/log/gammu-smsd/gammu-smsd.log
2079
logformat = textall
2080
debuglevel = 0
2081
 
2082
service = sql
2083
driver = native_mysql
2084
user = $DB_USER
2085
password = $radiuspwd
2086
pc = localhost
2087
database = $DB_GAMMU
2088
 
2631 rexy 2089
RunOnReceive = sudo $DIR_DEST_BIN/alcasar-sms.sh --new_sms
1376 richard 2090
 
2091
StatusFrequency = 30
1380 richard 2092
;LoopSleep = 2
1376 richard 2093
 
2094
;ResetFrequency = 300
2095
;HardResetFrequency = 120
2096
 
2454 tom.houday 2097
CheckSecurity = 1
1376 richard 2098
CheckSignal = 1
2099
CheckBattery = 0
2100
EOF
2601 tom.houday 2101
	chmod 755 /etc/gammu_smsd_conf /etc/gammurc
1376 richard 2102
 
2601 tom.houday 2103
# Create the systemd unit
2937 rexy 2104
	cat << EOF > /etc/systemd/system/gammu-smsd.service
2601 tom.houday 2105
[Unit]
2106
Description=SMS daemon for Gammu
2107
Documentation=man:gammu-smsd(1)
3269 rexy 2108
After=network.target mariadb.service
1376 richard 2109
 
2601 tom.houday 2110
[Service]
2111
Type=forking
2775 rexy 2112
ExecStart=/usr/bin/gammu-smsd --config /etc/gammu_smsd_conf --user=gammu_smsd --group=gammu_smsd --pid=/run/gammu-smsd.pid --daemon
2601 tom.houday 2113
ExecReload=/bin/kill -HUP $MAINPID
2775 rexy 2114
ExecStopPost=/bin/rm -f /run/gammu-smsd.pid
2115
PIDFile=/run/gammu-smsd.pid
2601 tom.houday 2116
 
2117
[Install]
2118
WantedBy=multi-user.target
2119
EOF
2120
 
2314 richard 2121
# Log folder for gammu-smsd
2772 rexy 2122
	[ -d /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
2601 tom.houday 2123
	chmod 755 /var/log/gammu-smsd
1376 richard 2124
 
2552 rexy 2125
# Udev rule for Modeswitch (switch from "mass_storage" mode to "ttyUSB" modem) needed with some Huawei MODEM (idVendor: 12d1)
2126
# normally not needed now since modeswitch is managed by udev (see Mageia RPM)
2542 rexy 2127
#cat << EOF > /lib/udev/rules.d/66-huawei.rules
2128
#KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="$DIR_DEST_BIN/alcasar-sms.sh --mode"
2129
#EOF
2552 rexy 2130
# Udev rule for fixing the enumeration of ttyUSB port on some MODEM (when they switch randomly the order of their ports at boot time)
2131
# example : http://hintshop.ludvig.co.nz/show/persistent-names-usb-serial-devices/
2132
 
2724 rexy 2133
} # End of gammu_smsd()
1376 richard 2134
 
2990 rexy 2135
########################################################
2136
##                      "msec"                        ##
2137
## - Apply the "fileserver" security level            ##
2138
## - remove the "system request" for rebooting        ##
2139
## - Fix several file permissions                     ##
2140
########################################################
2202 richard 2141
msec()
2142
{
2143
 
2144
# Apply fileserver security level
2990 rexy 2145
	[ -e /etc/security/msec/security.conf.default ] || cp /etc/security/msec/security.conf /etc/security/msec/security.conf.default
2146
	echo "BASE_LEVEL=fileserver" > /etc/security/msec/security.conf
2202 richard 2147
 
2203 richard 2148
# Set permissions monitoring and enforcement
2202 richard 2149
cat <<EOF > /etc/security/msec/perm.local
2801 rexy 2150
/var/log/firewall/                      root.apache     750
2202 richard 2151
/var/log/firewall/*                     root.apache     640
2152
/etc/security/msec/perm.local           root.root       640
2153
/etc/security/msec/level.local          root.root       640
2154
/etc/freeradius-web                     root.apache     750
2155
/etc/freeradius-web/admin.conf          root.apache     640
2420 richard 2156
/etc/raddb/client.conf                  radius.radius   640
2157
/etc/raddb/radius.conf                  radius.radius   640
2158
/etc/raddb/mods-available/ldap          radius.apache   660
2202 richard 2159
/etc/raddb/sites-available/alcasar      radius.apache   660
2863 rexy 2160
/etc/pki/CA/                            root.apache     750 force
2161
/etc/pki/CA/*                           root.apache     640 force 
2162
/etc/pki/CA/private/                    root.root       700 force
2163
/etc/pki/CA/private/*                   root.root       600 force
2164
/etc/pki/tls/private/                   root.apache     750 force
2165
/etc/pki/tls/private/*                  root.apache     640 force
2202 richard 2166
EOF
2454 tom.houday 2167
# apply now hourly & daily checks
2990 rexy 2168
	/usr/sbin/msec
2169
	/etc/cron.weekly/msec
2202 richard 2170
 
