/conf/VERSION-BL |
---|
0,0 → 1,0 |
Univ-tlse du 17 décembre 2009 - 23h00 |
/conf/chilli-init |
---|
0,0 → 1,97 |
#!/bin/sh |
# |
# chilli CoovaChilli init |
# |
# chkconfig: 2345 65 35 |
# description: CoovaChilli |
# Source function library. |
. /etc/rc.d/init.d/functions |
. /etc/sysconfig/network |
[ ${NETWORKING} = "no" ] && exit 0 |
[ -f /usr/sbin/chilli ] || exit 0 |
[ -f /etc/chilli.conf ] || exit 0 |
. /etc/chilli/functions |
check_required |
RETVAL=0 |
prog="chilli" |
case $1 in |
start) |
echo -n $"Starting $prog: " |
/sbin/modprobe tun >/dev/null 2>&1 |
echo 1 > /proc/sys/net/ipv4/ip_forward |
writeconfig |
radiusconfig |
# (crontab -l 2>&- | grep -v $0 |
# test ${HS_ADMINTERVAL:-0} -gt 0 && echo "*/$HS_ADMINTERVAL * * * * $0 radconfig" |
# echo "*/10 * * * * $0 checkrunning" |
# echo "*/2 * * * * $0 arping" |
# ) | crontab - 2>&- |
# ifconfig $HS_LANIF 0.0.0.0 |
daemon /usr/sbin/chilli |
RETVAL=$? |
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/chilli |
echo |
;; |
checkrunning) |
[ -e $LKFILE -a ! -e $PIDFILE ] && $0 start |
;; |
radconfig) |
[ -e $MAIN_CONF ] || writeconfig |
radiusconfig |
;; |
reload) |
killall -HUP chilli |
;; |
restart) |
$0 stop |
$0 start |
RETVAL=$? |
;; |
stop) |
echo -n $"Shutting down $prog: " |
crontab -l 2>&- | grep -v $0 | crontab - |
killproc chilli |
[ -f /var/run/chilli.pid ] && { |
kill $(cat /var/run/chilli.pid) |
RETVAL=$ |
[ $RETVAL = 0 ] && rm -f /var/lock/subsys/chilli /var/run/chilli.pid |
} |
echo |
;; |
condrestart) |
if [ -f /var/lock/subsys/chilli ] ; then |
$0 restart |
RETVAL=$? |
fi |
;; |
status) |
status chilli |
RETVAL=$? |
;; |
*) |
echo $"Usage: $0 {start|stop|restart|condrestart|status|reload|radconfig}" |
exit 1 |
esac |
exit $? |
/conf/template-fr.html |
---|
0,0 → 1,324 |
<html> |
<head> |
<title>DansGuardian - Access Denied</title> |
</head> |
<body bgcolor=#FFFFFF> |
<center> |
<table border=0 cellspacing=0 cellpadding=2 height=540 width=700> |
<tr> |
<td colspan=2 bgcolor=#FEA700 height=100 align=center> |
<font face=arial,helvetica size=6> |
<b>Accès refusé</b> |
</td> |
</tr> |
<tr> |
<td colspan=2 bgcolor=#FFFACD height=30 align=right> |
<font face=arial,helvetica size=3 color=black> |
<b>-USER- </b> |
</td> |
</tr> |
<tr> |
<td align=center valign=bottom width=150 bgcolor=#B0C4DE> |
<font face=arial,helvetica size=1 color=black> |
<img src="data:image/gif;base64, |
R0lGODlheQCVAOf/ABIaCxEbGxAbJBkaIRgiIxsiKCArKyMqMCIyIigyMzk6KDk6QjFCJ0JC |
KzhDRDtCSD1BWTxKJEhKJ01Bej9KSz5OLUtKM0tChjtSMD5LbUdSU1FTL1JSOlVJlVtSMURa |
N1lKnllJsVFSfVlaMVRSlkJiMmBaMlBbW1tSpVdSsWdQtF9TyFdiY2piLmljOmFbp2NarVFr |
O1tpU2ZayWha0XFqO1lyQmtxaHpyQ3FrpWB6SWZr13BrxXRydnJqzHV5R1yGP4V6P297e2OF |
QHxxx4h6TJZ5Q3CGSWCPQGKOTHh61YaGQWuOR42GQ3qGhpWHP3CPaGeWRoWHhGyWTmiWWo6O |
SZWOS42OZ4OPkIeF6HuWY5GGym+eToWWX4eWbHydT5eWUJeVY56WS56XUqaWR4uXmJSWk26n |
W5SfULeVUnqmYpKeepKX2JSejYenbJGmYZ2fnJ6lY4iuWIauXqWnUpinfK2mZ5iuYp6uVqOn |
l4i1Xb+mUb6mWIa2ZKWnpM6mT6ml0Jym7rOvW6Kn6Y+7XKK1aIu+XqOvsMCueK62X6C2iY+/ |
bJi+Z9auVry2XLKuzInGaqu2pZTGXpXIZ7W3tLC9i7O3xre+eq+25aTHYp3Jaa22/8W/ZKPH |
fOa2YZTPbL2+qNS/Yby+u8++jdW/fLXHjcfGYqq//6vOacG+z92/d77GnL++777Gr53XbJvX |
c6DWer7OesfGvcnOaMvPYsXHxMrHuK3XcNbHm6bZd8XOj+3HX6nXkNfObKrcc6Xec6PeesXW |
ZtXOjcDVjcTPva7ebsPP0M/VdtPWaebOhPbOX/XOZujNl/DOeeHVZcnWo8vO+d3WebHketnV |
s7bmddbeacrX2PbWa7/mcOnXi9TW09fehb7neLrnhNLW5vXXetjdrM7mc87exL/udv/da9fe |
9P7fetDueefmh/Xnb9/lx/blhOTnr+Xn5N3vx+7vlv7vb/3vduXu9/j1j/72e/D2w/72s//9 |
efv/cvD2+P/+gvP+1/r+7Pj+//z/+////yH+EUNyZWF0ZWQgd2l0aCBHSU1QACH5BAEKAP8A |
LAAAAAB5AJUAAAj+AP8JHEiwoMGDCBMqVFhLlKVHgwINAvQIkCVRCzNq3Mixo8eDolI9ArRF |
icksbJRkUZJlx5ZHtT7KnEmzpihAW4jQ2LEji89AmwJtGropUJYdgGoqXcp0oChAgHzQWDFj |
hg8aPngqycKqHLRy8qBtysKmqdmzGkU92sJjxoqqVWlUpbFihxJo/aAB4sFGXrlAWWqhHUz4 |
n6hHRFSsWDFjBVwaVVfQmBxIXr5++TCx4SEP045UhUMvrfWIyIoZNKrSWDxjBY0VVSevYIVJ |
Xj9v0KCxwQRtxZZaooN/FLVlsYoVM1bQWAx3xgoaM2jMoBFICaZB+fJB2wTN2woaloT+i9do |
yceK5ipmqKCxeIYKGnBX0FiBaQuNQaz6yQvEqtwOGo+MJyBCluSgggowwHDgCirQMIMKMyy2 |
wmQz0DDDCoMAEsIMWbAiT27QBKIEGwOWOJAoW6iQAgoohJDCgQdKWNUKMyxGwwwr+FDOFiuo |
QAQrgbASyCZZbFGLiQOKskUIKIAAAgpOOqlCCDBWqYKEK6hARDnQsMJKboFscgobO4iC5Hii |
bIECCB2A0MGbHYDwZpQoqBCCCivQgOViPGwxyCCYBBLIUIEokcqZwtVCBAhwNtpolCjAOEMI |
B6agQoIppBDCCjQoEcgmgWyihCWIBvdICh1M0OgEjaIAggr+L7xAwgQZNJCAAw4wkEACC/T6 |
gAgowLCDoIFk8UipoYlCRAcTdDBBBxNMAGesIEyQwQMKJFAAAQccQEABBhxgwAABFFBAtwtA |
0MEKgezwCLKFAdLBBReIMMEFHUwAwgsidJBBAgYUQEABBBhgQAIGdFvAAQ9o8EABBAhQgAAF |
HPBAB0TUAu9gorxA7wT0TgACChNAsIDB5h5grgEDmGvAAAYcIIQfcDihQQIGC1CAAAIcAMjG |
gwHSQbT0OjkBBAkYQIABBCBgQAEHGCz1AQYn4IQZWPSgwQIHGGzuAQRIAfRZsuRArwgXdEBC |
BgkYfEABBhAgtcEHzG3wARpo4MD+AQIUYPABBiBwAAEniDJ2U7KQEO0FHWSQAAF2F3BAAQZ3 |
a0C3BRxgQLfmCmDwAQYcYO4BBRiQACWHM0XJBRN0gAIEBBBgQAEEGHAAAQYcYIC5BRxQgAEF |
JGDAAQYcYMABBnR7gAEHSH2AAQX0UEvqSgFyQQcqiGAAAQYQYPAABhRgNwEF2N2tAQcY0C0C |
BxRgAAIFGHCAwQtQQj1NorwwQQciHEDAAQYogAESYLACGKAABLCb1ApggAIkwAAHMNgBDHYA |
gxXAYAcwABzuNxNRvGACIkhAARJggAIcQGrKK4DUCKDAbhksAQcw2AEMcACDHcAABTAAAYRQ |
Cw5+RBT+L0CBCAygvAMYgAAHyJvBDmCAAnQrAXNLgAEKQIADJKAHTliAAAxwgF0ZoFsGY4Eo |
fOgRWWxhCz0wQAIKYIADGKwAD+gBCxJgsG4hwAC7OoABBLAADZyAAgZIgBPKkAADKK8A3UpA |
AU4gCjJ6RBS1MAMBDiC1BZxAAwkgQA96YLBuGewABiiAA4RACWu0wxplcAABbtCDAxjgAAYo |
wAEKYLAH1MKRH+lBtwzWA2v0Qx61oIABNLAAqe3qAAZgQS3kkY9+9MMf/mgHBQxAgW4ZrAAH |
MEACDuAAUeDSIz0wQAEMwAJv9AOa/bDGCQJAgLkdoAAssIY88uFMaEKzFg7+EIABulWAAhig |
AAY4QAJE8c2OCMEAu6KEPPoBTWdaIgGxM0ABDJYAUeSjH/bMqDzKQAADHEBqBzDAAQpggEMU |
lCNCSMABTlCOfmQUmlgQgAEKYAACFEAI/XjpS63xAAIY4AAGSIABCtAtAhzipBvpQQIMIARo |
9iMSosgHNLWRALsdIqPG6IEQDiEPe2JBAFIrQAKkJgAzIFUjQjhAAg7hj3yw4AFSgAM0+XEC |
AgiAAAJIQCrsaQwDEMAPosBCPqBpjAMUwAAFOIDBDmAwIdTirAsRwgESIAp/HCIAJ7AGHCgB |
TRYQYAEneEACrAHNfpyAAAU4gTf8gAVotsMBBTD+wAH6OTcWiAKyCnGCARZgDH8IgQAGKIMo |
egDNGxDAAU6QwgmMAc1aFIAACSiAEODAAntqIAAGSIABDnAAAxygAD2oBW4TIgUDLKAW/uhB |
AApAATiwQB7+0EAABFAAAxxACP3wBxwCMDcGsCAf0DwBAQzA3QIY4AAGIAAWxpsQOBggAZbw |
hxQIYIAEUOAE/RDHB35QhB/8gAMUsIY/4BAAqR0gACew5wkIYLACHKAABiMAFhiMEDgYoABw |
8AclCGAwAVCgHtFIhz7uQeR7OGMU/LBGAgRgAAEYQAA9gGY+NEAAgx2gAAY4QAEGgAUaHwQO |
CSiAEKB5gwEYQAJ82AX+PO6hjzbfwxnXwIc+7KGF2BVAAA6QBzStkYACzC0BBiMAFrxsEDgk |
4AAnyIc/2nECHHiCHOnQR5HvoY94pEMfRJ4HJ4rQACF4w55YCIDB+mmAAnDXACeoBWFWrREz |
JOAAC7AENNmxC3LEQx/30Mc99EHkNvva1+iwBz+gaY0EFMBgCDBAAQ5QAIM5oBYLiba0p03t |
hfjBAAcwwAnkYY9lLIMekyZymyfd5nvo4x5tnsc8wjC3AiSAuwY4QAEWIIpq2/ve+DYIHBLA |
3QaQYhfLIEc8wt3me+jjHm2+h6/v0eZ70AMeYDCAAOaGgAIYbAG1yLfGNy5tOCTAAArgg7f+ |
yREPeuijyPogsj7u0eZ7tPkebb7Hr9PBgQJIrQBzW4AoOM7znhNEFBogAA7I4W1zwIPI+iiy |
Pu7R5nu0GR9tvgc+2nyNeOgjHRwQgMEOUADucpcAh/C52DleixMkgA/kWAY54kGPSeujyPrA |
hz7u0eZ7+Joe13AGOe6xiwYY4AAFMAB3C2CAfkph7IjHtyhOkIBQkGMZ8IAHPYrcZiL/+tf3 |
mEc6rgEPesSDHs5QwAASYIACHGBuCXCAKBLPemr3AAFFCEU66AGPcN9DH/fQxz3afI823yMd |
17iGOeJhDnPAgxMJkFoCDFYAgx3AAH5ovfQXIoUCGCAIobhGuPX+QWR93EMf+NAHkdPhjGuk |
I/KRJ8cyaiAAA3A3AQUw2AEMcAACOGH6+D8IFgpgAA7sYQ/OcA++dg/6QGRtdg/pkA6hEArX |
QA7oBw/k8A3MoAEEYAD9ZDcGUAAGkACikH8eKBCHYDAJ8Azo8AeO4Az0gA9FRg/p4Ay74AzO |
cA3kAA/0YA7kQA7zsA/84A/GkAAEYAAEYDACgIFl8IEeeAgGowH5wA/O0AihsAvOkA7OcA3O |
sAu7cIPLQA7mcIPksA72kFH+cAIEYAD9ZDAFIABSQwALIApGiH+HQAAG0APQtA+h4AmhkA5E |
Rg/0QA7mQA7eVnzLoAzswA/9kFH94AT+AmAwBWA3B2AwBCAFtdCGrScLQkAABuAE/ABN9RAK |
jeAJ5GAOXOhtorgM5lAPzgSG/mAMcyMABWAABWA3BVAGksh6h2AwCSAE/eAP/eAP9cAJf+AJ |
yjCKy+AJxJgM+4CK9tQPQiAABtBPc9NPBkMACyAKszh2sqABBGAwLJAP/uBM/cAPzMAHf9AI |
5NgIf9AIqlAPyAiG1mAAAVAAAiA1AkAABWAwOqAFxFCNHCcKtUAJrVAJHGAwCOAEYNgP/rAP |
04ALpEAKwjAN9cAP0NQP6whN/XADAmAwBTAABFAADBADXzAHkkAIa3AIlFALolAL+ihtoiAK |
h4AFJ3ACa6D+A3LQCR9AABrQDqjYDxnFDxnlTBNpT9awAARgAAZQAARgAVPgBotACIsgAw5w |
Ca3AAiwgBHBACSuZkgUhC8TADlKgAQtAAAMgA7qgAX1gCItwAIeQUd7oD97Ylv3ADz8Jhk4Q |
AAawKzZwBn2Ql4vwCjKwADIgAxQQmBRwA5dwCatADLKQkqLgB6WwDbGADhJQAERpAA1wBKjg |
Bn2gCPkAhm7ZmXFpT/ywD88ABFqgBouQl5CQmp+wCF1gAQmwAA4QmA4QB+hwCcewDatgC7Kw |
ELzZmwZRCzdgAHYwD+gQCwsgALuyAYmADsFgCHPgCvWAiv3gD/3gD87kD870k/z+oA7P0A3d |
AAywAAufAAuvkJepCQmf8AmvEAc1IAEKkAAL4AAPEAe6cAnRcAmxEAu6kAdwUAu++Z8KYQYO |
EAbhkA3HoAG7wgE/IAjIUA3OYApyYAiw8Az88JnrWA/P0AmLIAd9AAmv8KGwwAiLYAiQ8KGf |
EJ6wAAyQUAMcwAEuIAEMcABVcAzHkAgJ0CsJsABwIAr/0KM++qNAGqRCOqQ9KgoOkAjzsA2X |
oAELwAE4YAVkwAnVAIOoQAh9AAmfAAzTIA5cyqXEIA7P4A6oqA7PwAiMIAdnIAeLAAmvAAup |
CQt9sARVIAe/UKew8Amv8AvFYAguIAES4AJF8AMNAAb+unAMcUCUDuAElECkjNqoRCoKJ3AJ |
6FAKwvADDTACLlADRWAFqFANzlANyDALhCAHhuAKhCAHXyAHX/AFXMAFcrAP/sAPw9AJjLCq |
XHAGbrAIi/AJi/AKi2AIcoAHVfAEVtAEVjALsxAMvwAMwPALxZAINSABDbABOLAERVAFRXAM |
YeAAZSAKjPqt4Dqkh1AF00AJtSAKaOACHLABLrAEYyAIyOAMyIAMzlANePAFeSkHfWAIfSAH |
Z8AFZ+AO/rAPSDAEScAFatAH5wkLkKAGZxAFS7AEVlAESxAERRAHs9ALs/ALwPALxYANeNAC |
EtAAFuABLlAERVAFVaADYCD+CuH6sjDrB6Lwo6AwAn5qAkEgBnRAC85AC7QAg9VgCF/ABVHQ |
qnn5BUDABNPgD/wwBTZABX1wnpDwCosQBUmAslgbBDhQBDggCLMQCrMQDMVQDL/ADXFQAxxg |
ARawARxgAjiAtV/QCjA7t3S7ChtgARtgAk1gBXRAC8hAC6Ewr8hQDYlACG7ABTpgA2fABDGQ |
BLzgD/xACDFgA2fQBygKCTagA1WwBEZgBDhQAziwBEVQBY7QC7TQC7NQDMyKDcFQBThQAyag |
ti3qAktgBV0gCnSbu+DaCjjgAS3qAjhQBVYwC71AC5zACbTQC8gQDKgACYZwBjZgAzFgA1zA |
CND+dAlAkATaewafAAlAoANXUAVYWwM1gLJgkAi0MAu0MAu9AAy/wKzcUAymgAqJcAQcsAEV |
wAE4UAR2IAq6+79DqghNUAMtQL440AR0MAu9wAmOIAicEArIEAy/8AmpGQXRCwRUsAj9wA9u |
QAVu4AVAYANAAAQ6AAZVAAZFgAM/UANFAAZxkAizcLy00Au9MAu/AAvFgA3ncAzIEA6zUAQe |
sAEcYAI4sAayAMBI/KOKUAV4gAeJQAeJgAqoEA7V0AvIEAq9MK/YUAzM+gtyAAQ6kARTQAj+ |
wA9c0Ad4YAUqywVHUAVLgLI6UAM4UAWJwAmzcLzHOws0zA3AAAvUMA7+vcAJsxAMs1AFOMAB |
I+ACOFAEtZDESUwMbiAHhIAN53AO2DAO1AAM3IAN4cANwXAM2FAMv0ANdeoKU8AEXPAFvOAP |
7vAFkEAIS1AEOIADKosDLjACswwGv0ANwYDHnEDDvTAL1AALr0AN1UALsxAKzhAMiVAFRbAE |
P4ADNRAJjgzAtWAIZ2AIroAK43AO4zAO3IANdSrFrgAJr1CnxYAN3IAKchAFZ/AF0+APnSAH |
HwoGTVADs2wCHLABHNACVfAK4YkKyDoLNIwMyAoM4UkN4XC8s9ALyBAOs5AIiQAGRYADRSAL |
SIzEovAFcqCrv9AN43AO48ANv5AIcVAFaCD+B1zQB4QADNzw0tRACF/QB4TgDs8ACR/aCVaA |
Ay7gAiPAARYgARuAA4TwobDwCa+ACp2ACp0wC4mAB68AC6/QDcgQCrTQC4LrDOGADZdgBUFg |
BbYgpGI91mRN1q3ABGdwBlzwC+NwDuPADeNgB1WAA0YABj8QBVywCJDgCqgwtsWwCHIACd0g |
CZAADL9ACHEQB3jwAy4wAhwwAjWAA2iwCK7woZbtCoxACFPABYsAC78QDtUguDBYDdWADKjQ |
xK7wC89Q1qzd2mKtCFwgB2dACONQ25XMDWjQ0z8ABj+QBHIACa/wC8UADMVADZDwBXIgB30Q |
noRgCNTQDdhQBbP+/ANFUAWJAAvM+gmLAAmMsAiGsAhnkARc0AeLAAzhgAy9EAwDPQvBIMWv |
AAudAAu8UAuuXd+tLQtfMAVnMAfAQA3dEA61nQg4MAIjgANVcARqAAmwAAzUQA1jCwufIAdR |
cAaL8AmwMAdcIAeS8AtxYAVLAAZ4wAjAAAufsAipmZ6Q0AdqEAU6cAaM8ArUUA3IcAzBMAvB |
wA3YwA2/gKKwAAywQAz2HeRj3QpI4AZqcAa/QA21PQt4UAUuQOBFwAVVQAjp+QqQgArAQA3A |
AAlqwAVysAiw8AmQwAiE4ApSnAhoYAio0AmEAAmL8AqwsAiwAAmLIAdfEAVJ4AawwKz+4VAN |
4RAOUnwO40ANwPALsMCswPAKnVALQt7oP6oIagAJcvAFwPAL44AKYFAENdACI+ACVXAEWsAI |
i2AIhoAHkjAO1PALjCAHTOAGjPAKiwALDd4N49ANmpALwPAK0pALwEAN3ZALn7AIfZDWXMAE |
UdAHi/AKsEANLz0OwCDF48ANiA4Mv/AKn7AIreDojl4LX5CafUAItc0NYBAEMTACHKADRfAF |
VQAGhEAIr/ALrlAM3PALr0AIXMAEfeAKi0AIvwAMDT4OmgAJwJALkAAMv9Dg3EANjLAIZzAF |
SWADOsAFc2AIceAKiYAHqIAN4wAMUtzgv6CrkLAIr2AIraD+7Y3eCmcACbDQB8BwDn8OBjjg |
AR7gAkVgBUFQBWCABozwCr+ACr8wDr9ACG7QqnKACosACYg+Dt0QB58ADIXwCcDwC9Tw0uPg |
C3LABTpgAzFgA0NQBWCgsktgBXSAB6gwDr/ACHKQBGegBoawCLDwCobgBqJg8vZdC4rQB58A |
C5/QDdWADNUwC2hQAyPgAjhgBUdQBWgwB4TACLCACsVADcCwCHIQsXhQB3MACcDwCw3ODZDw |
CsAACa/ArA0+DtwgDXLABVEwBDbwATFQAzjQ0+RbBGCAB8BQDISQ1q7wCygKCX2ABJFQ38Av |
pMQwBX0QnovADYJbDbMABj3tAkX+UAVHwAVyQAiQQAivUKe/AAlfgANFYAV0EAefAAy/QA0v |
LQef8At68Am/AAwN/tK+sAh9cAZMYAMfEAMxIPMbMAIm4AJFQAfFQA0AAQzVL2C/fgGD9alP |
FC6i/j2EGFHiRIoV/4Hq8wkSJEOxkH2cdSzRDxcuflT5wUWNIUiGXBUDBowQmBo1lsSB9Com |
NWrj7ugB9kYOrFfAfvH0BWkRIS42StjAwcGCBQ4jRuCwkggVKjpg8GwF9utTny9DIlFEm1bt |
w1avIH2C9WkRKmTOes0KhqpKERw4jkSJoqbPIkiMgP36hOeHiRY/rMj59AsYT263JgGDNOnV |
q188uVH++wRpERcbH2zE2NDAggerNXCAAWOlSZUqXejgefWpz5kjdWqtBa5W1rNXsGC9crXI |
DaFZzpCFMpVIDZoqOL4cmdJH+ydCrl4xqtJiQ80qR+TAegXsF7VCn4Dp+fQLGE9u3HzBgtQn |
io0PMUZYaKCBETgoqQYcliiiiCWKCKKKLl6BZJEzqLAhj1qCw1CiVvqABZXNPpEDCS5M4YQW |
UxxJRI4oqsBBByaYkGMjWBZhBJUqXIjBgxaCSJCLzX6h5hdIXgFGEzlgeQWYX6iR5hdYIFFj |
ihhi0MEFDjgYoYUa+qrBBRyCSDDBIMBgBJY+1KACCC1EybDNf56hog9IYPn+BBIdmCDEFEH2 |
pIMOLaI4wgYgmNCCi0Vc+cUVPMCoYYMRTMBhiSrAqMKQV4D5pRhCPvkFGF98ceUXaQxx5RVI |
3PiiLxuYKKKGFmqo4osjfnDBhRqWWKKIIJYwAg/jIDmDCSC0kMXNDFvhoo9XIDmjWUlm4YST |
RAQBA40okNAhhiGiOOMLOWAxiA4XONjABBdweMIKMOL4xBVUiuEGFTlgeQWYX6iRJhdgXoHF |
EDCWCAIHJLiQA40iqpBDjiNwqCkIK5aowggr8EAFmFdgIWSKI7SQxVgMWwGi2Wb7WCSRPQXp |
Ew0tvhgiBhu40EKOL+QwRJJi8Kh1AxNiCMIIK9D+MMSQmLAp5pdMJnnlF2lQmQQVYF55BY0q |
cKjBhiO4kMMNOdCYAokjcKihBRyKeAI2LggJGmpDvtBBh1Y8Bq4WNZLQAYgz1DiDCzrioAOM |
Kr44YggdpgRCDkJc+aQYxX/BY4macKhhCSvowIMJG74oBptwzhlnHGywoaMJMMSQgxBCqsCh |
hRpsAIKJI6ZgQgcmdFjiBxNGqMEKKwz5JY455DBEDTmaRQKISuBeq5UkkmDiDC6GgP6IL9A4 |
gom2j0Biyhi4MMQVxbv5PBEwcGgBhyCWSAQVQ3QowQZDxgkn/nPOSSQIHIKwogkrqsChhQ1G |
wMEQdDAEJtjABkf4wRL+asCBEQTBCmhQnEF+UQxXSMIQc5hCErxQC+ShpRYi0wITdGDAI0Rh |
ClzgwhSi0IQlBGFKNuCCIVzxi2J8Lhh0aEILXICDJVQhDqjAQxQ+MAVUBCMYvTjGObABBheY |
wAVLKAIOXOABC2zABEEowhGYYIMYAIEJRcBBDTxQgwThARjUwMY4uEENbAQDG6joAxe0UIsO |
UgQUSWjWFJbHBC6cwQ1y6AMXvvCFGpjABC2wwRG40AdDuOIX2BjHLJ6whBa0AAe4SgQtgpEI |
OSQiHM7oBS1mUY1ZFGEEHjCBC0wwAkNuwAMtaMISqqADA3JhkEWoSRCMgAZUcGMc8QtHL5D+ |
MQtiXkIOXJBFWpSZFlm44QtyOIMavlCFJsjhDH1QQ8LUUIUWbEACG6hBEaJwBjlIwhXA+JwY |
gtCCGizBCkvAAy2QQQtTBAMZznAGLZyBDEG4wAMbGMEGGrABE7TABC6oQRBwNQQgMOEMX5AD |
GpYQBDCg4RWfC4cziEkLjoYCGbMgBBdAsUySSmQVR0ADGNTghiokqApo0M5GIEGIJbSAAyNw |
QRCqcAQ0ECIRkggGNkwhBhzUYAlWWEIUZkGLWdBiFhzlqDNmYQUPbGADHGiAAiRggprUqgZB |
wIENdBAFLXAhYXLAAyFc8YtxYCMYtAhFtHrRC2TQwhRx6IIoSrr+V2KAoS9LQMMScFADHBRB |
DZ8wyCsg4QYuROEHHvBADZpAmydYAQx0CEc1aJEIXIkBDUioQjCg2gt8OqMXgqjBBiQwgg1I |
QAIeqAkOatACF9SgBTZAQhSmwIU+qEEOkPgELAyCjWpAtRccdQQewGAFK8hiryStRSVqYIIR |
1AAHNXDBCGqwhET8AhvhmAUqDCEHQqDBBCOowRKM0IQnPKEJVqAFMqpRjUTQRg5cGAIaUBEt |
WswiFLSYhRVcsAEPGNIDI+hLDXDwg5rYIAY2QMIUotCsL8xhEZDQjiRggQpTdHgWnKADDmpS |
hCrU4rnLFMUXWsABCVigBS7wAAdaYAX+OgjCFNXAZzAkoYUv2KAmVcBVEJqwBDEEYxa0mEUw |
TAEJQnAhBjqQgyk4IYhezIIWwUhEDUxQyZoEAQ2JoEMQgtCXEpQgBkkYAhO+AJhmUSEKy2OC |
HOJgiDgkAgwjkMAGTOCCKtTixMpsRRU40ICpjMADHBgBDqwgBjAkAhlQNQUh5LAEMS/BCk14 |
QhOWIIhg9IKjHZ5FIvCABBvMgRCcICYtZkELU8SBNlUAgxzwgIpZmEIQVfiBDTCAARtMoW1A |
sMEUziAHNfTBdJBAhStQgQccuEACFtgAB1xwhVr8OS22OMIGJNAAD7igBSZwQRDaawVOIMMZ |
tOiFKVCBByv+LOEJR/jBFPCAhiXQwRQc5USHTSGIRKDBBlMAAx0SQUxiBqMYr/gELCDxCVTM |
ghamSIQchoCBBCCgBDoAQgxswATtbOQTwCgGNniChxaMYAMWkMAGTFCDONTC2mipRRhMIAGr |
