Subversion Repositories ALCASAR

Rev

Rev 784 | Rev 787 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log

Rev Author Line No. Line
672 richard 1
#!/bin/bash
64 franck 2
# $Id: alcasar-watchdog.sh 786 2012-01-02 22:50:31Z richard $
672 richard 3
 
4
# alcasar-watchdog.sh
5
# by Richard REY
6
# This script is distributed under the Gnu General Public License (GPL)
7
 
308 richard 8
# Ce script prévient les usagers de l'indisponibilité de l'accès Internet
9
# il déconnecte les usagers dont
376 franck 10
# - les équipements réseau ne répondent plus
1 root 11
# - les adresses MAC sont usurpées
308 richard 12
# This script tells users that Internet access is down
13
# it logs out users whose 
1 root 14
# - PCs are quiet
15
# - MAC address are in used by other systems (usurped)
672 richard 16
 
308 richard 17
EXTIF="eth0"
1 root 18
INTIF="eth1"
786 richard 19
macallowed_file="/usr/local/etc/alcasar-macallowed"
20
conf_file="/usr/local/etc/alcasar.conf"
21
private_ip_mask=`grep PRIVATE_IP= $conf_file|cut -d"=" -f2`
22
private_ip_mask=${private_ip_mask:=192.168.182.1/24}
23
PRIVATE_IP=`echo $private_ip_mask | cut -d"/" -f1`			# ALCASAR LAN IP address
1 root 24
tmp_file="/tmp/watchdog.txt"
316 richard 25
DIR_WEB="/var/www/html"
360 richard 26
Index_Page="$DIR_WEB/index.php"
597 richard 27
OLDIFS=$IFS
1 root 28
IFS=$'\n'
308 richard 29
 
783 richard 30
function lan_down_alert ()
31
# users are redirected on ALCASAR IP address if LAN Pb detected
308 richard 32
{
783 richard 33
	case $LAN_DOWN in
308 richard 34
	"1")
35
		logger "eth0 link down"
363 richard 36
		/bin/sed -i "s?diagnostic =.*?diagnostic = \"eth0 link down\";?g" $Index_Page
308 richard 37
		;;
38
	"2")
39
		logger "can't contact the default router"
363 richard 40
		/bin/sed -i "s?diagnostic =.*?diagnostic = \"can't contact the default router\";?g" $Index_Page
308 richard 41
		;;
42
	esac
520 richard 43
	net_pb=`cat /etc/dnsmasq.conf|grep "address=/#/"|wc -l`
44
	if [ $net_pb = "0" ] # on alerte les usagers (si ce n'est pas déjà le cas).
308 richard 45
		then
360 richard 46
		/bin/sed -i "s?^\$network_pb.*?\$network_pb = True;?g" $Index_Page
520 richard 47
		/bin/sed -i "s?^conf-dir=.*?address=\/#\/$PRIVATE_IP?g" /etc/dnsmasq-blackhole.conf
48
		/bin/sed -i "1i\address=\/#\/$PRIVATE_IP" /etc/dnsmasq.conf
308 richard 49
		/etc/init.d/dnsmasq restart
50
	fi
51
}
52
 
783 richard 53
function lan_test ()
54
# LAN connectiivity testing
55
{
784 richard 56
	watchdog_process=`ps -C alcasar-watchdog.sh|wc -l`
57
	if [[ $(expr $watchdog_process) -gt 3 ]]
58
		then
59
		echo "ALCASAR watchdog is already running"
60
		exit 0
61
	fi
783 richard 62
	# EXTIF testing
63
	LAN_DOWN="0"
64
	if [ "`/usr/sbin/ethtool $EXTIF|grep Link|cut -d' ' -f3`" != "yes" ]
65
		then
66
		LAN_DOWN="1"
308 richard 67
	fi
783 richard 68
	# Default GW testing
69
	if [ $LAN_DOWN -eq "0" ]
308 richard 70
		then
783 richard 71
		IP_GW=`/sbin/ip route list|grep ^default|cut -d" " -f3`
72
		arp_reply=`/usr/sbin/arping -I$EXTIF -c1 $IP_GW|grep response|cut -d" " -f2`
73
		if [ $arp_reply -eq "0" ]
74
	       		then
75
			LAN_DOWN="2"
76
		fi
308 richard 77
	fi
783 richard 78
	# if LAN pb detected, users are warned
79
	if [ $LAN_DOWN != "0" ]
80
		then
81
			lan_down_alert
82
	# else switch in normal mode
83
	else
84
		net_pb=`cat /etc/dnsmasq.conf|grep "address=/#/"|wc -l`
85
		if [ $net_pb != "0" ]
86
			then
87
			/bin/sed -i "s?^\$network_pb.*?\$network_pb = False;?g" $Index_Page
88
			/bin/sed -i "s?^address=\/#\/.*?conf-dir=/usr/local/etc/alcasar-dnsfilter-enabled?g" /etc/dnsmasq-blackhole.conf
89
			/bin/sed -i "/^address=/d" /etc/dnsmasq.conf
90
			/etc/init.d/dnsmasq restart
91
		fi
92
	fi
93
}
94
 