2724 rexy 2171
} # End of msec()
2202 richard 2172
 
2173
##################################################################
2552 rexy 2174
##                   Fonction "letsencrypt"                     ##
2175
## - Install Let's Encrypt client                               ##
2176
## - Prepare Let's Encrypt ALCASAR configuration file           ##
2304 tom.houday 2177
##################################################################
2178
letsencrypt()
2179
{
3170 rexy 2180
	acmesh_installDir="/opt/acme.sh"
2181
	acmesh_confDir="/usr/local/etc/letsencrypt"
2182
	acmesh_userAgent="ALCASAR"
2990 rexy 2183
# Remove potential old installers
2586 tom.houday 2184
	rm -rf /tmp/acme.sh-*
3170 rexy 2185
	[ -d $acmesh_confDir ] && rm -rf $acmesh_confDir
2990 rexy 2186
# Extract acme.sh
2304 tom.houday 2187
	tar xzf ./conf/letsencrypt-client/acme.sh-*.tar.gz -C /tmp/
2188
	pwdInstall=$(pwd)
3169 rexy 2189
	cd /tmp/acme.sh-* || { echo "Unable to find tmp ACME directory"; exit 1; }
3170 rexy 2190
	mkdir $acmesh_confDir ; chown root:apache $acmesh_confDir ; chmod 440 $acmesh_confDir
2191
	mkdir $acmesh_confDir/{data,certs,ca} ; chown root:apache $acmesh_confDir/{data,certs,ca} ; chmod 440 $acmesh_confDir/{data,certs,ca}
2990 rexy 2192
# Install acme.sh
2304 tom.houday 2193
	./acme.sh --install \
2194
		--home $acmesh_installDir \
2195
		--config-home $acmesh_confDir/data \
2196
		--certhome $acmesh_confDir/certs \
2197
		--accountkey $acmesh_confDir/ca/account.key \
2198
		--accountconf $acmesh_confDir/data/account.conf \
2199
		--useragent $acmesh_userAgent \
2308 tom.houday 2200
		--nocron \
2201
		> /dev/null
2304 tom.houday 2202
	if [ $? -ne 0 ]; then
2203
		echo "Error during installation of Let's Encrypt client (acme.sh)."
2204
	fi
2990 rexy 2205
# Create configuration file
2304 tom.houday 2206
	cat <<EOF > /usr/local/etc/alcasar-letsencrypt
2207
email=
2208
dateIssueRequest=
2209
domainRequest=
2210
challenge=
2211
dateIssued=
2212
dnsapi=
2213
dateNextRenewal=
2214
EOF
2688 lucas.echa 2215
	cd $pwdInstall || { echo "Unable to find $pwdInstall directory"; exit 1; }
2304 tom.houday 2216
	rm -rf /tmp/acme.sh-*
2724 rexy 2217
} # End of letsencrypt()
2304 tom.houday 2218
 