tqAGLcDBE6zwBDrQAhm0CAVHTREHIxjhC0NAQhSY8AU0xMEUnBCEIwTBiVlwwgpoaNsSaoAD |
K+ABFcGgxi9eAQtIwOIXs+DELExBCC6UgAEIQAAGgGADIJxBO33YyCteYRBsoAIHI+DAVDjg |
AhwEwQ6ieDlaItGCDZjABTXoSxCsYAQ60MIZvQgFVGfhCjQswQZ1UAcuSiEHG3z+IRGccAQn |
BJEIU6ACD18AAhJc4AEJeKAFQUCD3j8Bi1d8AhWoSAQauGABDDAAAQEgAANiAAQkyEE7kDiD |
DqCggw98wAZH+MEPXGACCZigBn0pQitqkfiJrKImSxgDGciwhCAs4QmCQEYoOMHRUNACFYbg |
QgzWII483KAHa9ABCxgCNJADPHCDQUICA/oAG3AB19qAEaiBH0CDPmgWKuACLjgCGyiBXUOA |
ACAAAggABMAAIAACLugDSKACDXiABCAAASiAAjgACqCAG/gBHKgBHCiCHyiCKqgF8pMIYhgC |
OrgGesCHe3AGMMAVOpgFWjAFWggFWviFT9ABBLiBNqD+gAAAgAAQAAf4AAMogS+IgkHSgiGw |
gTKzgBHYAAmwAAywgBKIgQ+IgRKoAAxQgBiwAQT4AB34wA+EOwzQgSSggjNgggQoAAH4QAMo |
AAIQgA9MABaIhDXAgSAogiCwBVHwwYiohVG4Bni4B3y4B3pIhzEoAiuIFk6ghWAoBkkAAgRw |
ACgggAB4wQDYQwJggCEYpETAgy+IgkFCgheRgyMAAhv4AiAoAQzYAC6oAAb4giEgALgLgA9E |
AAZQgBjQgQs8Aw0QAAIwAAIQAAEgAAHYwwAwACk4BBaoASMIAlG4xIgQhW+IB3y4h3jEh3tI |
BzIoAkegBVOYBWD4hChAAAP+UAADCAAEIIACMAAB+EABCAAEgB4miAEGQIAGOIIYYAALcIMh |
2LUjYIJdi4EjwAAEYIAPHAC4+0AGiAE8QAVTCAZBwAMF2EMDmEUBKAADIAAEYIEeoIAKqIJK |
kIV1hAhcIAd4uAd8IMp70Ad8SAcriANU+IVXYAQuSIABMIACGIA9FIAPDIAPDAACQIAYYIAB |
CIABIAAEIIAACAAESAC4Y4C1xIC1ZAAEIAABQIAAaBsEKAEgCIZ4vAd9uId0WIBu/EABmEUC |
EIAAWIAbcIABwAFb8EmIIIZlIAd90Et9wId7wAd9SAc5IARUgAQ5UAACQIA9DIA9NEsCCAAC |
EID+D2QABUCAPRwAAhCAPRQAuFtLDGAABGAABCgBLVAABMCAEogBLkgEetDLe8AHZDCAPQyA |
ASAABPhAAwgAA3CABCAADNgFdpAFa0OLWmCGZYAHeMCH4rwHorwHZ5gDQyCEGNjDARCAPTTL |
WQwAAkCAAQgABqgABjDLANjDAPhAuDMABsCAD7ABDGCAD7CBCCiBGBikM0gEeKCHe8CHeOSE |
wRQAAhAAAiiADxQABCCAAjACfcCHd6gF7ZQIWWAGZfhOfLgHfIhHotQHosQHU5CDKEAAAgiA |
DwwAAhCAWTRLAhCAAJhFDLCBtdQBBAgABLCBBoA7DECCGGCAD9CBEvj+gBKwgSMIgiJYgi9I |
AkEgB3y4B33Ah3vYgz00AAMQgFk0gD0UAA5IB72chhOTBVvABVvABVuwBVxIBmUgB3qAh3vA |
B73EB/GEBzoogQCYRQEYzA8UgD0MgD1EgCEAAibgAgyogA/4AiAoAQyIASaIgRL4AO2xARzA |
lSpAAy6wAUGAB3rQS3jggwAggDIVgA8UgA8UAAIQgAEwAEe4B3y4B314h72SBVxYBnIg1mUg |
B2UgVnL4znsgynuA0XsgynsgynRogAD4wAAYzPwMAAEggAAQAAJAgAD4QAvgAh1AgihgAh2A |
HiYAgiGwAR04ghqoJBOgVxfAgSpwAySwgUT+IAd8iEd6IIdGUIAPDAACMIA9DAAEIIBuJAN4 |
iEd8uId3qAWSqoVkUAZi/c5kJYfvhAd80Et8iEd80Id7gFGipAMBMEsCCIA9DAACCAABIACz |
FIBERYASMKAhYIIomAIumIIzmAM3sAIcqAEP2AAJsKoWCAI36IMkiAFOIAd6wIfvJIddwIEA |
+MACCAACEAACKAABKAADaAJloId7wAd4uAd6kAWSwgVlIAd4oAeOhVuijEd9iEd8iEd8iEei |
1AeibIEA+MAA+EABCAABKIDBDIAPNMsPlIApkIO764NFIARI0Ds0qIIfqAEPwNyaQANIOAMd |
GAJO4Fh6IIdrWAb+T8ABAhiAARAAAigAsyyADeCDZSAHeqCHeyBKeqiFZaqFbCAHeChZorwH |
otSHeMSH4rwHfLgHfbgHotRLWkCAABjMAPhABBCAD0QAAggAAhCAAPjAEpgCQngFV5iCGGCC |
PoCERYAEQ2AERrCCIKiBILACNDAEQviCJDiCUCAHeMAHeIiHZViGXfCENMAB12IACagBI+AD |
T1AGciAHeCDKeNQHWYiICX4IUUgGcqAHotRLfNBLfLgHfLgHfDBefLgHfNBLoryHJYA7AkAA |
BoA7bQ0AAggAAZjFACCAD4iCPviET4iBDxiCJJCDu9sIV8CDIiYEVzAEOWACG4gCZCD+B3rg |
WHLw311Yhl3whEZoBE/wBP9dBgaGB6K8B3yIR2Kg4AmWhWQgB3i4B6LUh3jEB+PFB73UB3yI |
R3zQB3zQS6JMhxFggBhoASSoASCwgRgogbVEAAZAAAb4wAAgAAQoAR04g41IghI4g40whD44 |
AznoA0jY4VcghD6ggiSYEiSgBXLg2HhgYC72311Yhl3gYnIwh3jUB73UB3xgB1koY4gQhWQg |
B3igB3yIR3y4B3y4B3zQB3yIR3y4B3ww3njEB33Ah3sgSkcoARxYAhyoCRxYAjnoAzmIggtM |
AhsoAQxggDKzgSlYhE/ogzMwBFeAhD5oFjk4gz5YhD6YgzP+mAIgsIEYKIEh6AVlgAd8+M54 |
YGByWAZlUAYuvgYGjgd6uAd8iEd8uAeihAd2yGWIEAYGJsp7wId4xId4xAd9uAd8aGZ8uAd8 |
iEd8uAcYRYcqiIEaaAGrqAEc6AI5gIRX+AQ5mIIkAAIbKLMPiIEkUAPtMIQ+gIRFUAMq4IIp |
iAIuOIMpSAImSAIgmJISGIJeYGB4oId7gId4KOiv/mp4aGa9xAd4mIaL/gdmUAZ4oAd8uAd8 |
MF58uAd80Eui1AfjxQfjxYdqiAEJ8AB6bYEaWAI0wANI+IQ+4IIhsAEkiIES+IANsAEukIMp |
OAM56AM54IIogB4bAIIhsIEkgB7+ILCBKZkCWlgGcvhOovzOePjqeCCHePhOfLgHfChOfLgH |
oryHdACHi54GZSAHorwHfLgHohzrkr0HfcCHeNQHfIjHkhWEEXAtDzCBGgiCJ+gCSOgDOYiC |
IYgBIJiSErABE3ABwIgCLpgCLkiCITCg9QaCJGCCIbABIIgBG4iCXlgGcoAHeiBKjo2HePhO |
cqCH76QHfLgHfcCH4sQHvcQHeGAHUSjjaVAGcqAHGNWHeCRKfYhHfDBefNBLfChOfIhHfEiH |
KtgA19oAE6gBXDmrKGAC7SmzGKgVHFgCHXgRHbCBISBBJACMI5gCLmCCKEgCEmSCUFgGcuDY |
eyBKeoD+W44lynvAB+PVh+LEB3jAh2koY1lYBnKAB6LUS6LUS3y4B33QS3wYa3yIR6K8B3wI |
hhbwANfagBaogSWIgh84AhuIgQ/QnvXegFqxgR8YgiNgAh3ggkGKAznAg0SIA0KQAy3gAib4 |
AkfwX3Kgh3ugh+LEh++8B3xoZn0Ya73EB3oAB1mY4FpYBnKgB3ggynvAB33Ah07Xh3jEB324 |
B3yIR3yIR6KMR3jAAxvwgA2QgErCgWDHgRawgRgAAibggi/AARPYABNwgSJYgiKoAi7QgkRI |
BH2bBVMIhkQQgyCogiHQAk9QBnKAB3ogSr3Eh3vQh3vAh3jEB33Ah3vAh2b+1odmxod5AIda |
gAhiWAZy+E6ijEeivAd9wId7wAe9xAe9xAd9iEeijMeSvYdqGIIRMIERqBUcWIIgWIIamBIg |
OANDkIMWkAAP2AATqIEmqIIlqAI8MAVamIW5cgZkoAVTWAIcWIIpQINQWAZy+M57IMp4xId7 |
wId70IdOj0d8MPp4xId5kIWHkIVlIAd6IMp7wId4JMri1Ad8iEd8uAd80Et8iEd8MF6iTAQJ |
iIEWMIEaCAJcwZUYsAEm+AJCAAMTcC2rMoElsIInsAJTgKqP8PtEqKQgqAI0CIVlIAd6gId7 |
wIek73R9KE59KE58iEd8YIeHmAZlIAd4gNF4hNH+eMSHe8CHscaH4sQHfSDKeyDKe0iHJcCA |
GKgVHAiCJgiCIbABIIiChFmCFqDXDZAAD6iBIFgCPEAFU6CFXggGZAiGWUiEJRiBFlgCI6iC |
RrgGcvhOvdQHo9cHxu90eACHh2AGZSAHeoAHfLgHotSHTscHfcCHe8CHpCfKeMQHZ7CBEtgA |
E3ABHBCzQbrARSCEIsCBJQCIIy02eKixBMynRKYWzkqUiE4RFyNMLFlS5c8yePDw3evo8aO+ |
jyJH3tMnEt60f/+yLSMHryO+e/jw3cPnER9JfffwicTXEZ9HeKZKfGjRokYQNKZQmXrlCpUk |
VK7w1NgwAkcVQ5BQmZr+lYgOmio1WrhoUaNKEzSNlpGLJ1LfPX0i9XXU51GfR30j8dEjl03W |
v1q7lpGj11HfR3338N3Th+8evnv47uETia+jPnwi8ZEDE6OFixpBCHGiNQsbsF/AXhmqYmLD |
CBxWCPUhBMxUnCA1WmzwMKIFjipGwIRaBo8eyXv67um7p++5vuQj9cEjl02WSlvKyMH7iE96 |
R30i8YmceU/fTHz0rnlaUgMHDjqcaM2aRQtbsV+uCAXZsGFEEVbM0ccixeBRxAYSNCCBBCO4 |
EEQVTZDRyDXmwAOePvdAd48+4OFzDz0aMSOLSrIss4w58NyDzz0z3TOTSPjcg889+NyDjz7+ |
HeFzDz734HMPPh2lp9EudNiwhBWCmMIJLbT0Egw2qLiCRwv+1VBFFFx8wcUiaLiwQQNhbuCB |
CzgsgYMYoSwDDz0jPfeRPvjo45E+HunjkT70wEPON9OopJIsy5ADTzz34HMPPh3hI5I+JOHT |
kT74dKQPPvfgc89M9MBDzjKNHFHCF44I4ggnTZqCzS9o1CDBBiYU8cMXXGhxxhlf4LCBBRZ4 |
sIEJLgSxhAtGeLILORrdow940uHTUTzwkHMNLrL8qRIzyiwDDz334HNPeiLdg889+HiEj0f4 |
eISPR/jcMxM85JCzSyNklGBDInzw4QgtswRTDCo4tODBCDUUwQX+wQWf8YULJpgwggceuIBD |
ES6I0cgy5NBDDz7eeqvPRzN1RI+71+BCzLR/7qLMMuTAgw896c3k0Uz36HMPPvfgcw8+9+Bz |
Dz734HMPPvfgo89M99ADDzm7NEJGDCUMgYYggnBiCiquGFKDUThU8UUUUxDMBK1fwIeDCy14 |
sIEJQVSRhifLkKORxnHjcw8++twDDz3kNINLLSVPm4wyJ5KjETz0aDTTPTPd4zI+9+jT0Uz3 |
6CMSPh1p5O4ujZBhAwYlDEGHIKaggsorjIABXxVHcDEEE0wkwcQUVBxxRBNL4BCDCSO0EIQV |
e3iyDDnm0OORPh7p45E+H12sETnXMCP+i98lT+OJMie66y485NCjET3w0INPR4zrcw/jIs3k |
7jKeNJIGDiVgEEMUeOCxCCSQfGIIHnJMMYQN/dugAwCBEAMb4MAGMYiBC1qAgyBUYQ+eWAY5 |
NHIPfNwDHyLBh0fwQY94xIMc9CBHMmwRvejZQhXKUMaJlHGiZVyvhfCgBzzoAY/0eAQfHsHH |
PfChD3xoZBm78MQf0mCFDZRgCFEgmBzkYAhCEKIPZ2DCEGJggw/EwH82OGAMPhCDD5TgCE9Y |
QhD20IhdLIMc9IBH3DqCj4vBwxzuWgYuZDHCEdaiFbYYhSo84YkTLkMZJyLHMlpIDnjQAx70 |
uMdMRIKPe+D+gx7kOJEn/sAHMizBBiWwQRK4oIWCceEMXJiCDg74ARtQQAc2iIENDliCA36g |
BCNYQhVwkIZGeGIZ7oLHTPSBj3vgQx/pgQc9rrcMXMhijsb8Uy1kgQtSNKIRntjFLpaxi2Xs |
QhknOiHh6AEPejAOHxohxzL0+Ac+kCEINihBDGwwBCQMIQlDAIIO/PeBD8QgBjbQgQ1KQAEb |
fKB/MfhACT5ggyG4gAx/UMUulkEOepADHvi4Bz46Qg+NXM8cnhhFLY6p0T/Jwha4GAUimvmH |
RujRE7tQxgqX4S6N0AMe9IAHPdx1Ik80gg97EAMHNlCCDdQzBjYowQdiMM+h9lT+B1b8gA2A |
gAQbzLMEFbCBC57wh0Z4YhfLIAc8yEEPeNCDcO66xon+MApZGLOsZZVFK3DxBz7soZnN9ERK |
TyTIZUDTE43gQxqsUIQPxKAEJdABFKAwhTV4wQZeqAQoiFGJGwCBCl5QRCvW8IEY6MANq7DF |
M1oBiitE4QhN2MMf9LjC68HjeivcRSNwIYuysra1qZAFKOxgLz78oREl3YUn4roLPf6BD3ug |
gxVcwAUm2IAKopBFLUTxD1Ewd1qiaAUlavGnVkRCFLXwGzHqUIM0/OEPJY1rSvWYBlC0trzl |
lYUsKLEKRKRhD24taUkb0V0+pIEMRrgCHFpRiUiIwm/M/v0vgEWxASPsobvw9cQuPLGLkjYi |
DauoBYAjLOEJ/6kWrViFHfbQXT50t7t8+EMa0vCEIgiBEhQ+8X9lAYcajIEP3W1EKA7ciD/w |
IQ15QDGOc6wSWazCDmQgQ4jTwIcQW6EJOLiBLHSs5H+YoQZFSEMo3BqKZqqCD2mwgyWWrOUJ |
y6IVfnjCE3DQhCAUAQd18AMxtqxjUcBBCkUggxWCTIYx1KEVolAzniMsCkscIg9XEEIrHpFn |
JYuCEm2QwhikAAY4yKIWEn70tAICADs="/><BR><CENTER>ALCASAR</CENTER> |
</td> |
<td width=550 bgcolor=#FFFFFF align=center valign=center> |
<font face=arial,helvetica color=black> |
<font size=4> |
L'accès à la page : |
<br><br> |
-URL- |
<br><br> |
<font size=3> |
... a été refusé pour la raison suivante : |
<br><br> |
<font color=red> |
<b>-REASONGIVEN-</b> |
<font color=black> |
<br><br><br><br> |
Vous tentez d'accéder à une ressource dont le contenu est réputé |
contenir des informations inappropriées. |
<br><br> |
Contactez votre responsable informatique (RSSI/OSSI), si vous pensez que ce filtrage est abusif. |
<br><br><br><br> |
<font size=1> |
Filtré par <B>DansGuardian</B></a> |
</td> |
</tr> |
</table> |
</body> |
</html> |
<!-- |
The available variables are as follows: |
- URL- gives the URL the user was trying to get to. |
- REASONGIVEN- gives the nice reason (i.e. not quoting the banned phrase). |
- REASONLOGGED- gives the reason that gets logged including full details. |
- USER- gives the username if known. |
- IP- gives the originating IP. |
You need to remove the space between the - and the variable to use them |
in your HTML. They are there above so extra processing is not required. |
More example templates are likely to be found on the DansGuardian web site |
on the Extras page. |
Daniel Barron 2002-03-27 |
--!> |
/conf/template.html |
---|
0,0 → 1,324 |
<html> |
<head> |
<title>DansGuardian - Access Denied</title> |
</head> |
<body bgcolor=#FFFFFF> |
<center> |
<table border=0 cellspacing=0 cellpadding=2 height=540 width=700> |
<tr> |
<td colspan=2 bgcolor=#FEA700 height=100 align=center> |
<font face=arial,helvetica size=6> |
<b>Access has been Denied!</b> |
</td> |
</tr> |
<tr> |
<td colspan=2 bgcolor=#FFFACD height=30 align=right> |
<font face=arial,helvetica size=3 color=black> |
<b>-USER- </b> |
</td> |
</tr> |
<tr> |
<td align=center valign=bottom width=150 bgcolor=#B0C4DE> |
<font face=arial,helvetica size=1 color=black> |
<img src="data:image/gif;base64, |
R0lGODlheQCVAOf/ABIaCxEbGxAbJBkaIRgiIxsiKCArKyMqMCIyIigyMzk6KDk6QjFCJ0JC |
KzhDRDtCSD1BWTxKJEhKJ01Bej9KSz5OLUtKM0tChjtSMD5LbUdSU1FTL1JSOlVJlVtSMURa |
N1lKnllJsVFSfVlaMVRSlkJiMmBaMlBbW1tSpVdSsWdQtF9TyFdiY2piLmljOmFbp2NarVFr |
O1tpU2ZayWha0XFqO1lyQmtxaHpyQ3FrpWB6SWZr13BrxXRydnJqzHV5R1yGP4V6P297e2OF |
QHxxx4h6TJZ5Q3CGSWCPQGKOTHh61YaGQWuOR42GQ3qGhpWHP3CPaGeWRoWHhGyWTmiWWo6O |
SZWOS42OZ4OPkIeF6HuWY5GGym+eToWWX4eWbHydT5eWUJeVY56WS56XUqaWR4uXmJSWk26n |
W5SfULeVUnqmYpKeepKX2JSejYenbJGmYZ2fnJ6lY4iuWIauXqWnUpinfK2mZ5iuYp6uVqOn |
l4i1Xb+mUb6mWIa2ZKWnpM6mT6ml0Jym7rOvW6Kn6Y+7XKK1aIu+XqOvsMCueK62X6C2iY+/ |
bJi+Z9auVry2XLKuzInGaqu2pZTGXpXIZ7W3tLC9i7O3xre+eq+25aTHYp3Jaa22/8W/ZKPH |
fOa2YZTPbL2+qNS/Yby+u8++jdW/fLXHjcfGYqq//6vOacG+z92/d77GnL++777Gr53XbJvX |
c6DWer7OesfGvcnOaMvPYsXHxMrHuK3XcNbHm6bZd8XOj+3HX6nXkNfObKrcc6Xec6PeesXW |
ZtXOjcDVjcTPva7ebsPP0M/VdtPWaebOhPbOX/XOZujNl/DOeeHVZcnWo8vO+d3WebHketnV |
s7bmddbeacrX2PbWa7/mcOnXi9TW09fehb7neLrnhNLW5vXXetjdrM7mc87exL/udv/da9fe |
9P7fetDueefmh/Xnb9/lx/blhOTnr+Xn5N3vx+7vlv7vb/3vduXu9/j1j/72e/D2w/72s//9 |
efv/cvD2+P/+gvP+1/r+7Pj+//z/+////yH+EUNyZWF0ZWQgd2l0aCBHSU1QACH5BAEKAP8A |
LAAAAAB5AJUAAAj+AP8JHEiwoMGDCBMqVFhLlKVHgwINAvQIkCVRCzNq3Mixo8eDolI9ArRF |
icksbJRkUZJlx5ZHtT7KnEmzpihAW4jQ2LEji89AmwJtGropUJYdgGoqXcp0oChAgHzQWDFj |
hg8aPngqycKqHLRy8qBtysKmqdmzGkU92sJjxoqqVWlUpbFihxJo/aAB4sFGXrlAWWqhHUz4 |
n6hHRFSsWDFjBVwaVVfQmBxIXr5++TCx4SEP045UhUMvrfWIyIoZNKrSWDxjBY0VVSevYIVJ |
Xj9v0KCxwQRtxZZaooN/FLVlsYoVM1bQWAx3xgoaM2jMoBFICaZB+fJB2wTN2woaloT+i9do |
yceK5ipmqKCxeIYKGnBX0FiBaQuNQaz6yQvEqtwOGo+MJyBCluSgggowwHDgCirQMIMKMyy2 |
wmQz0DDDCoMAEsIMWbAiT27QBKIEGwOWOJAoW6iQAgoohJDCgQdKWNUKMyxGwwwr+FDOFiuo |
QAQrgbASyCZZbFGLiQOKskUIKIAAAgpOOqlCCDBWqYKEK6hARDnQsMJKboFscgobO4iC5Hii |
bIECCB2A0MGbHYDwZpQoqBCCCivQgOViPGwxyCCYBBLIUIEokcqZwtVCBAhwNtpolCjAOEMI |
B6agQoIppBDCCjQoEcgmgWyihCWIBvdICh1M0OgEjaIAggr+L7xAwgQZNJCAAw4wkEACC/T6 |
gAgowLCDoIFk8UipoYlCRAcTdDBBBxNMAGesIEyQwQMKJFAAAQccQEABBhxgwAABFFBAtwtA |
0MEKgezwCLKFAdLBBReIMMEFHUwAwgsidJBBAgYUQEABBBhgQAIGdFvAAQ9o8EABBAhQgAAF |
HPBAB0TUAu9gorxA7wT0TgACChNAsIDB5h5grgEDmGvAAAYcIIQfcDihQQIGC1CAAAIcAMjG |
gwHSQbT0OjkBBAkYQIABBCBgQAEHGCz1AQYn4IQZWPSgwQIHGGzuAQRIAfRZsuRArwgXdEBC |
BgkYfEABBhAgtcEHzG3wARpo4MD+AQIUYPABBiBwAAEniDJ2U7KQEO0FHWSQAAF2F3BAAQZ3 |
a0C3BRxgQLfmCmDwAQYcYO4BBRiQACWHM0XJBRN0gAIEBBBgQAEEGHAAAQYcYIC5BRxQgAEF |
JGDAAQYcYMABBnR7gAEHSH2AAQX0UEvqSgFyQQcqiGAAAQYQYPAABhRgNwEF2N2tAQcY0C0C |
BxRgAAIFGHCAwQtQQj1NorwwQQciHEDAAQYogAESYLACGKAABLCb1ApggAIkwAAHMNgBDHYA |
gxXAYAcwABzuNxNRvGACIkhAARJggAIcQGrKK4DUCKDAbhksAQcw2AEMcACDHcAABTAAAYRQ |
Cw5+RBT+L0CBCAygvAMYgAAHyJvBDmCAAnQrAXNLgAEKQIADJKAHTliAAAxwgF0ZoFsGY4Eo |
fOgRWWxhCz0wQAIKYIADGKwAD+gBCxJgsG4hwAC7OoABBLAADZyAAgZIgBPKkAADKK8A3UpA |
AU4gCjJ6RBS1MAMBDiC1BZxAAwkgQA96YLBuGewABiiAA4RACWu0wxplcAABbtCDAxjgAAYo |
wAEKYLAH1MKRH+lBtwzWA2v0Qx61oIABNLAAqe3qAAZgQS3kkY9+9MMf/mgHBQxAgW4ZrAAH |
MEACDuAAUeDSIz0wQAEMwAJv9AOa/bDGCQJAgLkdoAAssIY88uFMaEKzFg7+EIABulWAAhig |
AAY4QAJE8c2OCMEAu6KEPPoBTWdaIgGxM0ABDJYAUeSjH/bMqDzKQAADHEBqBzDAAQpggEMU |
lCNCSMABTlCOfmQUmlgQgAEKYAACFEAI/XjpS63xAAIY4AAGSIABCtAtAhzipBvpQQIMIARo |
9iMSosgHNLWRALsdIqPG6IEQDiEPe2JBAFIrQAKkJgAzIFUjQjhAAg7hj3yw4AFSgAM0+XEC |
AgiAAAJIQCrsaQwDEMAPosBCPqBpjAMUwAAFOIDBDmAwIdTirAsRwgESIAp/HCIAJ7AGHCgB |
TRYQYAEneEACrAHNfpyAAAU4gTf8gAVotsMBBTD+wAH6OTcWiAKyCnGCARZgDH8IgQAGKIMo |
egDNGxDAAU6QwgmMAc1aFIAACSiAEODAAntqIAAGSIABDnAAAxygAD2oBW4TIgUDLKAW/uhB |
AApAATiwQB7+0EAABFAAAxxACP3wBxwCMDcGsCAf0DwBAQzA3QIY4AAGIAAWxpsQOBggAZbw |
hxQIYIAEUOAE/RDHB35QhB/8gAMUsIY/4BAAqR0gACew5wkIYLACHKAABiMAFhiMEDgYoABw |
8AclCGAwAVCgHtFIhz7uQeR7OGMU/LBGAgRgAAEYQAA9gGY+NEAAgx2gAAY4QAEGgAUaHwQO |
CSiAEKB5gwEYQAJ82AX+PO6hjzbfwxnXwIc+7KGF2BVAAA6QBzStkYACzC0BBiMAFrxsEDgk |
4AAnyIc/2nECHHiCHOnQR5HvoY94pEMfRJ4HJ4rQACF4w55YCIDB+mmAAnDXACeoBWFWrREz |
JOAAC7AENNmxC3LEQx/30Mc99EHkNvva1+iwBz+gaY0EFMBgCDBAAQ5QAIM5oBYLiba0p03t |
hfjBAAcwwAnkYY9lLIMekyZymyfd5nvo4x5tnsc8wjC3AiSAuwY4QAEWIIpq2/ve+DYIHBLA |
3QaQYhfLIEc8wt3me+jjHm2+h6/v0eZ70AMeYDCAAOaGgAIYbAG1yLfGNy5tOCTAAArgg7f+ |
yREPeuijyPogsj7u0eZ7tPkebb7Hr9PBgQJIrQBzW4AoOM7znhNEFBogAA7I4W1zwIPI+iiy |
Pu7R5nu0GR9tvgc+2nyNeOgjHRwQgMEOUADucpcAh/C52DleixMkgA/kWAY54kGPSeujyPrA |
hz7u0eZ7+Joe13AGOe6xiwYY4AAFMAB3C2CAfkph7IjHtyhOkIBQkGMZ8IAHPYrcZiL/+tf3 |
mEc6rgEPesSDHs5QwAASYIACHGBuCXCAKBLPemr3AAFFCEU66AGPcN9DH/fQxz3afI823yMd |
17iGOeJhDnPAgxMJkFoCDFYAgx3AAH5ovfQXIoUCGCAIobhGuPX+QWR93EMf+NAHkdPhjGuk |
I/KRJ8cyaiAAA3A3AQUw2AEMcAACOGH6+D8IFgpgAA7sYQ/OcA++dg/6QGRtdg/pkA6hEArX |
QA7oBw/k8A3MoAEEYAD9ZDcGUAAGkACikH8eKBCHYDAJ8Azo8AeO4Az0gA9FRg/p4Ay74AzO |
cA3kAA/0YA7kQA7zsA/84A/GkAAEYAAEYDACgIFl8IEeeAgGowH5wA/O0AihsAvOkA7OcA3O |
sAu7cIPLQA7mcIPksA72kFH+cAIEYAD9ZDAFIABSQwALIApGiH+HQAAG0APQtA+h4AmhkA5E |
Rg/0QA7mQA7eVnzLoAzswA/9kFH94AT+AmAwBWA3B2AwBCAFtdCGrScLQkAABuAE/ABN9RAK |
