Subversion Repositories ALCASAR

Compare Revisions

No changes between revisions

Ignore whitespace Rev 34 → Rev 40

/conf/VERSION-BL
0,0 → 1,0
Univ-tlse du 17 décembre 2009 - 23h00
/conf/chilli-init
0,0 → 1,97
#!/bin/sh
#
# chilli CoovaChilli init
#
# chkconfig: 2345 65 35
# description: CoovaChilli
 
# Source function library.
. /etc/rc.d/init.d/functions
 
. /etc/sysconfig/network
 
[ ${NETWORKING} = "no" ] && exit 0
 
[ -f /usr/sbin/chilli ] || exit 0
[ -f /etc/chilli.conf ] || exit 0
 
. /etc/chilli/functions
 
check_required
 
RETVAL=0
prog="chilli"
 
case $1 in
start)
echo -n $"Starting $prog: "
/sbin/modprobe tun >/dev/null 2>&1
echo 1 > /proc/sys/net/ipv4/ip_forward
 
writeconfig
radiusconfig
 
# (crontab -l 2>&- | grep -v $0
# test ${HS_ADMINTERVAL:-0} -gt 0 && echo "*/$HS_ADMINTERVAL * * * * $0 radconfig"
# echo "*/10 * * * * $0 checkrunning"
# echo "*/2 * * * * $0 arping"
# ) | crontab - 2>&-
 
# ifconfig $HS_LANIF 0.0.0.0
daemon /usr/sbin/chilli
RETVAL=$?
 
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/chilli
echo
;;
 
checkrunning)
[ -e $LKFILE -a ! -e $PIDFILE ] && $0 start
;;
 
radconfig)
[ -e $MAIN_CONF ] || writeconfig
radiusconfig
;;
 
reload)
killall -HUP chilli
;;
 
restart)
$0 stop
$0 start
RETVAL=$?
;;
 
stop)
echo -n $"Shutting down $prog: "
 
crontab -l 2>&- | grep -v $0 | crontab -
killproc chilli
[ -f /var/run/chilli.pid ] && {
kill $(cat /var/run/chilli.pid)
RETVAL=$
[ $RETVAL = 0 ] && rm -f /var/lock/subsys/chilli /var/run/chilli.pid
}
echo
;;
 
condrestart)
if [ -f /var/lock/subsys/chilli ] ; then
$0 restart
RETVAL=$?
fi
;;
 
status)
status chilli
RETVAL=$?
;;
 
*)
echo $"Usage: $0 {start|stop|restart|condrestart|status|reload|radconfig}"
exit 1
esac
 
exit $?
/conf/template-fr.html
0,0 → 1,324
<html>
 
<head>
<title>DansGuardian - Access Denied</title>
</head>
 
<body bgcolor=#FFFFFF>
 
<center>
<table border=0 cellspacing=0 cellpadding=2 height=540 width=700>
<tr>
<td colspan=2 bgcolor=#FEA700 height=100 align=center>
<font face=arial,helvetica size=6>
<b>Acc&egrave;s refus&eacute;</b>
</td>
</tr>
<tr>
<td colspan=2 bgcolor=#FFFACD height=30 align=right>
<font face=arial,helvetica size=3 color=black>
<b>-USER-&nbsp;</b>
</td>
</tr>
<tr>
<td align=center valign=bottom width=150 bgcolor=#B0C4DE>
<font face=arial,helvetica size=1 color=black>
<img src="data:image/gif;base64,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"/><BR><CENTER>ALCASAR</CENTER>
</td>
<td width=550 bgcolor=#FFFFFF align=center valign=center>
<font face=arial,helvetica color=black>
<font size=4>
L'acc&egrave;s &agrave; la page :
<br><br>
-URL-
<br><br>
<font size=3>
... a &eacute;t&eacute; refus&eacute; pour la raison suivante :
<br><br>
<font color=red>
<b>-REASONGIVEN-</b>
<font color=black>
<br><br><br><br>
Vous tentez d'acc&eacute;der &agrave; une ressource dont le contenu est r&eacute;put&eacute;
contenir des informations inappropri&eacute;es.
<br><br>
Contactez votre responsable informatique (RSSI/OSSI), si vous pensez que ce filtrage est abusif.
<br><br><br><br>
<font size=1>
Filtr&eacute; par <B>DansGuardian</B></a>
</td>
</tr>
</table>
 
