Subversion Repositories ALCASAR

Rev

Rev 771 | Rev 784 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
672 richard 1
#!/bin/bash
64 franck 2
# $Id: alcasar-watchdog.sh 783 2011-12-17 14:24:08Z richard $
672 richard 3
 
4
# alcasar-watchdog.sh
5
# by Richard REY
6
# This script is distributed under the Gnu General Public License (GPL)
7
 
308 richard 8
# Ce script prévient les usagers de l'indisponibilité de l'accès Internet
9
# il déconnecte les usagers dont
376 franck 10
# - les équipements réseau ne répondent plus
1 root 11
# - les adresses MAC sont usurpées
308 richard 12
# This script tells users that Internet access is down
13
# it logs out users whose 
1 root 14
# - PCs are quiet
15
# - MAC address are in used by other systems (usurped)
672 richard 16
 
308 richard 17
EXTIF="eth0"
1 root 18
INTIF="eth1"
19
PRIVATE_IP="192.168.182.1"
20
tmp_file="/tmp/watchdog.txt"
316 richard 21
DIR_WEB="/var/www/html"
360 richard 22
Index_Page="$DIR_WEB/index.php"
597 richard 23
OLDIFS=$IFS
1 root 24
IFS=$'\n'
308 richard 25
 
783 richard 26
function lan_down_alert ()
27
# users are redirected on ALCASAR IP address if LAN Pb detected
308 richard 28
{
783 richard 29
	case $LAN_DOWN in
308 richard 30
	"1")
31
		logger "eth0 link down"
363 richard 32
		/bin/sed -i "s?diagnostic =.*?diagnostic = \"eth0 link down\";?g" $Index_Page
308 richard 33
		;;
34
	"2")
35
		logger "can't contact the default router"
363 richard 36
		/bin/sed -i "s?diagnostic =.*?diagnostic = \"can't contact the default router\";?g" $Index_Page
308 richard 37
		;;
38
	esac
520 richard 39
	net_pb=`cat /etc/dnsmasq.conf|grep "address=/#/"|wc -l`
40
	if [ $net_pb = "0" ] # on alerte les usagers (si ce n'est pas déjà le cas).
308 richard 41
		then
360 richard 42
		/bin/sed -i "s?^\$network_pb.*?\$network_pb = True;?g" $Index_Page
520 richard 43
		/bin/sed -i "s?^conf-dir=.*?address=\/#\/$PRIVATE_IP?g" /etc/dnsmasq-blackhole.conf
44
		/bin/sed -i "1i\address=\/#\/$PRIVATE_IP" /etc/dnsmasq.conf
308 richard 45
		/etc/init.d/dnsmasq restart
46
	fi
47
}
48
 
783 richard 49
function lan_test ()
50
# LAN connectiivity testing
51
{
52
	# EXTIF testing
53
	LAN_DOWN="0"
54
	if [ "`/usr/sbin/ethtool $EXTIF|grep Link|cut -d' ' -f3`" != "yes" ]
55
		then
56
		LAN_DOWN="1"
308 richard 57
	fi
783 richard 58
	# Default GW testing
59
	if [ $LAN_DOWN -eq "0" ]
308 richard 60
		then
783 richard 61
		IP_GW=`/sbin/ip route list|grep ^default|cut -d" " -f3`
62
		arp_reply=`/usr/sbin/arping -I$EXTIF -c1 $IP_GW|grep response|cut -d" " -f2`
63
		if [ $arp_reply -eq "0" ]
64
	       		then
65
			LAN_DOWN="2"
66
		fi
308 richard 67
	fi
783 richard 68
	# if LAN pb detected, users are warned
69
	if [ $LAN_DOWN != "0" ]
70
		then
71
			lan_down_alert
72
	# else switch in normal mode
73
	else
74
		net_pb=`cat /etc/dnsmasq.conf|grep "address=/#/"|wc -l`
75
		if [ $net_pb != "0" ]
76
			then
77
			/bin/sed -i "s?^\$network_pb.*?\$network_pb = False;?g" $Index_Page
78
			/bin/sed -i "s?^address=\/#\/.*?conf-dir=/usr/local/etc/alcasar-dnsfilter-enabled?g" /etc/dnsmasq-blackhole.conf
79
			/bin/sed -i "/^address=/d" /etc/dnsmasq.conf
80
			/etc/init.d/dnsmasq restart
81
		fi
82
	fi
83
}
84
 
85
usage="Usage: alcasar-watchdog.sh {-lt --lan_test}"
86
case $1 in
87
	-\? | -h* | --h*)
88
		echo "$usage"
89
		exit 0
90
		;;
91
	-lt | --lan_test)
92
		lan_test
93
		exit 0
94
		;;
95
	*)
96
		lan_test
1 root 97
# lecture du fichier contenant les adresses IP des stations muettes
783 richard 98
		if [ -e $tmp_file ]; then
99
			cat $tmp_file | while read noresponse
100
			do
101
				noresponse_ip=`echo $noresponse | cut -d" " -f1`
102
				noresponse_mac=`echo $noresponse | cut -d" " -f2`
103
				arp_reply=`/usr/sbin/arping -b -I$INTIF -s$PRIVATE_IP -c1 -w4 $noresponse_ip|grep response|cut -d" " -f2`
104
				if [[ $(expr $arp_reply) -eq 0 ]]
105
	       				then
106
					logger "alcasar-watchdog $noresponse_ip ($noresponse_mac) can't be contact. Alcasar disconnects the user."
107
					/usr/sbin/chilli_query logout $noresponse_mac
108
				fi
109
			done
110
			rm $tmp_file
1 root 111
		fi
112
# on traite chaque équipements connus de chilli
783 richard 113
		for system in `/usr/sbin/chilli_query list |grep -v "\.0\.0\.0"`
114
		do
115
			active_ip=`echo $system |cut -d" " -f2`
116
			active_session=`echo $system |cut -d" " -f5`
117
			active_mac=`echo $system | cut -d" " -f1`
109 richard 118
# on ne traite que les équipements exploitées par un usager authentifié (test de 2 réponses en 4 secondes)
783 richard 119
			if [[ $(expr $active_session) -eq 1 ]]
120
				then
121
				arp_reply=`/usr/sbin/arping -b -I$INTIF -s$PRIVATE_IP -c2 -w4 $active_ip|grep "Unicast reply"|wc -l`
1 root 122
# on stocke les adresses IP des stations muettes
783 richard 123
				if [[ $(expr $arp_reply) -eq 0 ]]
124
	       				then
125
					echo "$active_ip $active_mac" >> $tmp_file
126
				fi
1 root 127
# on deconnecte l'usager d'une stations usurpée (@MAC)
783 richard 128
				if [[ $(expr $arp_reply) -gt 2 ]]
129
	       				then
130
					logger "alcasar-watchdog : $active_ip is usurped ($active_mac). Alcasar disconnect the user."
131
					/usr/sbin/chilli_query logout $active_mac
132
				fi
133
			fi
134
		done
135
		;;
136
esac	
597 richard 137
IFS=$OLDIFS