jeAJ5GAOXOhtorgM5lAPzgSG/mAMcyMABWAABWA3BVAGksh6h2AwCSAE/eAP/eAP9cAJf+AJ |
yjCKy+AJxJgM+4CK9tQPQiAABtBPc9NPBkMACyAKszh2sqABBGAwLJAP/uBM/cAPzMAHf9AI |
5NgIf9AIqlAPyAiG1mAAAVAAAiA1AkAABWAwOqAFxFCNHCcKtUAJrVAJHGAwCOAEYNgP/rAP |
04ALpEAKwjAN9cAP0NQP6whN/XADAmAwBTAABFAADBADXzAHkkAIa3AIlFALolAL+ihtoiAK |
h4AFJ3ACa6D+A3LQCR9AABrQDqjYDxnFDxnlTBNpT9awAARgAAZQAARgAVPgBotACIsgAw5w |
Ca3AAiwgBHBACSuZkgUhC8TADlKgAQtAAAMgA7qgAX1gCItwAIeQUd7oD97Ylv3ADz8Jhk4Q |
AAawKzZwBn2Ql4vwCjKwADIgAxQQmBRwA5dwCatADLKQkqLgB6WwDbGADhJQAERpAA1wBKjg |
Bn2gCPkAhm7ZmXFpT/ywD88ABFqgBouQl5CQmp+wCF1gAQmwAA4QmA4QB+hwCcewDatgC7Kw |
ELzZmwZRCzdgAHYwD+gQCwsgALuyAYmADsFgCHPgCvWAiv3gD/3gD87kD870k/z+oA7P0A3d |
AAywAAufAAuvkJepCQmf8AmvEAc1IAEKkAAL4AAPEAe6cAnRcAmxEAu6kAdwUAu++Z8KYQYO |
EAbhkA3HoAG7wgE/IAjIUA3OYApyYAiw8Az88JnrWA/P0AmLIAd9AAmv8KGwwAiLYAiQ8KGf |
EJ6wAAyQUAMcwAEuIAEMcABVcAzHkAgJ0CsJsABwIAr/0KM++qNAGqRCOqQ9KgoOkAjzsA2X |
oAELwAE4YAVkwAnVAIOoQAh9AAmfAAzTIA5cyqXEIA7P4A6oqA7PwAiMIAdnIAeLAAmvAAup |
CQt9sARVIAe/UKew8Amv8AvFYAguIAES4AJF8AMNAAb+unAMcUCUDuAElECkjNqoRCoKJ3AJ |
6FAKwvADDTACLlADRWAFqFANzlANyDALhCAHhuAKhCAHXyAHX/AFXMAFcrAP/sAPw9AJjLCq |
XHAGbrAIi/AJi/AKi2AIcoAHVfAEVtAEVjALsxAMvwAMwPALxZAINSABDbABOLAERVAFRXAM |
YeAAZSAKjPqt4Dqkh1AF00AJtSAKaOACHLABLrAEYyAIyOAMyIAMzlANePAFeSkHfWAIfSAH |
Z8AFZ+AO/rAPSDAEScAFatAH5wkLkKAGZxAFS7AEVlAESxAERRAHs9ALs/ALwPALxYANeNAC |
EtAAFuABLlAERVAFVaADYCD+CuH6sjDrB6Lwo6AwAn5qAkEgBnRAC85AC7QAg9VgCF/ABVHQ |
qnn5BUDABNPgD/wwBTZABX1wnpDwCosQBUmAslgbBDhQBDggCLMQCrMQDMVQDL/ADXFQAxxg |
ARawARxgAjiAtV/QCjA7t3S7ChtgARtgAk1gBXRAC8hAC6Ewr8hQDYlACG7ABTpgA2fABDGQ |
BLzgD/xACDFgA2fQBygKCTagA1WwBEZgBDhQAziwBEVQBY7QC7TQC7NQDMyKDcFQBThQAyag |
ti3qAktgBV0gCnSbu+DaCjjgAS3qAjhQBVYwC71AC5zACbTQC8gQDKgACYZwBjZgAzFgA1zA |
CND+dAlAkATaewafAAlAoANXUAVYWwM1gLJgkAi0MAu0MAu9AAy/wKzcUAymgAqJcAQcsAEV |
wAE4UAR2IAq6+79DqghNUAMtQL440AR0MAu9wAmOIAicEArIEAy/8AmpGQXRCwRUsAj9wA9u |
QAVu4AVAYANAAAQ6AAZVAAZFgAM/UANFAAZxkAizcLy00Au9MAu/AAvFgA3ncAzIEA6zUAQe |
sAEcYAI4sAayAMBI/KOKUAV4gAeJQAeJgAqoEA7V0AvIEAq9MK/YUAzM+gtyAAQ6kARTQAj+ |
wA9c0Ad4YAUqywVHUAVLgLI6UAM4UAWJwAmzcLzHOws0zA3AAAvUMA7+vcAJsxAMs1AFOMAB |
I+ACOFAEtZDESUwMbiAHhIAN53AO2DAO1AAM3IAN4cANwXAM2FAMv0ANdeoKU8AEXPAFvOAP |
7vAFkEAIS1AEOIADKosDLjACswwGv0ANwYDHnEDDvTAL1AALr0AN1UALsxAKzhAMiVAFRbAE |
P4ADNRAJjgzAtWAIZ2AIroAK43AO4zAO3IANdSrFrgAJr1CnxYAN3IAKchAFZ/AF0+APnSAH |
HwoGTVADs2wCHLABHNACVfAK4YkKyDoLNIwMyAoM4UkN4XC8s9ALyBAOs5AIiQAGRYADRSAL |
SIzEovAFcqCrv9AN43AO48ANv5AIcVAFaCD+B1zQB4QADNzw0tRACF/QB4TgDs8ACR/aCVaA |
Ay7gAiPAARYgARuAA4TwobDwCa+ACp2ACp0wC4mAB68AC6/QDcgQCrTQC4LrDOGADZdgBUFg |
BbYgpGI91mRN1q3ABGdwBlzwC+NwDuPADeNgB1WAA0YABj8QBVywCJDgCqgwtsWwCHIACd0g |
CZAADL9ACHEQB3jwAy4wAhwwAjWAA2iwCK7woZbtCoxACFPABYsAC78QDtUguDBYDdWADKjQ |
xK7wC89Q1qzd2mKtCFwgB2dACONQ25XMDWjQ0z8ABj+QBHIACa/wC8UADMVADZDwBXIgB30Q |
noRgCNTQDdhQBbP+/ANFUAWJAAvM+gmLAAmMsAiGsAhnkARc0AeLAAzhgAy9EAwDPQvBIMWv |
AAudAAu8UAuuXd+tLQtfMAVnMAfAQA3dEA61nQg4MAIjgANVcARqAAmwAAzUQA1jCwufIAdR |
cAaL8AmwMAdcIAeS8AtxYAVLAAZ4wAjAAAufsAipmZ6Q0AdqEAU6cAaM8ArUUA3IcAzBMAvB |
wA3YwA2/gKKwAAywQAz2HeRj3QpI4AZqcAa/QA21PQt4UAUuQOBFwAVVQAjp+QqQgArAQA3A |
AAlqwAVysAiw8AmQwAiE4ApSnAhoYAio0AmEAAmL8AqwsAiwAAmLIAdfEAVJ4AawwKz+4VAN |
4RAOUnwO40ANwPALsMCswPAKnVALQt7oP6oIagAJcvAFwPAL44AKYFAENdACI+ACVXAEWsAI |
i2AIhoAHkjAO1PALjCAHTOAGjPAKiwALDd4N49ANmpALwPAK0pALwEAN3ZALn7AIfZDWXMAE |
UdAHi/AKsEANLz0OwCDF48ANiA4Mv/AKn7AIreDojl4LX5CafUAItc0NYBAEMTACHKADRfAF |
VQAGhEAIr/ALrlAM3PALr0AIXMAEfeAKi0AIvwAMDT4OmgAJwJALkAAMv9Dg3EANjLAIZzAF |
SWADOsAFc2AIceAKiYAHqIAN4wAMUtzgv6CrkLAIr2AIraD+7Y3eCmcACbDQB8BwDn8OBjjg |
AR7gAkVgBUFQBWCABozwCr+ACr8wDr9ACG7QqnKACosACYg+Dt0QB58ADIXwCcDwC9Tw0uPg |
C3LABTpgAzFgA0NQBWCgsktgBXSAB6gwDr/ACHKQBGegBoawCLDwCobgBqJg8vZdC4rQB58A |
C5/QDdWADNUwC2hQAyPgAjhgBUdQBWgwB4TACLCACsVADcCwCHIQsXhQB3MACcDwCw3ODZDw |
CsAACa/ArA0+DtwgDXLABVEwBDbwATFQAzjQ0+RbBGCAB8BQDISQ1q7wCygKCX2ABJFQ38Av |
pMQwBX0QnovADYJbDbMABj3tAkX+UAVHwAVyQAiQQAivUKe/AAlfgANFYAV0EAefAAy/QA0v |
LQef8At68Am/AAwN/tK+sAh9cAZMYAMfEAMxIPMbMAIm4AJFQAfFQA0AAQzVL2C/fgGD9alP |
FC6i/j2EGFHiRIoV/4Hq8wkSJEOxkH2cdSzRDxcuflT5wUWNIUiGXBUDBowQmBo1lsSB9Com |
NWrj7ugB9kYOrFfAfvH0BWkRIS42StjAwcGCBQ4jRuCwkggVKjpg8GwF9utTny9DIlFEm1bt |
w1avIH2C9WkRKmTOes0KhqpKERw4jkSJoqbPIkiMgP36hOeHiRY/rMj59AsYT263JgGDNOnV |
q188uVH++wRpERcbH2zE2NDAggerNXCAAWOlSZUqXejgefWpz5kjdWqtBa5W1rNXsGC9crXI |
DaFZzpCFMpVIDZoqOL4cmdJH+ydCrl4xqtJiQ80qR+TAegXsF7VCn4Dp+fQLGE9u3HzBgtQn |
io0PMUZYaKCBETgoqQYcliiiiCWKCKKKLl6BZJEzqLAhj1qCw1CiVvqABZXNPpEDCS5M4YQW |
UxxJRI4oqsBBByaYkGMjWBZhBJUqXIjBgxaCSJCLzX6h5hdIXgFGEzlgeQWYX6iR5hdYIFFj |
ihhi0MEFDjgYoYUa+qrBBRyCSDDBIMBgBJY+1KACCC1EybDNf56hog9IYPn+BBIdmCDEFEH2 |
pIMOLaI4wgYgmNCCi0Vc+cUVPMCoYYMRTMBhiSrAqMKQV4D5pRhCPvkFGF98ceUXaQxx5RVI |
3PiiLxuYKKKGFmqo4osjfnDBhRqWWKKIIJYwAg/jIDmDCSC0kMXNDFvhoo9XIDmjWUlm4YST |
RAQBA40okNAhhiGiOOMLOWAxiA4XONjABBdweMIKMOL4xBVUiuEGFTlgeQWYX6iRJhdgXoHF |
EDCWCAIHJLiQA40iqpBDjiNwqCkIK5aowggr8EAFmFdgIWSKI7SQxVgMWwGi2Wb7WCSRPQXp |
Ew0tvhgiBhu40EKOL+QwRJJi8Kh1AxNiCMIIK9D+MMSQmLAp5pdMJnnlF2lQmQQVYF55BY0q |
cKjBhiO4kMMNOdCYAokjcKihBRyKeAI2LggJGmpDvtBBh1Y8Bq4WNZLQAYgz1DiDCzrioAOM |
Kr44YggdpgRCDkJc+aQYxX/BY4macKhhCSvowIMJG74oBptwzhlnHGywoaMJMMSQgxBCqsCh |
hRpsAIKJI6ZgQgcmdFjiBxNGqMEKKwz5JY455DBEDTmaRQKISuBeq5UkkmDiDC6GgP6IL9A4 |
gom2j0Biyhi4MMQVxbv5PBEwcGgBhyCWSAQVQ3QowQZDxgkn/nPOSSQIHIKwogkrqsChhQ1G |
wMEQdDAEJtjABkf4wRL+asCBEQTBCmhQnEF+UQxXSMIQc5hCErxQC+ShpRYi0wITdGDAI0Rh |
ClzgwhSi0IQlBGFKNuCCIVzxi2J8Lhh0aEILXICDJVQhDqjAQxQ+MAVUBCMYvTjGObABBheY |
wAVLKAIOXOABC2zABEEowhGYYIMYAIEJRcBBDTxQgwThARjUwMY4uEENbAQDG6joAxe0UIsO |
UgQUSWjWFJbHBC6cwQ1y6AMXvvCFGpjABC2wwRG40AdDuOIX2BjHLJ6whBa0AAe4SgQtgpEI |
OSQiHM7oBS1mUY1ZFGEEHjCBC0wwAkNuwAMtaMISqqADA3JhkEWoSRCMgAZUcGMc8QtHL5D+ |
MQtiXkIOXJBFWpSZFlm44QtyOIMavlCFJsjhDH1QQ8LUUIUWbEACG6hBEaJwBjlIwhXA+JwY |
gtCCGizBCkvAAy2QQQtTBAMZznAGLZyBDEG4wAMbGMEGGrABE7TABC6oQRBwNQQgMOEMX5AD |
GpYQBDCg4RWfC4cziEkLjoYCGbMgBBdAsUySSmQVR0ADGNTghiokqApo0M5GIEGIJbSAAyNw |
QRCqcAQ0ECIRkggGNkwhBhzUYAlWWEIUZkGLWdBiFhzlqDNmYQUPbGADHGiAAiRggprUqgZB |
wIENdBAFLXAhYXLAAyFc8YtxYCMYtAhFtHrRC2TQwhRx6IIoSrr+V2KAoS9LQMMScFADHBRB |
DZ8wyCsg4QYuROEHHvBADZpAmydYAQx0CEc1aJEIXIkBDUioQjCg2gt8OqMXgqjBBiQwgg1I |
QAIeqAkOatACF9SgBTZAQhSmwIU+qEEOkPgELAyCjWpAtRccdQQewGAFK8hiryStRSVqYIIR |
1AAHNXDBCGqwhET8AhvhmAUqDCEHQqDBBCOowRKM0IQnPKEJVqAFMqpRjUTQRg5cGAIaUBEt |
WswiFLSYhRVcsAEPGNIDI+hLDXDwg5rYIAY2QMIUotCsL8xhEZDQjiRggQpTdHgWnKADDmpS |
hCrU4rnLFMUXWsABCVigBS7wAAdaYAX+OgjCFNXAZzAkoYUv2KAmVcBVEJqwBDEEYxa0mEUw |
TAEJQnAhBjqQgyk4IYhezIIWwUhEDUxQyZoEAQ2JoEMQgtCXEpQgBkkYAhO+AJhmUSEKy2OC |
HOJgiDgkAgwjkMAGTOCCKtTixMpsRRU40ICpjMADHBgBDqwgBjAkAhlQNQUh5LAEMS/BCk14 |
QhOWIIhg9IKjHZ5FIvCABBvMgRCcICYtZkELU8SBNlUAgxzwgIpZmEIQVfiBDTCAARtMoW1A |
sMEUziAHNfTBdJBAhStQgQccuEACFtgAB1xwhVr8OS22OMIGJNAAD7igBSZwQRDaawVOIMMZ |
tOiFKVCBByv+LOEJR/jBFPCAhiXQwRQc5USHTSGIRKDBBlMAAx0SQUxiBqMYr/gELCDxCVTM |
ghamSIQchoCBBCCgBDoAQgxswATtbOQTwCgGNniChxaMYAMWkMAGTFCDONTC2mipRRhMIAGr |
tqAGLcDBE6zwBDrQAhm0CAVHTREHIxjhC0NAQhSY8AU0xMEUnBCEIwTBiVlwwgpoaNsSaoAD |
K+ABFcGgxi9eAQtIwOIXs+DELExBCC6UgAEIQAAGgGADIJxBO33YyCteYRBsoAIHI+DAVDjg |
AhwEwQ6ieDlaItGCDZjABTXoSxCsYAQ60MIZvQgFVGfhCjQswQZ1UAcuSiEHG3z+IRGccAQn |
BJEIU6ACD18AAhJc4AEJeKAFQUCD3j8Bi1d8AhWoSAQauGABDDAAAQEgAANiAAQkyEE7kDiD |
DqCggw98wAZH+MEPXGACCZigBn0pQitqkfiJrKImSxgDGciwhCAs4QmCQEYoOMHRUNACFYbg |
QgzWII483KAHa9ABCxgCNJADPHCDQUICA/oAG3AB19qAEaiBH0CDPmgWKuACLjgCGyiBXUOA |
ACAAAggABMAAIAACLugDSKACDXiABCAAASiAAjgACqCAG/gBHKgBHCiCHyiCKqgF8pMIYhgC |
OrgGesCHe3AGMMAVOpgFWjAFWggFWviFT9ABBLiBNqD+gAAAgAAQAAf4AAMogS+IgkHSgiGw |
gTKzgBHYAAmwAAywgBKIgQ+IgRKoAAxQgBiwAQT4AB34wA+EOwzQgSSggjNgggQoAAH4QAMo |
AAIQgA9MABaIhDXAgSAogiCwBVHwwYiohVG4Bni4B3y4B3pIhzEoAiuIFk6ghWAoBkkAAgRw |
ACgggAB4wQDYQwJggCEYpETAgy+IgkFCgheRgyMAAhv4AiAoAQzYAC6oAAb4giEgALgLgA9E |
AAZQgBjQgQs8Aw0QAAIwAAIQAAEgAAHYwwAwACk4BBaoASMIAlG4xIgQhW+IB3y4h3jEh3tI |
BzIoAkegBVOYBWD4hChAAAP+UAADCAAEIIACMAAB+EABCAAEgB4miAEGQIAGOIIYYAALcIMh |
2LUjYIJdi4EjwAAEYIAPHAC4+0AGiAE8QAVTCAZBwAMF2EMDmEUBKAADIAAEYIEeoIAKqIJK |
kIV1hAhcIAd4uAd8IMp70Ad8SAcriANU+IVXYAQuSIABMIACGIA9FIAPDIAPDAACQIAYYIAB |
CIABIAAEIIAACAAESAC4Y4C1xIC1ZAAEIAABQIAAaBsEKAEgCIZ4vAd9uId0WIBu/EABmEUC |
EIAAWIAbcIABwAFb8EmIIIZlIAd90Et9wId7wAd9SAc5IARUgAQ5UAACQIA9DIA9NEsCCAAC |
EID+D2QABUCAPRwAAhCAPRQAuFtLDGAABGAABCgBLVAABMCAEogBLkgEetDLe8AHZDCAPQyA |
ASAABPhAAwgAA3CABCAADNgFdpAFa0OLWmCGZYAHeMCH4rwHorwHZ5gDQyCEGNjDARCAPTTL |
WQwAAkCAAQgABqgABjDLANjDAPhAuDMABsCAD7ABDGCAD7CBCCiBGBikM0gEeKCHe8CHeOSE |
wRQAAhAAAiiADxQABCCAAjACfcCHd6gF7ZQIWWAGZfhOfLgHfIhHotQHosQHU5CDKEAAAgiA |
DwwAAhCAWTRLAhCAAJhFDLCBtdQBBAgABLCBBoA7DECCGGCAD9CBEvj+gBKwgSMIgiJYgi9I |
AkEgB3y4B33Ah3vYgz00AAMQgFk0gD0UAA5IB72chhOTBVvABVvABVuwBVxIBmUgB3qAh3vA |
B73EB/GEBzoogQCYRQEYzA8UgD0MgD1EgCEAAibgAgyogA/4AiAoAQyIASaIgRL4AO2xARzA |
lSpAAy6wAUGAB3rQS3jggwAggDIVgA8UgA8UAAIQgAEwAEe4B3y4B314h72SBVxYBnIg1mUg |
B2UgVnL4znsgynuA0XsgynsgynRogAD4wAAYzPwMAAEggAAQAAJAgAD4QAvgAh1AgihgAh2A |
HiYAgiGwAR04ghqoJBOgVxfAgSpwAySwgUT+IAd8iEd6IIdGUIAPDAACMIA9DAAEIIBuJAN4 |
iEd8uId3qAWSqoVkUAZi/c5kJYfvhAd80Et8iEd80Id7gFGipAMBMEsCCIA9DAACCAABIACz |
FIBERYASMKAhYIIomAIumIIzmAM3sAIcqAEP2AAJsKoWCAI36IMkiAFOIAd6wIfvJIddwIEA |
+MACCAACEAACKAABKAADaAJloId7wAd4uAd6kAWSwgVlIAd4oAeOhVuijEd9iEd8iEd8iEei |
1AeibIEA+MAA+EABCAABKIDBDIAPNMsPlIApkIO764NFIARI0Ds0qIIfqAEPwNyaQANIOAMd |
GAJO4Fh6IIdrWAb+T8ABAhiAARAAAigAsyyADeCDZSAHeqCHeyBKeqiFZaqFbCAHeChZorwH |
otSHeMSH4rwHfLgHfbgHotRLWkCAABjMAPhABBCAD0QAAggAAhCAAPjAEpgCQngFV5iCGGCC |
PoCERYAEQ2AERrCCIKiBILACNDAEQviCJDiCUCAHeMAHeIiHZViGXfCENMAB12IACagBI+AD |
T1AGciAHeCDKeNQHWYiICX4IUUgGcqAHotRLfNBLfLgHfLgHfDBefLgHfNBLoryHJYA7AkAA |
BoA7bQ0AAggAAZjFACCAD4iCPviET4iBDxiCJJCDu9sIV8CDIiYEVzAEOWACG4gCZCD+B3rg |
WHLw311Yhl3whEZoBE/wBP9dBgaGB6K8B3yIR2Kg4AmWhWQgB3i4B6LUh3jEB+PFB73UB3yI |
R3zQB3zQS6JMhxFggBhoASSoASCwgRgogbVEAAZAAAb4wAAgAAQoAR04g41IghI4g40whD44 |
AznoA0jY4VcghD6ggiSYEiSgBXLg2HhgYC72311Yhl3gYnIwh3jUB73UB3xgB1koY4gQhWQg |
B3igB3yIR3y4B3y4B3zQB3yIR3y4B3ww3njEB33Ah3sgSkcoARxYAhyoCRxYAjnoAzmIggtM |
AhsoAQxggDKzgSlYhE/ogzMwBFeAhD5oFjk4gz5YhD6YgzP+mAIgsIEYKIEh6AVlgAd8+M54 |
YGByWAZlUAYuvgYGjgd6uAd8iEd8uAeihAd2yGWIEAYGJsp7wId4xId4xAd9uAd8aGZ8uAd8 |
iEd8uAcYRYcqiIEaaAGrqAEc6AI5gIRX+AQ5mIIkAAIbKLMPiIEkUAPtMIQ+gIRFUAMq4IIp |
iAIuOIMpSAImSAIgmJISGIJeYGB4oId7gId4KOiv/mp4aGa9xAd4mIaL/gdmUAZ4oAd8uAd8 |
MF58uAd80Eui1AfjxQfjxYdqiAEJ8AB6bYEaWAI0wANI+IQ+4IIhsAEkiIES+IANsAEukIMp |
OAM56AM54IIogB4bAIIhsIEkgB7+ILCBKZkCWlgGcvhOovzOePjqeCCHePhOfLgHfChOfLgH |
oryHdACHi54GZSAHorwHfLgHohzrkr0HfcCHeNQHfIjHkhWEEXAtDzCBGgiCJ+gCSOgDOYiC |
IYgBIJiSErABE3ABwIgCLpgCLkiCITCg9QaCJGCCIbABIIgBG4iCXlgGcoAHeiBKjo2HePhO |
cqCH76QHfLgHfcCH4sQHvcQHeGAHUSjjaVAGcqAHGNWHeCRKfYhHfDBefNBLfChOfIhHfEiH |
KtgA19oAE6gBXDmrKGAC7SmzGKgVHFgCHXgRHbCBISBBJACMI5gCLmCCKEgCEmSCUFgGcuDY |
eyBKeoD+W44lynvAB+PVh+LEB3jAh2koY1lYBnKAB6LUS6LUS3y4B33QS3wYa3yIR6K8B3wI |
hhbwANfagBaogSWIgh84AhuIgQ/QnvXegFqxgR8YgiNgAh3ggkGKAznAg0SIA0KQAy3gAib4 |
AkfwX3Kgh3ugh+LEh++8B3xoZn0Ya73EB3oAB1mY4FpYBnKgB3ggynvAB33Ah07Xh3jEB324 |
B3yIR3yIR6KMR3jAAxvwgA2QgErCgWDHgRawgRgAAibggi/AARPYABNwgSJYgiKoAi7QgkRI |
BH2bBVMIhkQQgyCogiHQAk9QBnKAB3ogSr3Eh3vQh3vAh3jEB33Ah3vAh2b+1odmxod5AIda |
gAhiWAZy+E6ijEeivAd9wId7wAe9xAe9xAd9iEeijMeSvYdqGIIRMIERqBUcWIIgWIIamBIg |
OANDkIMWkAAP2AATqIEmqIIlqAI8MAVamIW5cgZkoAVTWAIcWIIpQINQWAZy+M57IMp4xId7 |
wId70IdOj0d8MPp4xId5kIWHkIVlIAd6IMp7wId4JMri1Ad8iEd8uAd80Et8iEd8MF6iTAQJ |
iIEWMIEaCAJcwZUYsAEm+AJCAAMTcC2rMoElsIInsAJTgKqP8PtEqKQgqAI0CIVlIAd6gId7 |
wIek73R9KE59KE58iEd8YIeHmAZlIAd4gNF4hNH+eMSHe8CHscaH4sQHfSDKeyDKe0iHJcCA |
GKgVHAiCJgiCIbABIIiChFmCFqDXDZAAD6iBIFgCPEAFU6CFXggGZAiGWUiEJRiBFlgCI6iC |
RrgGcvhOvdQHo9cHxu90eACHh2AGZSAHeoAHfLgHotSHTscHfcCHe8CHpCfKeMQHZ7CBEtgA |
E3ABHBCzQbrARSCEIsCBJQCIIy02eKixBMynRKYWzkqUiE4RFyNMLFlS5c8yePDw3evo8aO+ |
jyJH3tMnEt60f/+yLSMHryO+e/jw3cPnER9JfffwicTXEZ9HeKZKfGjRokYQNKZQmXrlCpUk |
VK7w1NgwAkcVQ5BQmZr+lYgOmio1WrhoUaNKEzSNlpGLJ1LfPX0i9XXU51GfR30j8dEjl03W |
v1q7lpGj11HfR3338N3Th+8evnv47uETia+jPnwi8ZEDE6OFixpBCHGiNQsbsF/AXhmqYmLD |
CBxWCPUhBMxUnCA1WmzwMKIFjipGwIRaBo8eyXv67um7p++5vuQj9cEjl02WSlvKyMH7iE96 |
R30i8YmceU/fTHz0rnlaUgMHDjqcaM2aRQtbsV+uCAXZsGFEEVbM0ccixeBRxAYSNCCBBCO4 |
EEQVTZDRyDXmwAOePvdAd48+4OFzDz0aMSOLSrIss4w58NyDzz0z3TOTSPjcg889+NyDjz7+ |
HeFzDz734HMPPh2lp9EudNiwhBWCmMIJLbT0Egw2qLiCRwv+1VBFFFx8wcUiaLiwQQNhbuCB |
CzgsgYMYoSwDDz0jPfeRPvjo45E+HunjkT70wEPON9OopJIsy5ADTzz34HMPPh3hI5I+JOHT |
kT74dKQPPvfgc89M9MBDzjKNHFHCF44I4ggnTZqCzS9o1CDBBiYU8cMXXGhxxhlf4LCBBRZ4 |
sIEJLgSxhAtGeLILORrdow940uHTUTzwkHMNLrL8qRIzyiwDDz334HNPeiLdg889+HiEj0f4 |
eISPR/jcMxM85JCzSyNklGBDInzw4QgtswRTDCo4tODBCDUUwQX+wQWf8YULJpgwggceuIBD |
ES6I0cgy5NBDDz7eeqvPRzN1RI+71+BCzLR/7qLMMuTAgw896c3k0Uz36HMPPvfgcw8+9+Bz |
Dz734HMPPvfgo89M99ADDzm7NEJGDCUMgYYggnBiCiquGFKDUThU8UUUUxDMBK1fwIeDCy14 |
sIEJQVSRhifLkKORxnHjcw8++twDDz3kNINLLSVPm4wyJ5KjETz0aDTTPTPd4zI+9+jT0Uz3 |
6CMSPh1p5O4ujZBhAwYlDEGHIKaggsorjIABXxVHcDEEE0wkwcQUVBxxRBNL4BCDCSO0EIQV |
e3iyDDnm0OORPh7p45E+H12sETnXMCP+i98lT+OJMie66y485NCjET3w0INPR4zrcw/jIs3k |
7jKeNJIGDiVgEEMUeOCxCCSQfGIIHnJMMYQN/dugAwCBEAMb4MAGMYiBC1qAgyBUYQ+eWAY5 |
NHIPfNwDHyLBh0fwQY94xIMc9CBHMmwRvejZQhXKUMaJlHGiZVyvhfCgBzzoAY/0eAQfHsHH |
PfChD3xoZBm78MQf0mCFDZRgCFEgmBzkYAhCEKIPZ2DCEGJggw/EwH82OGAMPhCDD5TgCE9Y |
QhD20IhdLIMc9IBH3DqCj4vBwxzuWgYuZDHCEdaiFbYYhSo84YkTLkMZJyLHMlpIDnjQAx70 |
uMdMRIKPe+D+gx7kOJEn/sAHMizBBiWwQRK4oIWCceEMXJiCDg74ARtQQAc2iIENDliCA36g |
BCNYQhVwkIZGeGIZ7oLHTPSBj3vgQx/pgQc9rrcMXMhijsb8Uy1kgQtSNKIRntjFLpaxi2Xs |
QhknOiHh6AEPejAOHxohxzL0+Ac+kCEINihBDGwwBCQMIQlDAIIO/PeBD8QgBjbQgQ1KQAEb |
fKB/MfhACT5ggyG4gAx/UMUulkEOepADHvi4Bz46Qg+NXM8cnhhFLY6p0T/Jwha4GAUimvmH |
RujRE7tQxgqX4S6N0AMe9IAHPdx1Ik80gg97EAMHNlCCDdQzBjYowQdiMM+h9lT+B1b8gA2A |
gAQbzLMEFbCBC57wh0Z4YhfLIAc8yEEPeNCDcO66xon+MApZGLOsZZVFK3DxBz7soZnN9ERK |
TyTIZUDTE43gQxqsUIQPxKAEJdABFKAwhTV4wQZeqAQoiFGJGwCBCl5QRCvW8IEY6MANq7DF |
M1oBiitE4QhN2MMf9LjC68HjeivcRSNwIYuysra1qZAFKOxgLz78oREl3YUn4roLPf6BD3ug |
gxVcwAUm2IAKopBFLUTxD1Ewd1qiaAUlavGnVkRCFLXwGzHqUIM0/OEPJY1rSvWYBlC0trzl |
lYUsKLEKRKRhD24taUkb0V0+pIEMRrgCHFpRiUiIwm/M/v0vgEWxASPsobvw9cQuPLGLkjYi |
DauoBYAjLOEJ/6kWrViFHfbQXT50t7t8+EMa0vCEIgiBEhQ+8X9lAYcajIEP3W1EKA7ciD/w |
IQ15QDGOc6wSWazCDmQgQ4jTwIcQW6EJOLiBLHSs5H+YoQZFSEMo3BqKZqqCD2mwgyWWrOUJ |