</body>
 
</html>
 
<!--
The available variables are as follows:
- URL- gives the URL the user was trying to get to.
- REASONGIVEN- gives the nice reason (i.e. not quoting the banned phrase).
- REASONLOGGED- gives the reason that gets logged including full details.
- USER- gives the username if known.
- IP- gives the originating IP.
 
You need to remove the space between the - and the variable to use them
in your HTML. They are there above so extra processing is not required.
 
More example templates are likely to be found on the DansGuardian web site
on the Extras page.
 
Daniel Barron 2002-03-27
--!>
 
/conf/template.html
0,0 → 1,324
<html>
 
<head>
<title>DansGuardian - Access Denied</title>
</head>
 
<body bgcolor=#FFFFFF>
 
<center>
<table border=0 cellspacing=0 cellpadding=2 height=540 width=700>
<tr>
<td colspan=2 bgcolor=#FEA700 height=100 align=center>
<font face=arial,helvetica size=6>
<b>Access has been Denied!</b>
</td>
</tr>
<tr>
<td colspan=2 bgcolor=#FFFACD height=30 align=right>
<font face=arial,helvetica size=3 color=black>
<b>-USER-&nbsp;</b>
</td>
</tr>
<tr>
<td align=center valign=bottom width=150 bgcolor=#B0C4DE>
<font face=arial,helvetica size=1 color=black>
<img src="data:image/gif;base64,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"/><BR><CENTER>ALCASAR</CENTER>
</td>
<td width=550 bgcolor=#FFFFFF align=center valign=center>
<font face=arial,helvetica color=black>
<font size=4>
Access to the page:
<br><br>
-URL-
<br><br>
<font size=3>
... has been denied for the following reason:
<br><br>
<font color=red>
<b>-REASONGIVEN-</b>
<font color=black>
<br><br><br><br>
You are seeing this error because what you attempted to access appears to contain,
or is labeled as containing, material that has been deemed inapproriate.
<br><br>
If you have any queries contact your ICT Co-ordinator or Network Manager.
<br><br><br><br>
<font size=1>
Filtered by <B>DansGuardian</B></a>
</td>
</tr>
</table>
 
</body>
 
</html>
 
<!--
The available variables are as follows:
- URL- gives the URL the user was trying to get to.
- REASONGIVEN- gives the nice reason (i.e. not quoting the banned phrase).
- REASONLOGGED- gives the reason that gets logged including full details.
- USER- gives the username if known.
- IP- gives the originating IP.
 
You need to remove the space between the - and the variable to use them
in your HTML. They are there above so extra processing is not required.
 
More example templates are likely to be found on the DansGuardian web site
on the Extras page.
 