2219
##################################################################
2990 rexy 2220
##                       "mail_service"                         ##
2994 rexy 2221
## - Install Postfix conf for email registration method         ##
2990 rexy 2222
##################################################################
2223
mail_service()
2224
{
3062 rexy 2225
	[ -e /etc/php.d/05_mail.ini.default ] || cp /etc/php.d/05_mail.ini /etc/php.d/05_mail.ini.default
2226
	$SED "s?^mail.add_x_header =.*?mail.add_x_header = Off?g" /etc/php.d/05_mail.ini
3005 rexy 2227
	[ -e /etc/postfix/main.cf.orig ] || cp /etc/postfix/main.cf /etc/postfix/main.cf.orig
3062 rexy 2228
	$SED "s?^inet_protocols =.*?inet_protocols = ipv4?g" /etc/postfix/main.cf
3180 rexy 2229
	$SED "s?^smtp_tls_security_level =.*?smtp_tls_security_level = encrypt?g" /etc/postfix/main.cf
2230
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
2990 rexy 2231
	cat << EOT >> /etc/postfix/main.cf
3070 rexy 2232
smtputf8_enable = no
3062 rexy 2233
smtp_use_tls = yes
2234
smtp_tls_wrappermode = yes
3005 rexy 2235
smtp_sasl_auth_enable = yes
2236
smtp_sasl_security_options = noanonymous
2237
smtp_sasl_password_maps = hash:/etc/postfix/sasl/sasl_passwd
2238
relayhost =
2990 rexy 2239
myhostname = $HOSTNAME.$DOMAIN
2994 rexy 2240
EOT
2990 rexy 2241
	chown -R postfix:postfix /var/lib/postfix
2242
} # end of mail_service
2243
 
2244
##################################################################
2552 rexy 2245
##                    Fonction "post_install"                   ##
2246
## - Modifying banners (locals et ssh) & prompts                ##
2247
## - SSH config                                                 ##
2248
## - sudoers config & files security                            ##
2249
## - log rotate & ANSSI security parameters                     ##
2250
## - Apply former conf in case of an update                     ##
2251
##################################################################
1 root 2252
post_install()
2253
{
3093 rexy 2254
	MAGEIA_VERSION=`cat /etc/lsb-release|grep "DISTRIB_DESCRIPTION"|cut -d"=" -f2|tr -d '"'`
2840 rexy 2255
# change the SSHD options
2195 richard 2256
	cp -f $DIR_CONF/banner /etc/ssh/alcasar-banner-ssh
3093 rexy 2257
	echo " Version $VERSION ($MAGEIA_VERSION)" >> /etc/ssh/alcasar-banner-ssh
5 franck 2258
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1 root 2259
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
2260
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2261
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
2840 rexy 2262
# sshd listens on EXTIF & INTIF
2263
	$SED "s?^#ListenAddress 0\.0\.0\.0.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
2264
# sshd authorized certificate for root login
2265
	$SED "s?^PermitRootLogin.*?PermitRootLogin without-password?g" /etc/ssh/sshd_config
2266
	$SED "s?^X11Forwarding.*?#X11Forwarding yes?g" /etc/ssh/sshd_config
2195 richard 2267
# ALCASAR conf file
2818 rexy 2268
	echo "HTTPS_LOGIN=off" >> $CONF_FILE
2409 tom.houday 2269
	echo "HTTPS_CHILLI=off" >> $CONF_FILE
3043 rexy 2270