y6IVfnjCE3DQhCAUAQd18AMxtqxjUcBBCkUggxWCTIYx1KEVolAzniMsCkscIg9XEEIrHpFn |
JYuCEm2QwhikAAY4yKIWEn70tAICADs="/><BR><CENTER>ALCASAR</CENTER> |
</td> |
<td width=550 bgcolor=#FFFFFF align=center valign=center> |
<font face=arial,helvetica color=black> |
<font size=4> |
Access to the page: |
<br><br> |
-URL- |
<br><br> |
<font size=3> |
... has been denied for the following reason: |
<br><br> |
<font color=red> |
<b>-REASONGIVEN-</b> |
<font color=black> |
<br><br><br><br> |
You are seeing this error because what you attempted to access appears to contain, |
or is labeled as containing, material that has been deemed inapproriate. |
<br><br> |
If you have any queries contact your ICT Co-ordinator or Network Manager. |
<br><br><br><br> |
<font size=1> |
Filtered by <B>DansGuardian</B></a> |
</td> |
</tr> |
</table> |
</body> |
</html> |
<!-- |
The available variables are as follows: |
- URL- gives the URL the user was trying to get to. |
- REASONGIVEN- gives the nice reason (i.e. not quoting the banned phrase). |
- REASONLOGGED- gives the reason that gets logged including full details. |
- USER- gives the username if known. |
- IP- gives the originating IP. |
You need to remove the space between the - and the variable to use them |
in your HTML. They are there above so extra processing is not required. |
More example templates are likely to be found on the DansGuardian web site |
on the Extras page. |
Daniel Barron 2002-03-27 |
--!> |
/conf/localdomain.rev |
---|
0,0 → 1,8 |
$TTL 86400 |
@ IN SOA localhost. root.localhost. ( |
1997022700 ; Serial |
28800 ; Refresh |
14400 ; Retry |
3600000 ; Expire |
86400 ) ; Minimum |
IN NS localhost. |
/conf/localdomain.zone |
---|
0,0 → 1,9 |
$TTL 86400 |
@ IN SOA localhost root ( |
2010020401 ; serial (d. adams) |
3H ; refresh |
15M ; retry |
1W ; expiry |
1D ) ; minimum |
IN NS localhost |
localhost IN A 127.0.0.1 |
/conf/user_edit.attrs |
---|
0,0 → 1,50 |
# |
# Attributes which will be visible in the user/group edit pages |
# |
# Format: Attribute Comment |
# |
# |
#Auth-Type <a href="help/auth_type_help.html" target=su_help onclick=window.open("help/auth_type_help.html","su_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Auth-Type Help Page"><font color="blue">Auth-Type</font></a> |
Simultaneous-Use <a href="help/simultaneous_use_help.html" target=su_help onclick=window.open("help/simultaneous_use_help.html","su_help","width=560,height=170,toolbar=no,scrollbars=no,resizable=yes") title="Simultaneous Use Help Page"><font color="blue">Nombre de session simultanée</font></a> |
#Framed-Protocol <a href="help/framed_protocol_help.html" target=fpr_help onclick=window.open("help/framed_protocol_help.htlml","fpr_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Framed-Protocol Help PPage"><font color="blue">Protocol</font></a> |
#Framed-IP-Address <a href="help/framed_ip_address_help.html" target=fia_help onclick=window.open("help/framed_ip_address_help.html","fia_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Framed-IP-Address Help Page"><font color="blue">IP Address</font></a> |
#Framed-IP-Netmask IP Netmask |
#Framed-Route Route |
#Framed-Routing |
#Filter-Id <a href="help/filter_id_help.html" target=fid_help onclick=window.open("help/filter_id_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Filter-ID Help Page"><font color="blue">Filter ID</font></a> |
#Framed-MTU <a href="help/framed_mtu_help.html" target=fid_help onclick=window.open("help/framed_mtu_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Framed-MTU Help Page"><font color="blue">Framed-MTU</font></a> |
#Framed-Compression <a href="help/framed_compression_help.html" target=fc_help onclick=window.open("help/framed_compression_help.html","fc_help","width=600,height=210,toolbar=no,scrollbars=no,resizable=yes") title="Framed Compression Help Page"><font color="blue">Compression Used</font></a> |
#Service-Type <a href="help/service_type_help.html" target=st_help onclick=window.open("help/service_type_help.html","st_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Service-Type Help Page"><font color="blue">Service Type</font></a> |
#Login-IP-Host |
#Login-Service |
#Login-TCP-Port |
#Callback-Number <a href="help/callback_number_help.html" target=fid_help onclick=window.open("help/callback_number_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Callback-Number Help Page"><font color="blue">Callback-Number</font></a> |
#Callback-Id <a href="help/callback_id_help.html" target=fid_help onclick=window.open("help/callback_id_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Callback-ID Help Page"><font color="blue">Callback-ID</font></a> |
#Framed-IPX-Network |
#Class <a href="help/class_help.html" target=fid_help onclick=window.open("help/class_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Class Help Page"><font color="blue">Class</font></a> |
Session-Timeout <a href="help/session_timeout_help.html" target=st_help onclick=window.open("help/session_timeout_help.html","st_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Session Timeout Help Page"><font color="blue">Durée limite d'une session</font></a><BR>(en secondes) |
#Idle-Timeout <a href="help/idle_timeout_help.html" target=it_help onclick=window.open("help/idle_timeout_help.html","it_help","width=600,height=170,toolbar=no,scrollbars=no,resizable=yes") title="Idle Timeout Help Page"><font color="blue">Idle Timeout</font></a> |
#Termination-Action |
#Login-LAT-Service |
#Login-LAT-Node |
#Login-LAT-Group |
#Framed-AppleTalk-Link |
#Framed-AppleTalk-Network |
#Framed-AppleTalk-Zone |
#Port-Limit <a href="help/port_limit_help.html" target=pl_help onclick=window.open("help/port_limit_help.html","pl_help","width=600,height=170,toolbar=no,scrollbars=no,resizable=yes") title="Port Limit Help Page"><font color="blue">Port Limit</font></a> |
#Login-LAT-Port |
#Dialup-Access <a href="help/dialup_access_help.html" target=da_help onclick=window.open("help/dialup_access_help.html","da_help","width=560,height=200,toolbar=no,scrollbars=no,resizable=yes") title="Dialup Access Help Page"><font color="blue">Dialup Access (use FALSE to lock)</font></a> |
#Dialup-Lock-Msg <a href="help/lock_message_help.html" target=lm_help onclick=window.open("help/lock_message_help.html","lm_help","width=600,height=210,toolbar=no,scrollbars=no,resizable=yes") title="Lock Message Help Page"><font color="blue">Lock Message</font></a> |
#Reply-Message <a href="help/reply_message_help.html" target=lm_help onclick=window.open("help/reply_message_help.html","lm_help","width=600,height=210,toolbar=no,scrollbars=no,resizable=yes") title="Reply-Message Help Page"><font color="blue">Reply-Message</font></a> |
Max-Daily-Session <a href="help/session_timeout_help.html" target=st_help onclick=window.open("help/session_timeout_help.html","st_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Session Timeout Help Page"><font color="blue">Durée limite journalière</font></a><BR>(en secondes) |
#Max-Weekly-Session Weekly Limit (secs) |
Max-Monthly-Session <a href="help/session_timeout_help.html" target=st_help onclick=window.open("help/session_timeout_help.html","st_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Session Timeout Help Page"><font color="blue">Durée limite mensuelle</font></a><BR>(en secondes) |
#Login-Time <a href="login_time_create.php?val=$name1&first=yes" target=lt_create onclick=window.open("login_time_create.php?val=$name1&first=yes","lt_create","width=600,height=490,toolbar=no,scrollbars=yes,resizable=yes") title="Login-Time Creation Page"><font color="blue">Période hebdomadaire</font></a><a href="help/login_time_help.html" target=lt_help onclick=window.open("help/login_time_help.html","lt_help","width=600,height=370,toolbar=no,scrollbars=no,resizable=yes") title="Login-Time Help Page"><font color="blue"><BR>(Format UUCP)</font></a> |
Login-Time <a href="help/login_time_help.html" target=lt_help onclick=window.open("help/login_time_help.html","lt_help","width=600,height=370,toolbar=no,scrollbars=no,resizable=yes") title="Login-Time Help Page"><font color="blue">Période hebdomadaire</font></a> |
Expiration <a href="help/expiration_help.html" target=lt_help onclick=window.open("help/expiration_help.html","lt_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Expiration Help Page"><font color="blue">Date d'expiration</font></a> |
# |
# Uncomment this if you are using ldap and you are using user regular profiles. |
# Also make sure that Regular-Profile maps to the correct ldap attribute in |
# extra.ldap-attrmap |
# |
#Regular-Profile User Regular Profile DN |
/conf/ldap |
---|
0,0 → 1,161 |
# -*- text -*- |
# |
# $Id$ |
# Lightweight Directory Access Protocol (LDAP) |
# |
# This module definition allows you to use LDAP for |
# authorization and authentication. |
# |
# See raddb/sites-available/default for reference to the |
# ldap module in the authorize and authenticate sections. |
# |
# However, LDAP can be used for authentication ONLY when the |
# Access-Request packet contains a clear-text User-Password |
# attribute. LDAP authentication will NOT work for any other |
# authentication method. |
# |
# This means that LDAP servers don't understand EAP. If you |
# force "Auth-Type = LDAP", and then send the server a |
# request containing EAP authentication, then authentication |
# WILL NOT WORK. |
# |
# The solution is to use the default configuration, which does |
# work. |
# |
# Setting "Auth-Type = LDAP" is ALMOST ALWAYS WRONG. We |
# really can't emphasize this enough. |
# |
ldap { |
# |
# Note that this needs to match the name in the LDAP |
# server certificate, if you're using ldaps. |
server = "" |
identity = "" |
password = |
basedn = "dc=example,dc=com" |
filter = "(uid=%{Stripped-User-Name:-%{User-Name}})" |
base_filter = "" |
# How many connections to keep open to the LDAP server. |
# This saves time over opening a new LDAP socket for |
# every authentication request. |
ldap_connections_number = 5 |
# seconds to wait for LDAP query to finish. default: 20 |
timeout = 4 |
# seconds LDAP server has to process the query (server-side |
# time limit). default: 20 |
# |
# LDAP_OPT_TIMELIMIT is set to this value. |
timelimit = 3 |
# |
# seconds to wait for response of the server. (network |
# failures) default: 10 |
# |
# LDAP_OPT_NETWORK_TIMEOUT is set to this value. |
net_timeout = 1 |
# |
# This subsection configures the tls related items |
# that control how FreeRADIUS connects to an LDAP |
# server. It contains all of the "tls_*" configuration |
# entries used in older versions of FreeRADIUS. Those |
# configuration entries can still be used, but we recommend |
# using these. |
# |
tls { |
# Set this to 'yes' to use TLS encrypted connections |
# to the LDAP database by using the StartTLS extended |
# operation. |
# |
# The StartTLS operation is supposed to be |
# used with normal ldap connections instead of |
# using ldaps (port 689) connections |
start_tls = no |
# cacertfile = /path/to/cacert.pem |
# cacertdir = /path/to/ca/dir/ |
# certfile = /path/to/radius.crt |
# keyfile = /path/to/radius.key |
# randfile = /path/to/rnd |
# Certificate Verification requirements. Can be: |
# "never" (don't even bother trying) |
# "allow" (try, but don't fail if the cerificate |
# can't be verified) |
# "demand" (fail if the certificate doesn't verify.) |
# |
# The default is "allow" |
# require_cert = "demand" |
} |
# default_profile = "cn=radprofile,ou=dialup,o=My Org,c=UA" |
# profile_attribute = "radiusProfileDn" |
# access_attr = "dialupAccess" |
# Mapping of RADIUS dictionary attributes to LDAP |
# directory attributes. |
dictionary_mapping = ${confdir}/ldap.attrmap |
# Set password_attribute = nspmPassword to get the |
# user's password from a Novell eDirectory |
# backend. This will work ONLY IF FreeRADIUS has been |
# built with the --with-edir configure option. |
# |
# See also the following links: |
# |
# http://www.novell.com/coolsolutions/appnote/16745.html |
# https://secure-support.novell.com/KanisaPlatform/Publishing/558/3009668_f.SAL_Public.html |
# |
# Novell may require TLS encrypted sessions before returning |
# the user's password. |
# |
# password_attribute = userPassword |
# Un-comment the following to disable Novell |
# eDirectory account policy check and intruder |
# detection. This will work *only if* FreeRADIUS is |
# configured to build with --with-edir option. |
# |
edir_account_policy_check = no |
# |
# Group membership checking. Disabled by default. |
# |
# groupname_attribute = cn |
# groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))" |
# groupmembership_attribute = radiusGroupName |
# compare_check_items = yes |
# do_xlat = yes |
# access_attr_used_for_allow = yes |
# |
# By default, if the packet contains a User-Password, |
# and no other module is configured to handle the |
# authentication, the LDAP module sets itself to do |
# LDAP bind for authentication. |
# |
# THIS WILL ONLY WORK FOR PAP AUTHENTICATION. |
# |
# THIS WILL NOT WORK FOR CHAP, MS-CHAP, or 802.1x (EAP). |
# |
# You can disable this behavior by setting the following |
# configuration entry to "no". |
# |
# allowed values: {no, yes} |
# set_auth_type = yes |
# set_auth_type = no |
# ldap_debug: debug flag for LDAP SDK |
# (see OpenLDAP documentation). Set this to enable |
# huge amounts of LDAP debugging on the screen. |
# You should only use this if you are an LDAP expert. |
# |
# default: 0x0000 (no debugging messages) |
# Example:(LDAP_DEBUG_FILTER+LDAP_DEBUG_CONNS) |
#ldap_debug = 0x0028 |
} |
/conf/logrotate.d/dansguardian |
---|
0,0 → 1,13 |
/var/log/dansguardian/access.log { |
create 644 dansguardian dansguardian |
rotate 5 |
dateext |
weekly |
sharedscripts |
prerotate |
service dansguardian stop |
endscript |
postrotate |
service dansguardian start |
endscript |
} |
/conf/logrotate.d/syslog |
---|
0,0 → 1,15 |