Daniel Barron 2002-03-27
--!>
 
/conf/localdomain.rev
0,0 → 1,8
$TTL 86400
@ IN SOA localhost. root.localhost. (
1997022700 ; Serial
28800 ; Refresh
14400 ; Retry
3600000 ; Expire
86400 ) ; Minimum
IN NS localhost.
/conf/localdomain.zone
0,0 → 1,9
$TTL 86400
@ IN SOA localhost root (
2010020401 ; serial (d. adams)
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum
IN NS localhost
localhost IN A 127.0.0.1
/conf/user_edit.attrs
0,0 → 1,50
#
# Attributes which will be visible in the user/group edit pages
#
# Format: Attribute Comment
#
#
#Auth-Type <a href="help/auth_type_help.html" target=su_help onclick=window.open("help/auth_type_help.html","su_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Auth-Type Help Page"><font color="blue">Auth-Type</font></a>
Simultaneous-Use <a href="help/simultaneous_use_help.html" target=su_help onclick=window.open("help/simultaneous_use_help.html","su_help","width=560,height=170,toolbar=no,scrollbars=no,resizable=yes") title="Simultaneous Use Help Page"><font color="blue">Nombre de session simultan&eacute;e</font></a>
#Framed-Protocol <a href="help/framed_protocol_help.html" target=fpr_help onclick=window.open("help/framed_protocol_help.htlml","fpr_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Framed-Protocol Help PPage"><font color="blue">Protocol</font></a>
#Framed-IP-Address <a href="help/framed_ip_address_help.html" target=fia_help onclick=window.open("help/framed_ip_address_help.html","fia_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Framed-IP-Address Help Page"><font color="blue">IP Address</font></a>
#Framed-IP-Netmask IP Netmask
#Framed-Route Route
#Framed-Routing
#Filter-Id <a href="help/filter_id_help.html" target=fid_help onclick=window.open("help/filter_id_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Filter-ID Help Page"><font color="blue">Filter ID</font></a>
#Framed-MTU <a href="help/framed_mtu_help.html" target=fid_help onclick=window.open("help/framed_mtu_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Framed-MTU Help Page"><font color="blue">Framed-MTU</font></a>
#Framed-Compression <a href="help/framed_compression_help.html" target=fc_help onclick=window.open("help/framed_compression_help.html","fc_help","width=600,height=210,toolbar=no,scrollbars=no,resizable=yes") title="Framed Compression Help Page"><font color="blue">Compression Used</font></a>
#Service-Type <a href="help/service_type_help.html" target=st_help onclick=window.open("help/service_type_help.html","st_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Service-Type Help Page"><font color="blue">Service Type</font></a>
#Login-IP-Host
#Login-Service
#Login-TCP-Port
#Callback-Number <a href="help/callback_number_help.html" target=fid_help onclick=window.open("help/callback_number_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Callback-Number Help Page"><font color="blue">Callback-Number</font></a>
#Callback-Id <a href="help/callback_id_help.html" target=fid_help onclick=window.open("help/callback_id_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Callback-ID Help Page"><font color="blue">Callback-ID</font></a>
#Framed-IPX-Network
#Class <a href="help/class_help.html" target=fid_help onclick=window.open("help/class_help.html","fid_help","width=560,height=230,toolbar=no,scrollbars=no,resizable=yes") title="Class Help Page"><font color="blue">Class</font></a>
Session-Timeout <a href="help/session_timeout_help.html" target=st_help onclick=window.open("help/session_timeout_help.html","st_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Session Timeout Help Page"><font color="blue">Dur&eacute;e limite d'une session</font></a><BR>(en secondes)
#Idle-Timeout <a href="help/idle_timeout_help.html" target=it_help onclick=window.open("help/idle_timeout_help.html","it_help","width=600,height=170,toolbar=no,scrollbars=no,resizable=yes") title="Idle Timeout Help Page"><font color="blue">Idle Timeout</font></a>
#Termination-Action
#Login-LAT-Service
#Login-LAT-Node
#Login-LAT-Group
#Framed-AppleTalk-Link
#Framed-AppleTalk-Network
#Framed-AppleTalk-Zone
#Port-Limit <a href="help/port_limit_help.html" target=pl_help onclick=window.open("help/port_limit_help.html","pl_help","width=600,height=170,toolbar=no,scrollbars=no,resizable=yes") title="Port Limit Help Page"><font color="blue">Port Limit</font></a>
#Login-LAT-Port
#Dialup-Access <a href="help/dialup_access_help.html" target=da_help onclick=window.open("help/dialup_access_help.html","da_help","width=560,height=200,toolbar=no,scrollbars=no,resizable=yes") title="Dialup Access Help Page"><font color="blue">Dialup Access (use FALSE to lock)</font></a>
#Dialup-Lock-Msg <a href="help/lock_message_help.html" target=lm_help onclick=window.open("help/lock_message_help.html","lm_help","width=600,height=210,toolbar=no,scrollbars=no,resizable=yes") title="Lock Message Help Page"><font color="blue">Lock Message</font></a>
#Reply-Message <a href="help/reply_message_help.html" target=lm_help onclick=window.open("help/reply_message_help.html","lm_help","width=600,height=210,toolbar=no,scrollbars=no,resizable=yes") title="Reply-Message Help Page"><font color="blue">Reply-Message</font></a>
Max-Daily-Session <a href="help/session_timeout_help.html" target=st_help onclick=window.open("help/session_timeout_help.html","st_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Session Timeout Help Page"><font color="blue">Dur&eacute;e limite journali&egrave;re</font></a><BR>(en secondes)
#Max-Weekly-Session Weekly Limit (secs)
Max-Monthly-Session <a href="help/session_timeout_help.html" target=st_help onclick=window.open("help/session_timeout_help.html","st_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Session Timeout Help Page"><font color="blue">Dur&eacute;e limite mensuelle</font></a><BR>(en secondes)
#Login-Time <a href="login_time_create.php?val=$name1&first=yes" target=lt_create onclick=window.open("login_time_create.php?val=$name1&first=yes","lt_create","width=600,height=490,toolbar=no,scrollbars=yes,resizable=yes") title="Login-Time Creation Page"><font color="blue">P&eacute;riode hebdomadaire</font></a><a href="help/login_time_help.html" target=lt_help onclick=window.open("help/login_time_help.html","lt_help","width=600,height=370,toolbar=no,scrollbars=no,resizable=yes") title="Login-Time Help Page"><font color="blue"><BR>(Format UUCP)</font></a>
Login-Time <a href="help/login_time_help.html" target=lt_help onclick=window.open("help/login_time_help.html","lt_help","width=600,height=370,toolbar=no,scrollbars=no,resizable=yes") title="Login-Time Help Page"><font color="blue">P&eacute;riode hebdomadaire</font></a>
Expiration <a href="help/expiration_help.html" target=lt_help onclick=window.open("help/expiration_help.html","lt_help","width=600,height=250,toolbar=no,scrollbars=no,resizable=yes") title="Expiration Help Page"><font color="blue">Date d'expiration</font></a>
#
# Uncomment this if you are using ldap and you are using user regular profiles.
# Also make sure that Regular-Profile maps to the correct ldap attribute in
# extra.ldap-attrmap
#
#Regular-Profile User Regular Profile DN
/conf/ldap
0,0 → 1,161
# -*- text -*-
#
# $Id$
 