	echo "SSH_LAN=22" >> $CONF_FILE
2271
	echo "SSH_WAN=0" >> $CONF_FILE
1631 richard 2272
	echo "SSH_ADMIN_FROM=0.0.0.0/0.0.0.0" >> $CONF_FILE
3046 rexy 2273
	echo "INTERLAN=off" >> $CONF_FILE
628 richard 2274
	echo "LDAP=off" >> $CONF_FILE
2447 richard 2275
	echo "LDAP_SERVER=127.0.0.1" >> $CONF_FILE
3238 rexy 2276
	echo "LDAP_BASE=cn=Users;dc=serverad;dc=lan" >> $CONF_FILE
2454 tom.houday 2277
	echo "LDAP_UID=sAMAccountName" >> $CONF_FILE
2278
	echo "LDAP_FILTER=" >> $CONF_FILE
2279
	echo "LDAP_USER=alcasar" >> $CONF_FILE
2280
	echo "LDAP_PASSWORD=" >> $CONF_FILE
2705 tom.houday 2281
	echo "LDAP_SSL=on" >> $CONF_FILE
2282
	echo "LDAP_CERT_REQUIRED=" >> $CONF_FILE
2600 tom.houday 2283
	echo "SMS=off" >> $CONF_FILE
2284
	echo "SMS_NUM=" >> $CONF_FILE
2993 rexy 2285
	echo "MAIL=off" >> $CONF_FILE
2286
	echo "MAIL_TYPE=" >> $CONF_FILE
2287
	echo "MAIL_SMTP_IP=" >> $CONF_FILE
3021 rexy 2288
	echo "MAIL_SMTP_PORT=" >> $CONF_FILE
2993 rexy 2289
	echo "MAIL_ADDR=" >> $CONF_FILE
2290
	echo "MAIL_WHITEDOMAIN=" >> $CONF_FILE
2291
	echo "MAIL_ADMIN=" >> $CONF_FILE
2688 lucas.echa 2292
	echo "BL_PUREIP=on" >> $CONF_FILE
2293
	echo "BL_SAFESEARCH=off" >> $CONF_FILE
2294
	echo "WL_SAFESEARCH=off" >> $CONF_FILE
2770 rexy 2295
	echo "IOT_CAPTURE=off" >> $CONF_FILE
2926 rexy 2296
	echo "WIFI4EU=off" >> $CONF_FILE
2297
	echo "WIFI4EU_CODE=123e4567-e89b-12d3-a456-426655440000" >> $CONF_FILE
2979 rexy 2298
	echo "MULTIWAN=off" >> $CONF_FILE
2195 richard 2299
# Prompt customisation (colors)
1 root 2300
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
5 franck 2301
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
630 franck 2302
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
2941 rexy 2303
	$SED "s?^alias ll=.*?alias ll=\"ls -al --color\"?g" /etc/profile.d/60alias.sh
2195 richard 2304
# sudoers configuration for "apache" & "sysadmin"
1 root 2305
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
2850 rexy 2306
	cp -f $DIR_CONF/sudoers /etc/ ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
629 richard 2307
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1543 richard 2308
# Modify some logrotate files (gammu, ulogd)
1 root 2309
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
2310
	chmod 644 /etc/logrotate.d/*
2195 richard 2311
# Log compression
706 franck 2312
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
2313
# actualisation des fichiers logs compressés
3230 rexy 2314
	for dir in firewall e2guardian httpd
706 franck 2315
	do
2688 lucas.echa 2316
		find /var/log/$dir -type f -name "*.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9]" -exec gzip {} \;
706 franck 2317
	done
2601 tom.houday 2318
	/usr/bin/systemctl daemon-reload
2956 rexy 2319
# processes started at boot time (Systemctl)
3269 rexy 2320
	for i in alcasar-network mariadb httpd ntpd iptables unbound unbound-blacklist unbound-whitelist unbound-blackhole radiusd nfcapd nfsen-ng e2guardian ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban vnstat sshd
1221 richard 2321
	do
1574 richard 2322
		/usr/bin/systemctl -q enable $i.service
1221 richard 2323
	done
2454 tom.houday 2324
 