# WARNING : don't use * wildcard as extension |
# (glob in logrotate will try to rotate all files instead of |
# only the basenames of the logs, i.e. it will rotate |
# already rotated files and recompress them, taking |
# exponential time...) |
/var/log/auth.log /var/log/syslog /var/log/user.log /var/log/secure /var/log/messages /var/log/boot.log /var/log/mail/errors /var/log/mail/info /var/log/mail/warnings /var/log/cron/errors /var/log/cron/info /var/log/cron/warnings /var/log/kernel/errors /var/log/kernel/info /var/log/kernel/warnings /var/log/lpr/errors /var/log/lpr/info /var/log/lpr/warnings /var/log/news/news.err /var/log/news/news.notice /var/log/news/news.crit /var/log/daemons/errors /var/log/daemons/info /var/log/daemons/warnings /var/log/explanations { |
sharedscripts |
rotate 5 |
weekly |
postrotate |
[ -f /var/run/syslog-ng.pid ] && kill -HUP `cat /var/run/syslog-ng.pid` || true |
[ -f /var/run/syslogd.pid ] && kill -HUP `cat /var/run/syslogd.pid` || true |
endscript |
} |
/conf/logrotate.d/httpd |
---|
0,0 → 1,27 |
/var/log/httpd/access_log /var/log/httpd/ssl_access_log{ |
rotate 12 |
monthly |
dateext |
missingok |
notifempty |
compress |
prerotate |
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1 |
endscript |
postrotate |
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1 |
endscript |
} |
/var/log/httpd/apache_runtime_status /var/log/httpd/ssl_mutex /var/log/httpd/error_ /var/log/httpd/ssl_request_log { |
rotate 4 |
monthly |
missingok |
notifempty |
compress |
prerotate |
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1 |
endscript |
postrotate |
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1 |
endscript |
} |
/conf/logrotate.d/squid |
---|
0,0 → 1,32 |
/var/log/squid/access.log { |
weekly |
rotate 52 |
dateext |
copytruncate |
compress |
notifempty |
missingok |
} |
/var/log/squid/cache.log { |
weekly |
rotate 5 |
copytruncate |
compress |
notifempty |
missingok |
} |
/var/log/squid/store.log { |
weekly |
rotate 5 |
copytruncate |
compress |
notifempty |
missingok |
# This script asks squid to rotate its logs on its own. |
# Restarting squid is a long process and it is not worth |
# doing it just to rotate logs |
postrotate |
/usr/sbin/squid -k rotate |
endscript |
} |
/conf/logrotate.d/mysqld |
---|
0,0 → 1,37 |
# This logname can be set in /etc/my.cnf |
# by setting the variable "err-log" |
# in the [safe_mysqld] section as follows: |
# |
# [safe_mysqld] |
# err-log=/var/lib/mysql/mysqld.log |
# |
# If the root user has a password you have to create a |
# /root/.my.cnf configuration file with the following |
# content: |
# |
# [mysqladmin] |
# password = <secret> |
# user= root |
# |
# where "<secret>" is the password. |
# |
# ATTENTION: This /root/.my.cnf should be readable ONLY |
# for root ! |
/var/log/mysqld/mysqld.log { |
# create 600 mysql mysql |
notifempty |
daily |
rotate 31 |
dateext |
missingok |
compress |
postrotate |
# just if mysqld is really running |
if test -x /usr/bin/mysqladmin && \ |
/usr/bin/mysqladmin ping &>/dev/null |
then |
/usr/bin/mysqladmin flush-logs |
fi |
endscript |
} |
/conf/logrotate.d/ulogd |
---|
0,0 → 1,10 |
/var/log/firewall/firewall.log { |
missingok |
rotate 52 |
weekly |
dateext |
sharedscripts |
postrotate |
/etc/init.d/ulogd restart |
endscript |
} |
/conf/logrotate.d/radiusd |
---|
0,0 → 1,7 |
/var/log/radius/radacct/*/detail /var/log/radius/*.log /var/log/radius/radutmp /var/log/radius/radwtmp { |
monthly |
rotate 4 |
nocreate |
missingok |
compress |
} |
/conf/sudoers |
---|
0,0 → 1,48 |
# sudoers file. |
# |
# This file MUST be edited with the 'visudo' command as root. |
# |
# See the sudoers man page for the details on how to write a sudoers file. |
# |
# Host alias specification |
Host_Alias LAN_ORG=192.168.182.0/24,localhost #réseau de l'organisme |
# User alias specification |
User_Alias ADMIN=sysadmin # compte d'admin local de l'organisme |
User_Alias ADMOSSI=apache # compte d'admin OSSI (web) |
# Cmnd alias specification |
Cmnd_Alias NET=/sbin/arping,/sbin/arp,/usr/sbin/arpscan,/usr/sbin/tcpdump # commandes réseau |
Cmnd_Alias URPMI=/usr/sbin/urpmi,/usr/sbin/urpmi.update # gestion des paquetages |
Cmnd_Alias BYPASS=/usr/local/sbin/alcasar-bypass-on.sh,/usr/local/sbin/alcasar-bypass-off.sh # contournement du système d'authentification |
Cmnd_Alias RADDB=/usr/bin/radwho,/usr/sbin/chilli_query # pour la gestion des usagers en ligne |
Cmnd_Alias SQL=/usr/local/sbin/alcasar-mysql.sh # pour exporter la base mysql |
Cmnd_Alias GHOST=/usr/local/bin/alcasar-mondo.sh # pour générer une image iso du serveur |
Cmnd_Alias EXPORT=/usr/local/bin/alcasar-log-export.sh # pour exporter/sauvegarder les fichiers journaux |
Cmnd_Alias BL=/usr/local/sbin/alcasar-bl.sh # pour gérer les blacklists et whitelist |
Cmnd_Alias NF=/usr/local/sbin/alcasar-nf.sh # pour gérer le filtrage réseau |
Cmnd_Alias LOGOUT=/usr/local/sbin/alcasar-logout.sh # pour déconnecter les usagers |
Cmnd_Alias UAM=/usr/local/sbin/alcasar-uamallowed.sh # pour gérer les site de confiance (uamallowed) |
Cmnd_Alias SERVICE=/sbin/service,/usr/bin/killall # pour gérer les site de confiance (uamallowed) |
# Defaults specification |
# Defaults syslog=auth |
# Runas alias specification |
# User privilege specification |
root ALL=(ALL) ALL |
# Uncomment to allow people in group wheel to run all commands |
# %wheel ALL=(ALL) ALL |
# Same thing without a password |
# %wheel ALL=(ALL) NOPASSWD: ALL |
# Samples |
# %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom |
# %users localhost=/sbin/shutdown -h now |
ADMOSSI LAN_ORG=(root) NOPASSWD: NET,BYPASS,GHOST,SQL,BL,NF,EXPORT,RADDB,LOGOUT,UAM,SERVICE |
ADMIN LAN_ORG=(root) NOPASSWD: NET,/sbin/poweroff,/sbin/shutdown -h now,/sbin/reboot,URPMI,BYPASS,GHOST,SQL,EXPORT |
/conf/ldap.attrmap |
---|
0,0 → 1,77 |
# |
# Mapping of RADIUS dictionary attributes to LDAP directory attributes |
# to be used by LDAP authentication and authorization module (rlm_ldap) |
# |
# Format: |
# ItemType RADIUS-Attribute-Name ldapAttributeName [operator] |
# |
# Where: |
# ItemType = checkItem or replyItem |
# RADIUS-Attribute-Name = attribute name in RADIUS dictionary |
# ldapAttributeName = attribute name in LDAP schema |
# operator = optional, and may not be present. |
# If not present, defaults to "==" for checkItems, |
# and "=" for replyItems. |
# If present, the operator here should be one |
# of the same operators as defined in the "users"3 |
# file ("man users", or "man 5 users"). |
# If an operator is present in the value of the |
# LDAP entry (i.e. ":=foo"), then it over-rides |
# both the default, and any operator given here. |
# |
# If $GENERIC$ is specified as RADIUS-Attribute-Name, the line specifies |
# a LDAP attribute which can be used to store any RADIUS |
# attribute/value-pair in LDAP directory. |
# |
# You should edit this file to suit it to your needs. |
# |
# Au moins une définition doit être présente pour l'authentification LDAP seule |
# ==--> (rajout de uid et commentaire de tout le reste pour laisser le soin à sql radius |
# de gérer les personnalisations de comportement du portail |
checkItem $GENERIC$ uid |
#checkItem $GENERIC$ radiusCheckItem |
#replyItem $GENERIC$ radiusReplyItem |
#checkItem Auth-Type radiusAuthType |
#checkItem Simultaneous-Use radiusSimultaneousUse |
#checkItem Called-Station-Id radiusCalledStationId |
#checkItem Calling-Station-Id radiusCallingStationId |
#checkItem LM-Password lmPassword |
#checkItem NT-Password ntPassword |
#checkItem LM-Password sambaLmPassword |
#checkItem NT-Password sambaNtPassword |
#checkItem LM-Password dBCSPwd |
#checkItem SMB-Account-CTRL-TEXT acctFlags |
#checkItem SMB-Account-CTRL-TEXT sambaAcctFlags |
#checkItem Expiration radiusExpiration |
#checkItem NAS-IP-Address radiusNASIpAddress |
# |
#replyItem Service-Type radiusServiceType |
#replyItem Framed-Protocol radiusFramedProtocol |
#replyItem Framed-IP-Address radiusFramedIPAddress |
#replyItem Framed-IP-Netmask radiusFramedIPNetmask |
#replyItem Framed-Route radiusFramedRoute |
#replyItem Framed-Routing radiusFramedRouting |
#replyItem Filter-Id radiusFilterId |
#replyItem Framed-MTU radiusFramedMTU |
#replyItem Framed-Compression radiusFramedCompression |
#replyItem Login-IP-Host radiusLoginIPHost |
#replyItem Login-Service radiusLoginService |
#replyItem Login-TCP-Port radiusLoginTCPPort |
#replyItem Callback-Number radiusCallbackNumber |
#replyItem Callback-Id radiusCallbackId |
#replyItem Framed-IPX-Network radiusFramedIPXNetwork |
#replyItem Class radiusClass |
#replyItem Session-Timeout radiusSessionTimeout |
#replyItem Idle-Timeout radiusIdleTimeout |
#replyItem Termination-Action radiusTerminationAction |
#replyItem Login-LAT-Service radiusLoginLATService |
#replyItem Login-LAT-Node radiusLoginLATNode |
#replyItem Login-LAT-Group radiusLoginLATGroup |
#replyItem Framed-AppleTalk-Link radiusFramedAppleTalkLink |
#replyItem Framed-AppleTalk-Network radiusFramedAppleTalkNetwork |
#replyItem Framed-AppleTalk-Zone radiusFramedAppleTalkZone |
#replyItem Port-Limit radiusPortLimit |
#replyItem Login-LAT-Port radiusLoginLATPort |
#replyItem Reply-Message radiusReplyMessage |
/conf/alcasar-radius |
---|
0,0 → 1,503 |
###################################################################### |
# |
# As of 2.0.0, FreeRADIUS supports virtual hosts using the |
# "server" section, and configuration directives. |
# |
# Virtual hosts should be put into the "sites-available" |
# directory. Soft links should be created in the "sites-enabled" |
# directory to these files. This is done in a normal installation. |
# |
# $Id$ |
# |
###################################################################### |
# |
# Read "man radiusd" before editing this file. See the section |
# titled DEBUGGING. It outlines a method where you can quickly |
# obtain the configuration you want, without running into |
# trouble. See also "man unlang", which documents the format |
# of this file. |
# |
# This configuration is designed to work in the widest possible |
# set of circumstances, with the widest possible number of |
# authentication methods. This means that in general, you should |
# need to make very few changes to this file. |
# |
# The best way to configure the server for your local system |
# is to CAREFULLY edit this file. Most attempts to make large |
# edits to this file will BREAK THE SERVER. Any edits should |
# be small, and tested by running the server with "radiusd -X". |
# Once the edits have been verified to work, save a copy of these |
# configuration files somewhere. (e.g. as a "tar" file). Then, |
# make more edits, and test, as above. |
# |
# There are many "commented out" references to modules such |
# as ldap, sql, etc. These references serve as place-holders. |
# If you need the functionality of that module, then configure |
# it in radiusd.conf, and un-comment the references to it in |
# this file. In most cases, those small changes will result |
# in the server being able to connect to the DB, and to |
# authenticate users. |
# |
###################################################################### |
# |
# In 1.x, the "authorize", etc. sections were global in |
# radiusd.conf. As of 2.0, they SHOULD be in a server section. |
# |
# The server section with no virtual server name is the "default" |
# section. It is used when no server name is specified. |
# |
# We don't indent the rest of this file, because doing so |
# would make it harder to read. |
# |
# Authorization. First preprocess (hints and huntgroups files), |
# then realms, and finally look in the "users" file. |
# |
# The order of the realm modules will determine the order that |
# we try to find a matching realm. |
# |
# Make *sure* that 'preprocess' comes before any realm if you |
# need to setup hints for the remote radius server |
authorize { |
# |
# The preprocess module takes care of sanitizing some bizarre |
# attributes in the request, and turning them into attributes |
# which are more standard. |
# |
# It takes care of processing the 'raddb/hints' and the |
# 'raddb/huntgroups' files. |
# |
# It also adds the %{Client-IP-Address} attribute to the request. |
preprocess |
# |
# If you want to have a log of authentication requests, |
# un-comment the following line, and the 'detail auth_log' |
# section, above. |
# auth_log |
# |
# The chap module will set 'Auth-Type := CHAP' if we are |
# handling a CHAP request and Auth-Type has not already been set |
# chap |
# |
# If the users are logging in with an MS-CHAP-Challenge |
# attribute for authentication, the mschap module will find |
# the MS-CHAP-Challenge attribute, and add 'Auth-Type := MS-CHAP' |
# to the request, which will cause the server to then use |
# the mschap module for authentication. |
# mschap |
# |
# If you have a Cisco SIP server authenticating against |
# FreeRADIUS, uncomment the following line, and the 'digest' |
# line in the 'authenticate' section. |
# digest |
# |
# Look for IPASS style 'realm/', and if not found, look for |
# '@realm', and decide whether or not to proxy, based on |
# that. |
# IPASS |
# |
# If you are using multiple kinds of realms, you probably |
# want to set "ignore_null = yes" for all of them. |
# Otherwise, when the first style of realm doesn't match, |
# the other styles won't be checked. |
# |
# suffix |
# ntdomain |
# |
# This module takes care of EAP-MD5, EAP-TLS, and EAP-LEAP |
# authentication. |
# |
# It also sets the EAP-Type attribute in the request |
# attribute list to the EAP type from the packet. |
# |
# As of 2.0, the EAP module returns "ok" in the authorize stage |
# for TTLS and PEAP. In 1.x, it never returned "ok" here, so |
# this change is compatible with older configurations. |
# |
# The example below uses module failover to avoid querying all |
# of the following modules if the EAP module returns "ok". |
# Therefore, your LDAP and/or SQL servers will not be queried |
# for the many packets that go back and forth to set up TTLS |
# or PEAP. The load on those servers will therefore be reduced. |
# |
# eap { |
# ok = return |
# } |
# |
# Pull crypt'd passwords from /etc/passwd or /etc/shadow, |
# using the system API's to get the password. If you want |
# to read /etc/passwd or /etc/shadow directly, see the |
# passwd module in radiusd.conf. |
# |
# unix |
# |
# Read the 'users' file |
# files |
# |
# Look in an SQL database. The schema of the database |
# is meant to mirror the "users" file. |
# |
# See "Authorization Queries" in sql.conf |
sql |