# Lightweight Directory Access Protocol (LDAP)
#
# This module definition allows you to use LDAP for
# authorization and authentication.
#
# See raddb/sites-available/default for reference to the
# ldap module in the authorize and authenticate sections.
#
# However, LDAP can be used for authentication ONLY when the
# Access-Request packet contains a clear-text User-Password
# attribute. LDAP authentication will NOT work for any other
# authentication method.
#
# This means that LDAP servers don't understand EAP. If you
# force "Auth-Type = LDAP", and then send the server a
# request containing EAP authentication, then authentication
# WILL NOT WORK.
#
# The solution is to use the default configuration, which does
# work.
#
# Setting "Auth-Type = LDAP" is ALMOST ALWAYS WRONG. We
# really can't emphasize this enough.
#
ldap {
#
# Note that this needs to match the name in the LDAP
# server certificate, if you're using ldaps.
server = ""
identity = ""
password =
basedn = "dc=example,dc=com"
filter = "(uid=%{Stripped-User-Name:-%{User-Name}})"
base_filter = ""
 
# How many connections to keep open to the LDAP server.
# This saves time over opening a new LDAP socket for
# every authentication request.
ldap_connections_number = 5
 
# seconds to wait for LDAP query to finish. default: 20
timeout = 4
 
# seconds LDAP server has to process the query (server-side
# time limit). default: 20
#
# LDAP_OPT_TIMELIMIT is set to this value.
timelimit = 3
 
#
# seconds to wait for response of the server. (network
# failures) default: 10
#
# LDAP_OPT_NETWORK_TIMEOUT is set to this value.
net_timeout = 1
 