1452 richard 2325
# disable processes at boot time (Systemctl)
2688 lucas.echa 2326
	for i in ulogd gpm dhcpd
1452 richard 2327
	do
1574 richard 2328
		/usr/bin/systemctl -q disable $i.service
1452 richard 2329
	done
2454 tom.houday 2330
 
2864 rexy 2331
# Apply some security rules (some are from French cybersecurity Agency - ANSSI)
1362 richard 2332
# ignore ICMP broadcast (smurf attack)
2333
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
2334
# ignore ICMP errors bogus
2335
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
2336
# remove ICMP redirects responces
2337
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2338
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
2339
# enable SYN Cookies (Syn flood attacks)
2340
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
2341
# enable kernel antispoofing
2342
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
2343
# ignore source routing
2344
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
2345
# set conntrack timer to 1h (3600s) instead of 5 weeks
2346
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
2454 tom.houday 2347
# disable log_martians (ALCASAR is often installed between two private network addresses)
1363 richard 2348
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1778 richard 2349
# disable iptables_helpers
2350
	echo "net.netfilter.nf_conntrack_helper = 0" >> /etc/sysctl.d/alcasar.conf
1788 richard 2351
# Switch to the router mode
2352
	echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.d/alcasar.conf
1917 franck 2353
# Remove unused service ipv6
1964 franck 2354
	echo "net.ipv6.conf.all.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2355
	echo "net.ipv6.conf.all.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
2356
	echo "net.ipv6.conf.default.disable_ipv6 = 1" >> /etc/sysctl.d/alcasar.conf
2357
	echo "net.ipv6.conf.default.autoconf = 0" >> /etc/sysctl.d/alcasar.conf
1003 richard 2358
# switch to multi-users runlevel (instead of x11)
1221 richard 2359
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
2864 rexy 2360
# disable Core dump file
2361
	[ -e /etc/security/limits.conf.default ]  || cp /etc/security/limits.conf /etc/security/limits.conf.default
2362
	$SED "/^# End of file.*/i*\tsoft\tcore\t0\n*\thard\tcore\t0" /etc/security/limits.conf
2432 richard 2363
# GRUB2 modifications (Wait time : 3s - ALCASAR entry - VGA=791 - Change the default banner
3222 rexy 2364
	[ -e /etc/default/grub.default ] || cp /etc/default/grub /etc/default/grub.default
2432 richard 2365
	$SED "s?^GRUB_TIMEOUT=.*?GRUB_TIMEOUT=3?g" /etc/default/grub
2433 richard 2366
	$SED "s?^GRUB_DISTRIBUTOR=.*?GRUB_DISTRIBUTOR=ALCASAR?g" /etc/default/grub
2432 richard 2367
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
3190 rexy 2368
	vm_vga=`lsmod | grep -c -E "virtio|vmwgfx"` # test if in VM
2454 tom.houday 2369
	if [ $vm_vga == 0 ] # is not a VM
2432 richard 2370
	then
2454 tom.houday 2371
		cp -f $DIR_CONF/banner /etc/mageia-release # ALCASAR ASCII-Art
2372
		echo >> /etc/mageia-release
2373
		$SED "s?^GRUB_CMDLINE_LINUX_DEFAULT=\"?&vga=791 ?" /etc/default/grub
3093 rexy 2374
	else
2375
		echo > /etc/mageia-release
2454 tom.houday 2376
	fi
2377
	if [ $Lang == "fr" ]
2378
	then
3093 rexy 2379
		echo "Bienvenue sur ALCASAR Version $VERSION ($MAGEIA_VERSION)" >> /etc/mageia-release
2688 lucas.echa 2380
		echo "Connectez-vous à l'URL 'https://$HOSTNAME.$DOMAIN/acc'" >> /etc/mageia-release
2454 tom.houday 2381
	else
3093 rexy 2382
		echo "Welcome on ALCASAR Version $VERSION ($MAGEIA_VERSION)" >> /etc/mageia-release
2688 lucas.echa 2383
		echo "Connect to 'https://$HOSTNAME.$DOMAIN/acc'" >> /etc/mageia-release
2454 tom.houday 2384
	fi
2385
	/usr/bin/update-grub2
1221 richard 2386
# Load and apply the previous conf file
2387
	if [ "$mode" = "update" ]
532 richard 2388
	then
2887 rexy 2389
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in $DIR_SAVE/archive
1221 richard 2390
		$DIR_DEST_BIN/alcasar-conf.sh --load
2391
		PARENT_SCRIPT=`basename $0`
2392
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
2393
		$DIR_DEST_BIN/alcasar-conf.sh --apply
2454 tom.houday 2394
		$DIR_DEST_BIN/alcasar-file-clean.sh # Clean & sort conf files. Add uamallowed domains to the dns-blackhole conf
1221 richard 2395
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
2396
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
532 richard 2397
	fi
2560 rexy 2398
	rm -f /var/tmp/alcasar-conf*
1221 richard 2399
	chown -R root:apache $DIR_DEST_ETC/*
2400
	chmod -R 660 $DIR_DEST_ETC/*
2401
	chmod ug+x $DIR_DEST_ETC/digest
2688 lucas.echa 2402
	cd $DIR_INSTALL || { echo "Unable to find $DIR_INSTALL directory"; exit 1; }
5 franck 2403
	echo ""
1 root 2404
	echo "#############################################################################"
638 richard 2405
	if [ $Lang == "fr" ]
2406
		then
2407
		echo "#                        Fin d'installation d'ALCASAR                       #"
2408
		echo "#                                                                           #"
2409
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2410
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2411
		echo "#                                                                           #"
2412
		echo "#############################################################################"
2413
		echo
2414
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
2415
		echo
2416
		echo "- Lisez attentivement la documentation d'exploitation"
2417
		echo
2688 lucas.echa 2418
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://$HOSTNAME.$DOMAIN"
638 richard 2419
		echo
2420
		echo "                   Appuyez sur 'Entrée' pour continuer"
2454 tom.houday 2421
	else
2396 tom.houday 2422
		echo "#                        End of ALCASAR install process                     #"
638 richard 2423
		echo "#                                                                           #"
2424
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2425
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2426
		echo "#                                                                           #"
2427
		echo "#############################################################################"
2428
		echo
2429
		echo "- The system will be rebooted in order to operate ALCASAR"
2430
		echo
2431
		echo "- Read the exploitation documentation"
2432
		echo
2688 lucas.echa 2433
		echo "- The ALCASAR Control Center (ACC) is at http://$HOSTNAME.$DOMAIN"
638 richard 2434
		echo
2435
		echo "                   Hit 'Enter' to continue"
2436
	fi
1782 franck 2437
	sleep 2
2560 rexy 2438
	if [ "$mode" == "install" ] || [ "$DEBUG_ALCASAR" == "on" ]
820 richard 2439
	then
2688 lucas.echa 2440
		read
815 richard 2441
	fi
774 richard 2442
	clear
1 root 2443
	reboot
2724 rexy 2444
} # End of post_install()
1 root 2445
 