noresetcounter |
dailycounter |
monthlycounter |
# |
# If you are using /etc/smbpasswd, and are also doing |
# mschap authentication, the un-comment this line, and |
# configure the 'etc_smbpasswd' module, above. |
# etc_smbpasswd |
# |
# The ldap module will set Auth-Type to LDAP if it has not |
# already been set |
# ldap |
# |
# Enforce daily limits on time spent logged in. |
# daily |
# |
# Use the checkval module |
# checkval |
expiration |
logintime |
# |
# If no other module has claimed responsibility for |
# authentication, then try to use PAP. This allows the |
# other modules listed above to add a "known good" password |
# to the request, and to do nothing else. The PAP module |
# will then see that password, and use it to do PAP |
# authentication. |
# |
# This module should be listed last, so that the other modules |
# get a chance to set Auth-Type for themselves. |
# |
# pap |
# |
# If "status_server = yes", then Status-Server messages are passed |
# through the following section, and ONLY the following section. |
# This permits you to do DB queries, for example. If the modules |
# listed here return "fail", then NO response is sent. |
# |
# Autz-Type Status-Server { |
# |
# } |
} |
# Authentication. |
# |
# |
# This section lists which modules are available for authentication. |
# Note that it does NOT mean 'try each module in order'. It means |
# that a module from the 'authorize' section adds a configuration |
# attribute 'Auth-Type := FOO'. That authentication type is then |
# used to pick the apropriate module from the list below. |
# |
# In general, you SHOULD NOT set the Auth-Type attribute. The server |
# will figure it out on its own, and will do the right thing. The |
# most common side effect of erroneously setting the Auth-Type |
# attribute is that one authentication method will work, but the |
# others will not. |
# |
# The common reasons to set the Auth-Type attribute by hand |
# is to either forcibly reject the user (Auth-Type := Reject), |
# or to or forcibly accept the user (Auth-Type := Accept). |
# |
# Note that Auth-Type := Accept will NOT work with EAP. |
# |
# Please do not put "unlang" configurations into the "authenticate" |
# section. Put them in the "post-auth" section instead. That's what |
# the post-auth section is for. |
# |
authenticate { |
# # |
# # PAP authentication, when a back-end database listed |
# # in the 'authorize' section supplies a password. The |
# # password can be clear-text, or encrypted. |
# Auth-Type PAP { |
# pap |
# } |
# |
# # |
# # Most people want CHAP authentication |
# # A back-end database listed in the 'authorize' section |
# # MUST supply a CLEAR TEXT password. Encrypted passwords |
# # won't work. |
# Auth-Type CHAP { |
# chap |
# } |
# |
# # |
# # MSCHAP authentication. |
# Auth-Type MS-CHAP { |
# mschap |
# } |
# |
# # |
# # If you have a Cisco SIP server authenticating against |
# # FreeRADIUS, uncomment the following line, and the 'digest' |
# # line in the 'authorize' section. |
# digest |
# |
# # |
# # Pluggable Authentication Modules. |
# pam |
# |
# # |
# # See 'man getpwent' for information on how the 'unix' |
# # module checks the users password. Note that packets |
# # containing CHAP-Password attributes CANNOT be authenticated |
# # against /etc/passwd! See the FAQ for details. |
# # |
# unix |
# |
# # Uncomment it if you want to use ldap for authentication |
# # |
# # Note that this means "check plain-text password against |
# # the ldap database", which means that EAP won't work, |
# # as it does not supply a plain-text password. |
# Auth-Type LDAP { |
# ldap |
# } |
# |
# # |
# # Allow EAP authentication. |
# eap |
} |
# |
# Pre-accounting. Decide which accounting type to use. |
# |
preacct { |
preprocess |
# |
# Ensure that we have a semi-unique identifier for every |
# request, and many NAS boxes are broken. |
# acct_unique |
# |
# Look for IPASS-style 'realm/', and if not found, look for |
# '@realm', and decide whether or not to proxy, based on |
# that. |
# |
# Accounting requests are generally proxied to the same |
# home server as authentication requests. |
# IPASS |
# suffix |
# ntdomain |
# |
# Read the 'acct_users' file |
# files |
} |
# |
# Accounting. Log the accounting data. |
# |
accounting { |
# |
# Create a 'detail'ed log of the packets. |
# Note that accounting requests which are proxied |
# are also logged in the detail file. |
# detail |
# daily |
# Update the wtmp file |
# |
# If you don't use "radlast", you can delete this line. |
# unix |
# |
# For Simultaneous-Use tracking. |
# |
# Due to packet losses in the network, the data here |
# may be incorrect. There is little we can do about it. |
# radutmp |
sradutmp |
# Return an address to the IP Pool when we see a stop record. |
# main_pool |
# |
# Log traffic to an SQL database. |
# |
# See "Accounting queries" in sql.conf |
sql |
# |
# Instead of sending the query to the SQL server, |
# write it into a log file. |
# |
# sql_log |
# Cisco VoIP specific bulk accounting |
# pgsql-voip |
# Filter attributes from the accounting response. |
attr_filter.accounting_response |
# |
# See "Autz-Type Status-Server" for how this works. |
# |
# Acct-Type Status-Server { |
# |
# } |
} |
# Session database, used for checking Simultaneous-Use. Either the radutmp |
# or rlm_sql module can handle this. |
# The rlm_sql module is *much* faster |
session { |
# radutmp |
# |
# See "Simultaneous Use Checking Queries" in sql.conf |
sql |
} |
# Post-Authentication |
# Once we KNOW that the user has been authenticated, there are |
# additional steps we can take. |
post-auth { |
# Get an address from the IP Pool. |
# main_pool |
# |
# If you want to have a log of authentication replies, |
# un-comment the following line, and the 'detail reply_log' |
# section, above. |
# reply_log |
# |
# After authenticating the user, do another SQL query. |
# |
# See "Authentication Logging Queries" in sql.conf |
# sql |
# |
# Instead of sending the query to the SQL server, |
# write it into a log file. |
# |
# sql_log |
# |
# Un-comment the following if you have set |
# 'edir_account_policy_check = yes' in the ldap module sub-section of |
# the 'modules' section. |
# |
# ldap |
# exec |
# |
# Access-Reject packets are sent through the REJECT sub-section of the |
# post-auth section. |
# |
# Add the ldap module name (or instance) if you have set |
# 'edir_account_policy_check = yes' in the ldap module configuration |
# |
Post-Auth-Type REJECT { |
attr_filter.access_reject |
} |
} |
# |
# When the server decides to proxy a request to a home server, |
# the proxied request is first passed through the pre-proxy |
# stage. This stage can re-write the request, or decide to |
# cancel the proxy. |
# |
# Only a few modules currently have this method. |
# |
pre-proxy { |
# attr_rewrite |
# Uncomment the following line if you want to change attributes |
# as defined in the preproxy_users file. |
# files |
# Uncomment the following line if you want to filter requests |
# sent to remote servers based on the rules defined in the |
# 'attrs.pre-proxy' file. |
# attr_filter.pre-proxy |
# If you want to have a log of packets proxied to a home |
# server, un-comment the following line, and the |
# 'detail pre_proxy_log' section, above. |
# pre_proxy_log |
} |
# |
# When the server receives a reply to a request it proxied |
# to a home server, the request may be massaged here, in the |
# post-proxy stage. |
# |
post-proxy { |
# If you want to have a log of replies from a home server, |
# un-comment the following line, and the 'detail post_proxy_log' |
# section, above. |
# post_proxy_log |
# attr_rewrite |
# Uncomment the following line if you want to filter replies from |
# remote proxies based on the rules defined in the 'attrs' file. |
# attr_filter.post-proxy |
# |
# If you are proxying LEAP, you MUST configure the EAP |
# module, and you MUST list it here, in the post-proxy |
# stage. |
# |
# You MUST also use the 'nostrip' option in the 'realm' |
# configuration. Otherwise, the User-Name attribute |
# in the proxied request will not match the user name |
# hidden inside of the EAP packet, and the end server will |
# reject the EAP request. |
# |
# eap |
# |
# If the server tries to proxy a request and fails, then the |
# request is processed through the modules in this section. |
# |
# The main use of this section is to permit robust proxying |
# of accounting packets. The server can be configured to |
# proxy accounting packets as part of normal processing. |
# Then, if the home server goes down, accounting packets can |
# be logged to a local "detail" file, for processing with |
# radrelay. When the home server comes back up, radrelay |
# will read the detail file, and send the packets to the |
# home server. |
# |
# With this configuration, the server always responds to |
# Accounting-Requests from the NAS, but only writes |
# accounting packets to disk if the home server is down. |
# |
# Post-Proxy-Type Fail { |
# detail |
# } |
} |
/conf/radiusd-db-vierge.sql |
---|
0,0 → 1,349 |
-- MySQL dump 10.11 |
-- |
-- Host: localhost Database: radius |
-- ------------------------------------------------------ |
-- Server version 5.0.67 |
/*!40101 SET @OLD_CHARACTER_SET_CLIENT=@@CHARACTER_SET_CLIENT */; |
/*!40101 SET @OLD_CHARACTER_SET_RESULTS=@@CHARACTER_SET_RESULTS */; |
/*!40101 SET @OLD_COLLATION_CONNECTION=@@COLLATION_CONNECTION */; |
/*!40101 SET NAMES utf8 */; |
/*!40103 SET @OLD_TIME_ZONE=@@TIME_ZONE */; |
/*!40103 SET TIME_ZONE='+00:00' */; |
/*!40014 SET @OLD_UNIQUE_CHECKS=@@UNIQUE_CHECKS, UNIQUE_CHECKS=0 */; |
/*!40014 SET @OLD_FOREIGN_KEY_CHECKS=@@FOREIGN_KEY_CHECKS, FOREIGN_KEY_CHECKS=0 */; |
/*!40101 SET @OLD_SQL_MODE=@@SQL_MODE, SQL_MODE='NO_AUTO_VALUE_ON_ZERO' */; |
/*!40111 SET @OLD_SQL_NOTES=@@SQL_NOTES, SQL_NOTES=0 */; |
-- |
-- Current Database: `radius` |
-- |
CREATE DATABASE /*!32312 IF NOT EXISTS*/ `radius` /*!40100 DEFAULT CHARACTER SET utf8 COLLATE utf8_unicode_ci */; |
USE `radius`; |
-- |
-- Table structure for table `mtotacct` |
-- |
DROP TABLE IF EXISTS `mtotacct`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `mtotacct` ( |
`MTotAcctId` bigint(21) NOT NULL auto_increment, |
`UserName` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`AcctDate` date NOT NULL default '0000-00-00', |
`ConnNum` bigint(12) default NULL, |
`ConnTotDuration` bigint(12) default NULL, |
`ConnMaxDuration` bigint(12) default NULL, |
`ConnMinDuration` bigint(12) default NULL, |
`InputOctets` bigint(12) default NULL, |
`OutputOctets` bigint(12) default NULL, |
`NASIPAddress` varchar(15) collate utf8_unicode_ci default NULL, |
PRIMARY KEY (`MTotAcctId`), |
KEY `UserName` (`UserName`), |
KEY `AcctDate` (`AcctDate`), |
KEY `UserOnDate` (`UserName`,`AcctDate`), |
KEY `NASIPAddress` (`NASIPAddress`) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `mtotacct` |
-- |
LOCK TABLES `mtotacct` WRITE; |
/*!40000 ALTER TABLE `mtotacct` DISABLE KEYS */; |
/*!40000 ALTER TABLE `mtotacct` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `radacct` |
-- |
DROP TABLE IF EXISTS `radacct`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `radacct` ( |
`radacctid` bigint(21) NOT NULL auto_increment, |
`acctsessionid` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`acctuniqueid` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`realm` varchar(64) collate utf8_unicode_ci default '', |
`nasipaddress` varchar(15) collate utf8_unicode_ci NOT NULL default '', |
`nasportid` varchar(15) collate utf8_unicode_ci default NULL, |
`nasporttype` varchar(32) collate utf8_unicode_ci default NULL, |
`acctstarttime` datetime default NULL, |
`acctstoptime` datetime default NULL, |
`acctsessiontime` int(12) default NULL, |
`acctauthentic` varchar(32) collate utf8_unicode_ci default NULL, |
`connectinfo_start` varchar(50) collate utf8_unicode_ci default NULL, |
`connectinfo_stop` varchar(50) collate utf8_unicode_ci default NULL, |
`acctinputoctets` bigint(20) default NULL, |
`acctoutputoctets` bigint(20) default NULL, |
`calledstationid` varchar(50) collate utf8_unicode_ci NOT NULL default '', |
`callingstationid` varchar(50) collate utf8_unicode_ci NOT NULL default '', |
`acctterminatecause` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`servicetype` varchar(32) collate utf8_unicode_ci default NULL, |
`framedprotocol` varchar(32) collate utf8_unicode_ci default NULL, |
`framedipaddress` varchar(15) collate utf8_unicode_ci NOT NULL default '', |
`acctstartdelay` int(12) default NULL, |
`acctstopdelay` int(12) default NULL, |
`xascendsessionsvrkey` varchar(10) collate utf8_unicode_ci default NULL, |
PRIMARY KEY (`radacctid`), |
KEY `username` (`username`), |
KEY `framedipaddress` (`framedipaddress`), |
KEY `acctsessionid` (`acctsessionid`), |
KEY `acctsessiontime` (`acctsessiontime`), |
KEY `acctuniqueid` (`acctuniqueid`), |
KEY `acctstarttime` (`acctstarttime`), |
KEY `acctstoptime` (`acctstoptime`), |
KEY `nasipaddress` (`nasipaddress`) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `radacct` |
-- |
LOCK TABLES `radacct` WRITE; |
/*!40000 ALTER TABLE `radacct` DISABLE KEYS */; |
/*!40000 ALTER TABLE `radacct` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `radcheck` |
-- |
DROP TABLE IF EXISTS `radcheck`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `radcheck` ( |
`id` int(11) unsigned NOT NULL auto_increment, |
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`op` char(2) collate utf8_unicode_ci NOT NULL default '==', |