#
# This subsection configures the tls related items
# that control how FreeRADIUS connects to an LDAP
# server. It contains all of the "tls_*" configuration
# entries used in older versions of FreeRADIUS. Those
# configuration entries can still be used, but we recommend
# using these.
#
tls {
# Set this to 'yes' to use TLS encrypted connections
# to the LDAP database by using the StartTLS extended
# operation.
#
# The StartTLS operation is supposed to be
# used with normal ldap connections instead of
# using ldaps (port 689) connections
start_tls = no
 
# cacertfile = /path/to/cacert.pem
# cacertdir = /path/to/ca/dir/
# certfile = /path/to/radius.crt
# keyfile = /path/to/radius.key
# randfile = /path/to/rnd
 
# Certificate Verification requirements. Can be:
# "never" (don't even bother trying)
# "allow" (try, but don't fail if the cerificate
# can't be verified)
# "demand" (fail if the certificate doesn't verify.)
#
# The default is "allow"
# require_cert = "demand"
}
 
# default_profile = "cn=radprofile,ou=dialup,o=My Org,c=UA"
# profile_attribute = "radiusProfileDn"
# access_attr = "dialupAccess"
 
# Mapping of RADIUS dictionary attributes to LDAP
# directory attributes.
dictionary_mapping = ${confdir}/ldap.attrmap
 
# Set password_attribute = nspmPassword to get the
# user's password from a Novell eDirectory
# backend. This will work ONLY IF FreeRADIUS has been
# built with the --with-edir configure option.
#
# See also the following links:
#
# http://www.novell.com/coolsolutions/appnote/16745.html
# https://secure-support.novell.com/KanisaPlatform/Publishing/558/3009668_f.SAL_Public.html
#
# Novell may require TLS encrypted sessions before returning
# the user's password.
#
# password_attribute = userPassword
 
# Un-comment the following to disable Novell
# eDirectory account policy check and intruder
# detection. This will work *only if* FreeRADIUS is
# configured to build with --with-edir option.
#
edir_account_policy_check = no
 
#
# Group membership checking. Disabled by default.
#
# groupname_attribute = cn
# groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
# groupmembership_attribute = radiusGroupName
 
# compare_check_items = yes
# do_xlat = yes
# access_attr_used_for_allow = yes
 
#
# By default, if the packet contains a User-Password,
# and no other module is configured to handle the
# authentication, the LDAP module sets itself to do
# LDAP bind for authentication.
#
# THIS WILL ONLY WORK FOR PAP AUTHENTICATION.
#
# THIS WILL NOT WORK FOR CHAP, MS-CHAP, or 802.1x (EAP).
#
# You can disable this behavior by setting the following
# configuration entry to "no".
#
# allowed values: {no, yes}
# set_auth_type = yes
# set_auth_type = no
 
# ldap_debug: debug flag for LDAP SDK
# (see OpenLDAP documentation). Set this to enable
# huge amounts of LDAP debugging on the screen.
# You should only use this if you are an LDAP expert.
#
# default: 0x0000 (no debugging messages)
# Example:(LDAP_DEBUG_FILTER+LDAP_DEBUG_CONNS)
#ldap_debug = 0x0028
}
/conf/logrotate.d/dansguardian
0,0 → 1,13
/var/log/dansguardian/access.log {
create 644 dansguardian dansguardian
rotate 5
dateext
weekly
sharedscripts
prerotate
service dansguardian stop
endscript
postrotate
service dansguardian start
endscript
}
/conf/logrotate.d/syslog
0,0 → 1,15
# WARNING : don't use * wildcard as extension
# (glob in logrotate will try to rotate all files instead of
# only the basenames of the logs, i.e. it will rotate
# already rotated files and recompress them, taking
# exponential time...)
 