95
usage="Usage: alcasar-watchdog.sh {-lt --lan_test}"
96
case $1 in
97
	-\? | -h* | --h*)
98
		echo "$usage"
99
		exit 0
100
		;;
101
	-lt | --lan_test)
102
		lan_test
103
		exit 0
104
		;;
105
	*)
106
		lan_test
1 root 107
# lecture du fichier contenant les adresses IP des stations muettes
783 richard 108
		if [ -e $tmp_file ]; then
109
			cat $tmp_file | while read noresponse
110
			do
111
				noresponse_ip=`echo $noresponse | cut -d" " -f1`
112
				noresponse_mac=`echo $noresponse | cut -d" " -f2`
113
				arp_reply=`/usr/sbin/arping -b -I$INTIF -s$PRIVATE_IP -c1 -w4 $noresponse_ip|grep response|cut -d" " -f2`
114
				if [[ $(expr $arp_reply) -eq 0 ]]
115
	       				then
786 richard 116
					mac_allowed=`cat $macallowed_file |grep $noresponse_mac | wc -l`
117
					if [ $mac_allowed -eq 0 ]
118
						then
119
						logger "alcasar-watchdog $noresponse_ip ($noresponse_mac) can't be contact. Alcasar disconnects the user."
120
						/usr/sbin/chilli_query logout $noresponse_mac
121
					else
122
						logger "alcasar-watchdog $noresponse_ip ($noresponse_mac - macallowed) can't be contact. Alcasar release the IP address"
123
						/usr/sbin/chilli_query dhcp-release $noresponse_mac
124
					fi
783 richard 125
				fi
126
			done
127
			rm $tmp_file
1 root 128
		fi
129
# on traite chaque équipements connus de chilli
783 richard 130
		for system in `/usr/sbin/chilli_query list |grep -v "\.0\.0\.0"`
131
		do
132
			active_ip=`echo $system |cut -d" " -f2`
133
			active_session=`echo $system |cut -d" " -f5`
134
			active_mac=`echo $system | cut -d" " -f1`
109 richard 135
# on ne traite que les équipements exploitées par un usager authentifié (test de 2 réponses en 4 secondes)
783 richard 136
			if [[ $(expr $active_session) -eq 1 ]]
137
				then
138
				arp_reply=`/usr/sbin/arping -b -I$INTIF -s$PRIVATE_IP -c2 -w4 $active_ip|grep "Unicast reply"|wc -l`
1 root 139
# on stocke les adresses IP des stations muettes
783 richard 140
				if [[ $(expr $arp_reply) -eq 0 ]]
141
	       				then
142
					echo "$active_ip $active_mac" >> $tmp_file
143
				fi
1 root 144
# on deconnecte l'usager d'une stations usurpée (@MAC)
783 richard 145
				if [[ $(expr $arp_reply) -gt 2 ]]
146
	       				then
147
					logger "alcasar-watchdog : $active_ip is usurped ($active_mac). Alcasar disconnect the user."
148
					/usr/sbin/chilli_query logout $active_mac
149
				fi
150
			fi
151
		done
152
		;;
153
esac	
597 richard 154
IFS=$OLDIFS