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '', |
PRIMARY KEY (`id`), |
KEY `username` (`username`(32)) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `radcheck` |
-- |
LOCK TABLES `radcheck` WRITE; |
/*!40000 ALTER TABLE `radcheck` DISABLE KEYS */; |
/*!40000 ALTER TABLE `radcheck` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `radgroupcheck` |
-- |
DROP TABLE IF EXISTS `radgroupcheck`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `radgroupcheck` ( |
`id` int(11) unsigned NOT NULL auto_increment, |
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`op` char(2) collate utf8_unicode_ci NOT NULL default '==', |
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '', |
PRIMARY KEY (`id`), |
KEY `groupname` (`groupname`(32)) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `radgroupcheck` |
-- |
LOCK TABLES `radgroupcheck` WRITE; |
/*!40000 ALTER TABLE `radgroupcheck` DISABLE KEYS */; |
/*!40000 ALTER TABLE `radgroupcheck` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `radgroupreply` |
-- |
DROP TABLE IF EXISTS `radgroupreply`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `radgroupreply` ( |
`id` int(11) unsigned NOT NULL auto_increment, |
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`op` char(2) collate utf8_unicode_ci NOT NULL default '=', |
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '', |
PRIMARY KEY (`id`), |
KEY `groupname` (`groupname`(32)) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `radgroupreply` |
-- |
LOCK TABLES `radgroupreply` WRITE; |
/*!40000 ALTER TABLE `radgroupreply` DISABLE KEYS */; |
/*!40000 ALTER TABLE `radgroupreply` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `radpostauth` |
-- |
DROP TABLE IF EXISTS `radpostauth`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `radpostauth` ( |
`id` int(11) NOT NULL auto_increment, |
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`reply` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`authdate` timestamp NOT NULL default CURRENT_TIMESTAMP on update CURRENT_TIMESTAMP, |
PRIMARY KEY (`id`) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `radpostauth` |
-- |
LOCK TABLES `radpostauth` WRITE; |
/*!40000 ALTER TABLE `radpostauth` DISABLE KEYS */; |
/*!40000 ALTER TABLE `radpostauth` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `radreply` |
-- |
DROP TABLE IF EXISTS `radreply`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `radreply` ( |
`id` int(11) unsigned NOT NULL auto_increment, |
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '', |
`op` char(2) collate utf8_unicode_ci NOT NULL default '=', |
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '', |
PRIMARY KEY (`id`), |
KEY `username` (`username`(32)) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `radreply` |
-- |
LOCK TABLES `radreply` WRITE; |
/*!40000 ALTER TABLE `radreply` DISABLE KEYS */; |
/*!40000 ALTER TABLE `radreply` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `radusergroup` |
-- |
DROP TABLE IF EXISTS `radusergroup`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `radusergroup` ( |
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`priority` int(11) NOT NULL default '1', |
KEY `username` (`username`(32)) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `radusergroup` |
-- |
LOCK TABLES `radusergroup` WRITE; |
/*!40000 ALTER TABLE `radusergroup` DISABLE KEYS */; |
/*!40000 ALTER TABLE `radusergroup` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `totacct` |
-- |
DROP TABLE IF EXISTS `totacct`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `totacct` ( |
`TotAcctId` bigint(21) NOT NULL auto_increment, |
`UserName` varchar(64) collate utf8_unicode_ci NOT NULL default '', |
`AcctDate` date NOT NULL default '0000-00-00', |
`ConnNum` bigint(12) default NULL, |
`ConnTotDuration` bigint(12) default NULL, |
`ConnMaxDuration` bigint(12) default NULL, |
`ConnMinDuration` bigint(12) default NULL, |
`InputOctets` bigint(12) default NULL, |
`OutputOctets` bigint(12) default NULL, |
`NASIPAddress` varchar(15) collate utf8_unicode_ci default NULL, |
PRIMARY KEY (`TotAcctId`), |
KEY `UserName` (`UserName`), |
KEY `AcctDate` (`AcctDate`), |
KEY `UserOnDate` (`UserName`,`AcctDate`), |
KEY `NASIPAddress` (`NASIPAddress`), |
KEY `NASIPAddressOnDate` (`AcctDate`,`NASIPAddress`) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `totacct` |
-- |
LOCK TABLES `totacct` WRITE; |
/*!40000 ALTER TABLE `totacct` DISABLE KEYS */; |
/*!40000 ALTER TABLE `totacct` ENABLE KEYS */; |
UNLOCK TABLES; |
-- |
-- Table structure for table `userinfo` |
-- |
DROP TABLE IF EXISTS `userinfo`; |
SET @saved_cs_client = @@character_set_client; |
SET character_set_client = utf8; |
CREATE TABLE `userinfo` ( |
`id` int(10) NOT NULL auto_increment, |
`UserName` varchar(30) collate utf8_unicode_ci default NULL, |
`Name` varchar(200) collate utf8_unicode_ci default NULL, |
`Mail` varchar(200) collate utf8_unicode_ci default NULL, |
`Department` varchar(200) collate utf8_unicode_ci default NULL, |
`WorkPhone` varchar(200) collate utf8_unicode_ci default NULL, |
`HomePhone` varchar(200) collate utf8_unicode_ci default NULL, |
`Mobile` varchar(200) collate utf8_unicode_ci default NULL, |
PRIMARY KEY (`id`), |
KEY `UserName` (`UserName`), |
KEY `Department` (`Department`) |
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; |
SET character_set_client = @saved_cs_client; |
-- |
-- Dumping data for table `userinfo` |
-- |
LOCK TABLES `userinfo` WRITE; |
/*!40000 ALTER TABLE `userinfo` DISABLE KEYS */; |
/*!40000 ALTER TABLE `userinfo` ENABLE KEYS */; |
UNLOCK TABLES; |
/*!40103 SET TIME_ZONE=@OLD_TIME_ZONE */; |
/*!40101 SET SQL_MODE=@OLD_SQL_MODE */; |
/*!40014 SET FOREIGN_KEY_CHECKS=@OLD_FOREIGN_KEY_CHECKS */; |
/*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */; |
/*!40101 SET CHARACTER_SET_CLIENT=@OLD_CHARACTER_SET_CLIENT */; |
/*!40101 SET CHARACTER_SET_RESULTS=@OLD_CHARACTER_SET_RESULTS */; |
/*!40101 SET COLLATION_CONNECTION=@OLD_COLLATION_CONNECTION */; |
/*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */; |
-- Dump completed on 2009-01-01 21:20:42 |
/conf/blacklists.tar.gz |
---|
Cannot display: file marked as a binary type. |
svn:mime-type = application/octet-stream |
Property changes: |
Added: svn:mime-type |
+application/octet-stream |
\ No newline at end of property |
/conf/dansguardian-init |
---|
0,0 → 1,103 |
#!/bin/sh |
# |
# Startup script for dansguardian |
# |
# chkconfig: 345 92 8 |
# description: A web content filtering plugin for web \ |
# proxies, developed to filter using lists of \ |
# banned phrases, MIME types, filename \ |
# extensions and PICS labelling. |
# processname: dansguardian |
# pidfile: /var/run/dansguardian.pid |
# config: /etc/dansguardian/dansguardian.conf |
### BEGIN INIT INFO |
# Provides: dansguardian |
# Required-Start: $network |
# Required-Stop: $network |
# Should-Start: $named |
# Should-Stop: $named |
# Default-Start: 3 4 5 |
# Short-Description: Starts the dansguardian daemon |
# Description: A web content filtering plugin for web \ |
# proxies, developed to filter using lists of \ |
# banned phrases, MIME types, filename \ |
# extensions and PICS labelling. |
### END INIT INFO |
# Source function library. |
. /etc/rc.d/init.d/functions |
# Source networking configuration. |
. /etc/sysconfig/network |
# Check that networking is up. |
[ ${NETWORKING} = "no" ] && exit 0 |
RETVAL=0 |
start() { |
gprintf "Starting dansguardian: " |
daemon dansguardian |
RETVAL=$? |
echo |
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/dansguardian |
return $RETVAL |
} |
stop() { |
gprintf "Shutting down dansguardian: " |
killproc dansguardian |
if [ ! -z "`pidof dansguardian`" ]; then |
echo |
gprintf "Giving dansguardian more time to exit: " |
while [ ! -z "`pidof dansguardian`" ]; do echo -n "."; sleep 1; done && success || failure |
fi |
echo |
RETVAL=$? |
[ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/dansguardian /var/run/dansguardian/dansguardian.pid \ |
/var/lib/dansguardian/.dguardianipc /var/lib/dansguardian/.dguardianurlipc \ |
/var/lib/dansguardian/.dguardianipipc |
return $RETVAL |
} |
restart() { |
stop |
start |
} |
reload() { |
gprintf "Reloading dansguardian: " |
killproc dansguardian -HUP |
RETVAL=$? |
echo |
return $RETVAL |
} |
case "$1" in |
start) |
start |
;; |
stop) |
stop |
;; |
restart) |
restart |
;; |
reload) |
reload |
;; |
condrestart) |
[ -e /var/lock/subsys/dansguardian ] && restart |
RETVAL=$? |
;; |
status) |
status dansguardian |
RETVAL=$? |
;; |
*) |
gprintf "Usage: %s {start|stop|restart|reload|condrestart|status}\n" "$0" |
RETVAL=1 |
esac |
exit $RETVAL |
/conf/rpms-update/python-coova-chilli-1.2.1-1mdv2010.0.noarch.rpm |
---|
Cannot display: file marked as a binary type. |
svn:mime-type = application/octet-stream |
Property changes: |
Added: svn:mime-type |
+application/octet-stream |
\ No newline at end of property |
/conf/rpms-update/coova-chilli-1.2.1-1mdv2010.0.i586.rpm |
---|
Cannot display: file marked as a binary type. |
svn:mime-type = application/octet-stream |
Property changes: |
Added: svn:mime-type |
+application/octet-stream |
\ No newline at end of property |
/conf/rpms-update/libchilli0-1.2.1-1mdv2010.0.i586.rpm |
---|
Cannot display: file marked as a binary type. |
svn:mime-type = application/octet-stream |
Property changes: |
Added: svn:mime-type |
+application/octet-stream |
\ No newline at end of property |
/conf/rpms-update/mindi-2.0.7.1-1.mdv2010.0.i586.rpm |
---|
Cannot display: file marked as a binary type. |
svn:mime-type = application/octet-stream |
Property changes: |
Added: svn:mime-type |
+application/octet-stream |
\ No newline at end of property |
/conf/bashrc |
---|
0,0 → 1,46 |
# /etc/bashrc |
# System wide functions and aliases |
# Environment stuff goes in /etc/profile |
# by default, we want this to get set. |
# Even for non-interactive, non-login shells. |
if [ "`id -gn`" = "`id -un`" -a `id -u` -gt 99 ]; then |
umask 002 |
else |
umask 022 |
fi |
# are we an interactive shell? |
if [ "$PS1" ]; then |
case $TERM in |
xterm*) |
PROMPT_COMMAND='echo -ne "\033]0;${USER}@${HOSTNAME}: ${PWD}\007"' |
;; |
*) |
;; |
esac |
# [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\u@\h \W]\\$ " |
if [ `id -un` = root ]; then |
PS1='\[\033[1;31m\]\h:\w\$\[\033[0m\] ' |
else |
PS1='\[\033[1;30m\]\h:\w\$\[\033[0m\] ' |
fi |
if [ -z "$loginsh" ]; then # We're not a login shell |
# Not all scripts in profile.d are compatible with other shells |
# TODO: make the scripts compatible or check the running shell by |
# themselves. |
if [ -n "${BASH_VERSION}${KSH_VERSION}${ZSH_VERSION}" ]; then |
for i in /etc/profile.d/*.sh; do |
if [ -x $i ]; then |
. $i |
fi |
done |
unset i |
fi |
fi |
fi |
unset loginsh |
/conf/dialup.conf |
---|
0,0 → 1,303 |
# -*- text -*- |
## |
## dialup.conf -- MySQL configuration for default schema (schema.sql) |
## |
## $Id$ |
# Safe characters list for sql queries. Everything else is replaced |
# with their mime-encoded equivalents. |
# The default list should be ok |
#safe-characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" |
####################################################################### |
# Query config: Username |
####################################################################### |
# This is the username that will get substituted, escaped, and added |
# as attribute 'SQL-User-Name'. '%{SQL-User-Name}' should be used below |
# everywhere a username substitution is needed so you you can be sure |
# the username passed from the client is escaped properly. |
# |
# Uncomment the next line, if you want the sql_user_name to mean: |
# |
# Use Stripped-User-Name, if it's there. |
# Else use User-Name, if it's there, |
# Else use hard-coded string "DEFAULT" as the user name. |
#sql_user_name = "%{%{Stripped-User-Name}:-%{%{User-Name}:-DEFAULT}}" |
# |
sql_user_name = "%{User-Name}" |
####################################################################### |
# Default profile |
####################################################################### |
# This is the default profile. It is found in SQL by group membership. |
# That means that this profile must be a member of at least one group |
# which will contain the corresponding check and reply items. |
# This profile will be queried in the authorize section for every user. |
# The point is to assign all users a default profile without having to |
# manually add each one to a group that will contain the profile. |
# The SQL module will also honor the User-Profile attribute. This |
# attribute can be set anywhere in the authorize section (ie the users |
# file). It is found exactly as the default profile is found. |
# If it is set then it will *overwrite* the default profile setting. |
# The idea is to select profiles based on checks on the incoming packets, |
# not on user group membership. For example: |
# -- users file -- |
# DEFAULT Service-Type == Outbound-User, User-Profile := "outbound" |
# DEFAULT Service-Type == Framed-User, User-Profile := "framed" |
# |
# By default the default_user_profile is not set |
# |
#default_user_profile = "DEFAULT" |
####################################################################### |
# NAS Query |
####################################################################### |
# This query retrieves the radius clients |
# |
# 0. Row ID (currently unused) |
# 1. Name (or IP address) |
# 2. Shortname |
# 3. Type |
# 4. Secret |
####################################################################### |
nas_query = "SELECT id, nasname, shortname, type, secret FROM ${nas_table}" |
####################################################################### |
# Authorization Queries |
####################################################################### |