/var/log/auth.log /var/log/syslog /var/log/user.log /var/log/secure /var/log/messages /var/log/boot.log /var/log/mail/errors /var/log/mail/info /var/log/mail/warnings /var/log/cron/errors /var/log/cron/info /var/log/cron/warnings /var/log/kernel/errors /var/log/kernel/info /var/log/kernel/warnings /var/log/lpr/errors /var/log/lpr/info /var/log/lpr/warnings /var/log/news/news.err /var/log/news/news.notice /var/log/news/news.crit /var/log/daemons/errors /var/log/daemons/info /var/log/daemons/warnings /var/log/explanations {
sharedscripts
rotate 5
weekly
postrotate
[ -f /var/run/syslog-ng.pid ] && kill -HUP `cat /var/run/syslog-ng.pid` || true
[ -f /var/run/syslogd.pid ] && kill -HUP `cat /var/run/syslogd.pid` || true
endscript
}
/conf/logrotate.d/httpd
0,0 → 1,27
/var/log/httpd/access_log /var/log/httpd/ssl_access_log{
rotate 12
monthly
dateext
missingok
notifempty
compress
prerotate
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1
endscript
postrotate
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1
endscript
}
/var/log/httpd/apache_runtime_status /var/log/httpd/ssl_mutex /var/log/httpd/error_ /var/log/httpd/ssl_request_log {
rotate 4
monthly
missingok
notifempty
compress
prerotate
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1
endscript
postrotate
/etc/rc.d/init.d/httpd closelogs > /dev/null 2>&1
endscript
}
/conf/logrotate.d/squid
0,0 → 1,32
/var/log/squid/access.log {
weekly
rotate 52
dateext
copytruncate
compress
notifempty
missingok
}
/var/log/squid/cache.log {
weekly
rotate 5
copytruncate
compress
notifempty
missingok
}
 
/var/log/squid/store.log {
weekly
rotate 5
copytruncate
compress
notifempty
missingok
# This script asks squid to rotate its logs on its own.
# Restarting squid is a long process and it is not worth
# doing it just to rotate logs
postrotate
/usr/sbin/squid -k rotate
endscript
}
/conf/logrotate.d/mysqld
0,0 → 1,37
# This logname can be set in /etc/my.cnf
# by setting the variable "err-log"
# in the [safe_mysqld] section as follows:
#
# [safe_mysqld]
# err-log=/var/lib/mysql/mysqld.log
#
# If the root user has a password you have to create a
# /root/.my.cnf configuration file with the following
# content:
#
# [mysqladmin]
# password = <secret>
# user= root
#
# where "<secret>" is the password.
#
# ATTENTION: This /root/.my.cnf should be readable ONLY
# for root !
 
/var/log/mysqld/mysqld.log {
# create 600 mysql mysql
notifempty
daily
rotate 31
dateext
missingok
compress
postrotate
# just if mysqld is really running
if test -x /usr/bin/mysqladmin && \
/usr/bin/mysqladmin ping &>/dev/null
then
/usr/bin/mysqladmin flush-logs
fi
endscript
}
/conf/logrotate.d/ulogd
0,0 → 1,10
/var/log/firewall/firewall.log {
missingok
rotate 52
weekly
dateext
sharedscripts
postrotate
/etc/init.d/ulogd restart
endscript
}
/conf/logrotate.d/radiusd
0,0 → 1,7
/var/log/radius/radacct/*/detail /var/log/radius/*.log /var/log/radius/radutmp /var/log/radius/radwtmp {
monthly
rotate 4
nocreate
missingok
compress
}
/conf/sudoers
0,0 → 1,48
# sudoers file.
#
# This file MUST be edited with the 'visudo' command as root.
#
# See the sudoers man page for the details on how to write a sudoers file.
#
 
# Host alias specification
Host_Alias LAN_ORG=192.168.182.0/24,localhost #réseau de l'organisme
# User alias specification
User_Alias ADMIN=sysadmin # compte d'admin local de l'organisme
User_Alias ADMOSSI=apache # compte d'admin OSSI (web)
 