2552 rexy 2446
#####################################################################################
2447
#                                   Main Install loop                               #
2448
#####################################################################################
832 richard 2449
dir_exec=`dirname "$0"`
2450
if [ $dir_exec != "." ]
2451
then
2452
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2453
	echo "Launch this program from the ALCASAR archive directory"
2454
	exit 0
2455
fi
2688 lucas.echa 2456
if [ $EUID -gt 0 ]
2220 richard 2457
then
2688 lucas.echa 2458
	echo "Vous devez être \"root\" pour installer ALCASAR (commande 'su')"
2459
	echo "You must be \"root\" to install ALCASAR ('su' command)"
2220 richard 2460
	exit 0
2461
fi
832 richard 2462
VERSION=`cat $DIR_INSTALL/VERSION`
291 franck 2463
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1 root 2464
nb_args=$#
2465
args=$1
2466
if [ $nb_args -eq 0 ]
2467
then
2468
	nb_args=1
2469
	args="-h"
2470
fi
1062 richard 2471
chmod -R u+x $DIR_SCRIPTS/*
1 root 2472
case $args in
2473
	-\? | -h* | --h*)
2474
		echo "$usage"
2475
		exit 0
2476
		;;
291 franck 2477
	-i | --install)
3180 rexy 2478
		for func in system_testing network_testing
2724 rexy 2479
		do
2480
			header_install
2481
			$func
2482
			if [ $DEBUG_ALCASAR == "on" ]
2483
			then
3179 rexy 2484
				echo "*** 'debug' : end installing function '$func' ***"
2724 rexy 2485
				read
2486
			fi
2487
		done
595 richard 2488
# RPMs install
2941 rexy 2489
		$DIR_SCRIPTS/alcasar-rpm.sh
595 richard 2490
		if [ "$?" != "0" ]
1 root 2491
		then
595 richard 2492
			exit 0
2493
		fi
1249 richard 2494
		if [ -e $CONF_FILE ]
595 richard 2495
		then
2458 richard 2496
# Uninstall or update the running version
2497
			if [ "$mode" == "update" ]
2498
			then
2560 rexy 2499
				$DIR_DEST_BIN/alcasar-uninstall.sh -update
2458 richard 2500
			else
2560 rexy 2501
				$DIR_DEST_BIN/alcasar-uninstall.sh -full
2458 richard 2502
			fi
595 richard 2503
		fi
2847 rexy 2504
		if [ $DEBUG_ALCASAR == "on" ]
2505
		then
2506
			echo "*** 'debug' : end of cleaning ***"
2507
			read
2508
		fi
2980 rexy 2509
# Avoid some RPM automatic updates
2510
		echo "/^kernel/" > /etc/urpmi/skip.list
2511
		echo "/^wkhtmltopdf/" >> /etc/urpmi/skip.list
2512
		echo "/^freeradius/" >> /etc/urpmi/skip.list
3190 rexy 2513
		if [ `grep -E '^exclude=' /etc/dnf/dnf.conf |wc -l` -eq "1" ]; then
3170 rexy 2514
			$SED "s?^exclude=.*?exclude=kernel\* wkhtmltopdf freeradius?g" /etc/dnf/dnf.conf
2980 rexy 2515
		else
3170 rexy 2516
			echo "exclude=kernel* wkhtmltopdf freeradius" >> /etc/dnf/dnf.conf
2980 rexy 2517
		fi
2835 rexy 2518
# Test if conf file
2519
		if [ -e /var/tmp/alcasar-conf.tar.gz ]
595 richard 2520
		then
2826 rexy 2521
# Extract some info from the previous configuration file
2834 rexy 2522
			cd /var/tmp
2523
			tar -xf /var/tmp/alcasar-conf.tar.gz conf/etc/alcasar.conf
2847 rexy 2524
			if [ "$mode" == "install" ] # don't display this if updating a running version
2834 rexy 2525
			then
2526
				header_install
2527
				ORGANISME=`grep ^ORGANISM= conf/etc/alcasar.conf|cut -d"=" -f2`
2528
				PREVIOUS_VERSION=`grep ^VERSION= conf/etc/alcasar.conf|cut -d"=" -f2`