# These queries compare the check items for the user |
# in ${authcheck_table} and setup the reply items in |
# ${authreply_table}. You can use any query/tables |
# you want, but the return data for each row MUST |
# be in the following order: |
# |
# 0. Row ID (currently unused) |
# 1. UserName/GroupName |
# 2. Item Attr Name |
# 3. Item Attr Value |
# 4. Item Attr Operation |
####################################################################### |
# Use these for case sensitive usernames. |
authorize_check_query = "SELECT id, username, attribute, value, op \ |
FROM ${authcheck_table} \ |
WHERE username = BINARY '%{SQL-User-Name}' \ |
ORDER BY id" |
authorize_reply_query = "SELECT id, username, attribute, value, op \ |
FROM ${authreply_table} \ |
WHERE username = BINARY '%{SQL-User-Name}' \ |
ORDER BY id" |
# The default queries are case insensitive. (for compatibility with |
# older versions of FreeRADIUS) |
# authorize_check_query = "SELECT id, username, attribute, value, op \ |
# FROM ${authcheck_table} \ |
# WHERE username = '%{SQL-User-Name}' \ |
# ORDER BY id" |
# authorize_reply_query = "SELECT id, username, attribute, value, op \ |
# FROM ${authreply_table} \ |
# WHERE username = '%{SQL-User-Name}' \ |
# ORDER BY id" |
# Use these for case sensitive usernames. |
group_membership_query = "SELECT groupname \ |
FROM ${usergroup_table} \ |
WHERE username = BINARY '%{SQL-User-Name}' \ |
ORDER BY priority" |
# group_membership_query = "SELECT groupname \ |
# FROM ${usergroup_table} \ |
# WHERE username = '%{SQL-User-Name}' \ |
# ORDER BY priority" |
authorize_group_check_query = "SELECT id, groupname, attribute, \ |
Value, op \ |
FROM ${groupcheck_table} \ |
WHERE groupname = '%{Sql-Group}' \ |
ORDER BY id" |
authorize_group_reply_query = "SELECT id, groupname, attribute, \ |
value, op \ |
FROM ${groupreply_table} \ |
WHERE groupname = '%{Sql-Group}' \ |
ORDER BY id" |
####################################################################### |
# Accounting Queries |
####################################################################### |
# accounting_onoff_query - query for Accounting On/Off packets |
# accounting_update_query - query for Accounting update packets |
# accounting_update_query_alt - query for Accounting update packets |
# (alternate in case first query fails) |
# accounting_start_query - query for Accounting start packets |
# accounting_start_query_alt - query for Accounting start packets |
# (alternate in case first query fails) |
# accounting_stop_query - query for Accounting stop packets |
# accounting_stop_query_alt - query for Accounting start packets |
# (alternate in case first query doesn't |
# affect any existing rows in the table) |
####################################################################### |
accounting_onoff_query = "\ |
UPDATE ${acct_table1} \ |
SET \ |
acctstoptime = '%S', \ |
acctsessiontime = unix_timestamp('%S') - \ |
unix_timestamp(acctstarttime), \ |
acctterminatecause = '%{Acct-Terminate-Cause}', \ |
acctstopdelay = %{%{Acct-Delay-Time}:-0} \ |
WHERE acctstoptime IS NULL \ |
AND nasipaddress = '%{NAS-IP-Address}' \ |
AND acctstarttime <= '%S'" |
accounting_update_query = " \ |
UPDATE ${acct_table1} \ |
SET \ |
framedipaddress = '%{Framed-IP-Address}', \ |
acctsessiontime = '%{Acct-Session-Time}', \ |
acctinputoctets = '%{%{Acct-Input-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Input-Octets}:-0}', \ |
acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Output-Octets}:-0}' \ |
WHERE acctsessionid = '%{Acct-Session-Id}' \ |
AND username = '%{SQL-User-Name}' \ |
AND nasipaddress = '%{NAS-IP-Address}'" |
accounting_update_query_alt = " \ |
INSERT INTO ${acct_table1} \ |
(acctsessionid, acctuniqueid, username, \ |
realm, nasipaddress, nasportid, \ |
nasporttype, acctstarttime, acctsessiontime, \ |
acctauthentic, connectinfo_start, acctinputoctets, \ |
acctoutputoctets, calledstationid, callingstationid, \ |
servicetype, framedprotocol, framedipaddress, \ |
acctstartdelay, xascendsessionsvrkey) \ |
VALUES \ |
('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', \ |
'%{SQL-User-Name}', \ |
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', \ |
'%{NAS-Port-Type}', \ |
DATE_SUB('%S', \ |
INTERVAL (%{%{Acct-Session-Time}:-0} + \ |
%{%{Acct-Delay-Time}:-0}) SECOND), \ |
'%{Acct-Session-Time}', \ |
'%{Acct-Authentic}', '', \ |
'%{%{Acct-Input-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Input-Octets}:-0}', \ |
'%{%{Acct-Output-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Output-Octets}:-0}', \ |
'%{Called-Station-Id}', '%{Calling-Station-Id}', \ |
'%{Service-Type}', '%{Framed-Protocol}', \ |
'%{Framed-IP-Address}', \ |
'0', '%{X-Ascend-Session-Svr-Key}')" |
accounting_start_query = " \ |
INSERT INTO ${acct_table1} \ |
(acctsessionid, acctuniqueid, username, \ |
realm, nasipaddress, nasportid, \ |
nasporttype, acctstarttime, acctstoptime, \ |
acctsessiontime, acctauthentic, connectinfo_start, \ |
connectinfo_stop, acctinputoctets, acctoutputoctets, \ |
calledstationid, callingstationid, acctterminatecause, \ |
servicetype, framedprotocol, framedipaddress, \ |
acctstartdelay, acctstopdelay, xascendsessionsvrkey) \ |
VALUES \ |
('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', \ |
'%{SQL-User-Name}', \ |
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', \ |
'%{NAS-Port-Type}', '%S', NULL, \ |
'0', '%{Acct-Authentic}', '%{Connect-Info}', \ |
'', '0', '0', \ |
'%{Called-Station-Id}', '%{Calling-Station-Id}', '', \ |
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', \ |
'%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}')" |
accounting_start_query_alt = " \ |
UPDATE ${acct_table1} SET \ |
acctstarttime = '%S', \ |
acctstartdelay = '%{%{Acct-Delay-Time}:-0}', \ |
connectinfo_start = '%{Connect-Info}' \ |
WHERE acctsessionid = '%{Acct-Session-Id}' \ |
AND username = '%{SQL-User-Name}' \ |
AND nasipaddress = '%{NAS-IP-Address}'" |
accounting_stop_query = " \ |
UPDATE ${acct_table2} SET \ |
acctstoptime = '%S', \ |
acctsessiontime = '%{Acct-Session-Time}', \ |
acctinputoctets = '%{%{Acct-Input-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Input-Octets}:-0}', \ |
acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Output-Octets}:-0}', \ |
acctterminatecause = '%{Acct-Terminate-Cause}', \ |
acctstopdelay = '%{%{Acct-Delay-Time}:-0}', \ |
connectinfo_stop = '%{Connect-Info}' \ |
WHERE acctsessionid = '%{Acct-Session-Id}' \ |
AND username = '%{SQL-User-Name}' \ |
AND nasipaddress = '%{NAS-IP-Address}'" |
accounting_stop_query_alt = " \ |
INSERT INTO ${acct_table2} \ |
(acctsessionid, acctuniqueid, username, \ |
realm, nasipaddress, nasportid, \ |
nasporttype, acctstarttime, acctstoptime, \ |
acctsessiontime, acctauthentic, connectinfo_start, \ |
connectinfo_stop, acctinputoctets, acctoutputoctets, \ |
calledstationid, callingstationid, acctterminatecause, \ |
servicetype, framedprotocol, framedipaddress, \ |
acctstartdelay, acctstopdelay) \ |
VALUES \ |
('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', \ |
'%{SQL-User-Name}', \ |
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', \ |
'%{NAS-Port-Type}', \ |
DATE_SUB('%S', \ |
INTERVAL (%{%{Acct-Session-Time}:-0} + \ |
%{%{Acct-Delay-Time}:-0}) SECOND), \ |
'%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '', \ |
'%{Connect-Info}', \ |
'%{%{Acct-Input-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Input-Octets}:-0}', \ |
'%{%{Acct-Output-Gigawords}:-0}' << 32 | \ |
'%{%{Acct-Output-Octets}:-0}', \ |
'%{Called-Station-Id}', '%{Calling-Station-Id}', \ |
'%{Acct-Terminate-Cause}', \ |
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', \ |
'0', '%{%{Acct-Delay-Time}:-0}')" |
####################################################################### |
# Simultaneous Use Checking Queries |
####################################################################### |
# simul_count_query - query for the number of current connections |
# - If this is not defined, no simultaneouls use checking |
# - will be performed by this module instance |
# simul_verify_query - query to return details of current connections for verification |
# - Leave blank or commented out to disable verification step |
# - Note that the returned field order should not be changed. |
####################################################################### |
# Uncomment simul_count_query to enable simultaneous use checking |
simul_count_query = "SELECT COUNT(*) \ |
FROM ${acct_table1} \ |
WHERE username = '%{SQL-User-Name}' \ |
AND acctstoptime IS NULL" |
#simul_verify_query = "SELECT radacctid, acctsessionid, username, \ |
#nasipaddress, nasportid, framedipaddress, \ |
#callingstationid, framedprotocol \ |
#FROM ${acct_table1} \ |
#WHERE username = '%{SQL-User-Name}' \ |
#AND acctstoptime IS NULL" |
####################################################################### |
# Authentication Logging Queries |
####################################################################### |
# postauth_query - Insert some info after authentication |
####################################################################### |
# (username, pass, reply, authdate) \ |
# '%{%{User-Password}:-%{Chap-Password}}', \ |
postauth_query = "INSERT INTO ${postauth_table} \ |
(username, reply, authdate) \ |
VALUES ( \ |
'%{User-Name}', \ |
'%{reply:Packet-Type}', '%S')" |
/conf/bannedurllist |
---|
0,0 → 1,41 |
# site de test : |
badboys.com |
#univ-toulouse url/blacklists collection. |
.Include</etc/dansguardian/lists/blacklists/adult/urls> |
.Include</etc/dansguardian/lists/blacklists/agressif/urls> |
#.Include</etc/dansguardian/lists/blacklists/astrology/urls> |
#.Include</etc/dansguardian/lists/blacklists/audio-video/urls> |
#.Include</etc/dansguardian/lists/blacklists/blog/urls> |
#.Include</etc/dansguardian/lists/blacklists/celebrity/urls> |
#.Include</etc/dansguardian/lists/blacklists/child/urls> |
#.Include</etc/dansguardian/lists/blacklists/cleaning/urls> |
.Include</etc/dansguardian/lists/blacklists/dangerous_material/urls> |
.Include</etc/dansguardian/lists/blacklists/dating/urls> |
.Include</etc/dansguardian/lists/blacklists/drogue/urls> |
#.Include</etc/dansguardian/lists/blacklists/filehosting/urls> |
#.Include</etc/dansguardian/lists/blacklists/financial/urls> |
#.Include</etc/dansguardian/lists/blacklists/forums/urls> |
.Include</etc/dansguardian/lists/blacklists/gambling/urls> |
#.Include</etc/dansguardian/lists/blacklists/games/urls> |
.Include</etc/dansguardian/lists/blacklists/hacking/urls> |
.Include</etc/dansguardian/lists/blacklists/malware/urls> |
#.Include</etc/dansguardian/lists/blacklists/manga/urls> |
.Include</etc/dansguardian/lists/blacklists/marketingware/urls> |
.Include</etc/dansguardian/lists/blacklists/mixed_adult/urls> |
#.Include</etc/dansguardian/lists/blacklists/mobile-phone/urls> |
.Include</etc/dansguardian/lists/blacklists/phishing/urls> |
#.Include</etc/dansguardian/lists/blacklists/publicite/urls> |
#.Include</etc/dansguardian/lists/blacklists/radio/urls> |
#.Include</etc/dansguardian/lists/blacklists/reaffected/urls> |
.Include</etc/dansguardian/lists/blacklists/redirector/urls> |
.Include</etc/dansguardian/lists/blacklists/sect/urls> |
#.Include</etc/dansguardian/lists/blacklists/sexual_education/urls> |
#.Include</etc/dansguardian/lists/blacklists/shopping/urls> |
.Include</etc/dansguardian/lists/blacklists/strict_redirector/urls> |
.Include</etc/dansguardian/lists/blacklists/strong_redirector/urls> |
.Include</etc/dansguardian/lists/blacklists/tricheur/urls> |
.Include</etc/dansguardian/lists/blacklists/warez/urls> |
#.Include</etc/dansguardian/lists/blacklists/webmail/urls> |
.Include</etc/dansguardian/lists/blacklists/ossi/urls> |
/conf/bannedsitelist |
---|
0,0 → 1,41 |
# site de test : |
badboys.com |
#univ-toulouse url/blacklists collection. |
.Include</etc/dansguardian/lists/blacklists/adult/domains> |
.Include</etc/dansguardian/lists/blacklists/agressif/domains> |
#.Include</etc/dansguardian/lists/blacklists/astrology/domains> |
#.Include</etc/dansguardian/lists/blacklists/audio-video/domains> |
#.Include</etc/dansguardian/lists/blacklists/blog/domains> |
#.Include</etc/dansguardian/lists/blacklists/celebrity/domains> |
#.Include</etc/dansguardian/lists/blacklists/child/domains> |
#.Include</etc/dansguardian/lists/blacklists/cleaning/domains> |
.Include</etc/dansguardian/lists/blacklists/dangerous_material/domains> |
.Include</etc/dansguardian/lists/blacklists/dating/domains> |
.Include</etc/dansguardian/lists/blacklists/drogue/domains> |
#.Include</etc/dansguardian/lists/blacklists/filehosting/domains> |
#.Include</etc/dansguardian/lists/blacklists/financial/domains> |
#.Include</etc/dansguardian/lists/blacklists/forums/domains> |
.Include</etc/dansguardian/lists/blacklists/gambling/domains> |
#.Include</etc/dansguardian/lists/blacklists/games/domains> |
.Include</etc/dansguardian/lists/blacklists/hacking/domains> |
.Include</etc/dansguardian/lists/blacklists/malware/domains> |
#.Include</etc/dansguardian/lists/blacklists/manga/domains> |
.Include</etc/dansguardian/lists/blacklists/marketingware/domains> |
.Include</etc/dansguardian/lists/blacklists/mixed_adult/domains> |
#.Include</etc/dansguardian/lists/blacklists/mobile-phone/domains> |
.Include</etc/dansguardian/lists/blacklists/phishing/domains> |
#.Include</etc/dansguardian/lists/blacklists/publicite/domains> |
#.Include</etc/dansguardian/lists/blacklists/radio/domains> |
#.Include</etc/dansguardian/lists/blacklists/reaffected/domains> |
.Include</etc/dansguardian/lists/blacklists/redirector/domains> |
.Include</etc/dansguardian/lists/blacklists/sect/domains> |
#.Include</etc/dansguardian/lists/blacklists/sexual_education/domains> |
#.Include</etc/dansguardian/lists/blacklists/shopping/domains> |
.Include</etc/dansguardian/lists/blacklists/strict_redirector/domains> |
.Include</etc/dansguardian/lists/blacklists/strong_redirector/domains> |
.Include</etc/dansguardian/lists/blacklists/tricheur/domains> |
.Include</etc/dansguardian/lists/blacklists/warez/domains> |
#.Include</etc/dansguardian/lists/blacklists/webmail/domains> |
.Include</etc/dansguardian/lists/blacklists/ossi/domains> |