2529
				MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2530
				MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2`
2531
				UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3|cut -c1`
597 richard 2532
				if [ $Lang == "fr" ]
2834 rexy 2533
					then echo "Le fichier de configuration d'une version $MAJ_PREVIOUS_VERSION.$MIN_PREVIOUS_VERSION.$UPD_PREVIOUS_VERSION a été trouvé";
2956 rexy 2534
					else echo "The configuration file of a version $MAJ_PREVIOUS_VERSION.$MIN_PREVIOUS_VERSION.$UPD_PREVIOUS_VERSION has been found";
597 richard 2535
				fi
2834 rexy 2536
				response=0
2537
				PTN='^[oOnNyY]?$'
2538
				until [[ "$response" =~ $PTN ]]
2539
				do
2540
					if [ $Lang == "fr" ]
2541
						then echo -n "Voulez-vous l'utiliser (O/n)? ";
2542
						else echo -n "Do you want to use it (Y/n)?";
2543
					fi
2544
					read response
2545
					if [ "$response" = "n" ] || [ "$response" = "N" ]
2546
					then
2547
						rm -f /var/tmp/alcasar-conf*
2548
						rm -rf /var/tmp/conf
2549
					fi
2550
				done
2551
			fi
2847 rexy 2552
			cd $DIR_INSTALL
597 richard 2553
		fi
636 richard 2554
# Test if update
2834 rexy 2555
		if [ -e /var/tmp/alcasar-conf.tar.gz ]
597 richard 2556
		then
2557
			if [ $Lang == "fr" ]
2558
				then echo "#### Installation avec mise à jour ####";
2559
				else echo "#### Installation with update     ####";
2560
			fi
5 franck 2561
			mode="update"
1 root 2562
		fi
3170 rexy 2563
		for func in init network CA ACC time_server init_db freeradius chilli e2guardian ulogd nfsen vnstat unbound dhcpd BL cron fail2ban gammu_smsd msec letsencrypt mail_service post_install
5 franck 2564
		do
2565
			$func
2466 richard 2566
			if [ $DEBUG_ALCASAR == "on" ]
2688 lucas.echa 2567
			then
3179 rexy 2568
				echo "*** 'debug' : end installing function '$func' ***"
2688 lucas.echa 2569
				read
2466 richard 2570
			fi
14 richard 2571
		done
5 franck 2572
		;;
291 franck 2573
	-u | --uninstall)
1828 richard 2574
		if [ ! -e $DIR_DEST_BIN/alcasar-uninstall.sh ]
1 root 2575
		then
597 richard 2576
			if [ $Lang == "fr" ]
2577
				then echo "ALCASAR n'est pas installé!";
2578
				else echo "ALCASAR isn't installed!";
2579
			fi
1 root 2580
			exit 0
2581
		fi
5 franck 2582
		response=0
2760 lucas.echa 2583
		PTN='^[oOyYnN]?$'
2584
		until [[ "$response" =~ $PTN ]]
5 franck 2585
		do
597 richard 2586
			if [ $Lang == "fr" ]
2760 lucas.echa 2587
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (O/n)? ";
854 richard 2588
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
597 richard 2589
			fi
5 franck 2590
			read response
2591
		done
1103 richard 2592
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
1 root 2593
		then
3206 rexy 2594
			$DIR_DEST_BIN/alcasar-conf.sh --create
2454 tom.houday 2595
		else
2560 rexy 2596
			rm -f /var/tmp/alcasar-conf*
1 root 2597
		fi
597 richard 2598
# Uninstall the running version
2560 rexy 2599
		$DIR_DEST_BIN/alcasar-uninstall.sh -full
1 root 2600
		;;
2601
	*)
2602
		echo "Argument inconnu :$1";
460 richard 2603
		echo "Unknown argument :$1";
1 root 2604
		echo "$usage"
2605
		exit 1
2606
		;;
2607
esac
10 franck 2608
# end of script