# Cmnd alias specification
Cmnd_Alias NET=/sbin/arping,/sbin/arp,/usr/sbin/arpscan,/usr/sbin/tcpdump # commandes réseau
Cmnd_Alias URPMI=/usr/sbin/urpmi,/usr/sbin/urpmi.update # gestion des paquetages
Cmnd_Alias BYPASS=/usr/local/sbin/alcasar-bypass-on.sh,/usr/local/sbin/alcasar-bypass-off.sh # contournement du système d'authentification
Cmnd_Alias RADDB=/usr/bin/radwho,/usr/sbin/chilli_query # pour la gestion des usagers en ligne
Cmnd_Alias SQL=/usr/local/sbin/alcasar-mysql.sh # pour exporter la base mysql
Cmnd_Alias GHOST=/usr/local/bin/alcasar-mondo.sh # pour générer une image iso du serveur
Cmnd_Alias EXPORT=/usr/local/bin/alcasar-log-export.sh # pour exporter/sauvegarder les fichiers journaux
Cmnd_Alias BL=/usr/local/sbin/alcasar-bl.sh # pour gérer les blacklists et whitelist
Cmnd_Alias NF=/usr/local/sbin/alcasar-nf.sh # pour gérer le filtrage réseau
Cmnd_Alias LOGOUT=/usr/local/sbin/alcasar-logout.sh # pour déconnecter les usagers
Cmnd_Alias UAM=/usr/local/sbin/alcasar-uamallowed.sh # pour gérer les site de confiance (uamallowed)
Cmnd_Alias SERVICE=/sbin/service,/usr/bin/killall # pour gérer les site de confiance (uamallowed)
 
# Defaults specification
# Defaults syslog=auth
 
# Runas alias specification
 
# User privilege specification
root ALL=(ALL) ALL
 
# Uncomment to allow people in group wheel to run all commands
# %wheel ALL=(ALL) ALL
 
# Same thing without a password
# %wheel ALL=(ALL) NOPASSWD: ALL
 
# Samples
# %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom
# %users localhost=/sbin/shutdown -h now
 
ADMOSSI LAN_ORG=(root) NOPASSWD: NET,BYPASS,GHOST,SQL,BL,NF,EXPORT,RADDB,LOGOUT,UAM,SERVICE
ADMIN LAN_ORG=(root) NOPASSWD: NET,/sbin/poweroff,/sbin/shutdown -h now,/sbin/reboot,URPMI,BYPASS,GHOST,SQL,EXPORT
 
/conf/ldap.attrmap
0,0 → 1,77
#
# Mapping of RADIUS dictionary attributes to LDAP directory attributes
# to be used by LDAP authentication and authorization module (rlm_ldap)
#
# Format:
# ItemType RADIUS-Attribute-Name ldapAttributeName [operator]
#
# Where:
# ItemType = checkItem or replyItem
# RADIUS-Attribute-Name = attribute name in RADIUS dictionary
# ldapAttributeName = attribute name in LDAP schema
# operator = optional, and may not be present.
# If not present, defaults to "==" for checkItems,
# and "=" for replyItems.
# If present, the operator here should be one
# of the same operators as defined in the "users"3
# file ("man users", or "man 5 users").
# If an operator is present in the value of the
# LDAP entry (i.e. ":=foo"), then it over-rides
# both the default, and any operator given here.
#
# If $GENERIC$ is specified as RADIUS-Attribute-Name, the line specifies
# a LDAP attribute which can be used to store any RADIUS
# attribute/value-pair in LDAP directory.
#
# You should edit this file to suit it to your needs.
#
 
# Au moins une définition doit être présente pour l'authentification LDAP seule
# ==--> (rajout de uid et commentaire de tout le reste pour laisser le soin à sql radius
# de gérer les personnalisations de comportement du portail
checkItem $GENERIC$ uid
#checkItem $GENERIC$ radiusCheckItem
#replyItem $GENERIC$ radiusReplyItem
 
#checkItem Auth-Type radiusAuthType
#checkItem Simultaneous-Use radiusSimultaneousUse
#checkItem Called-Station-Id radiusCalledStationId
#checkItem Calling-Station-Id radiusCallingStationId
#checkItem LM-Password lmPassword
#checkItem NT-Password ntPassword
#checkItem LM-Password sambaLmPassword
#checkItem NT-Password sambaNtPassword
#checkItem LM-Password dBCSPwd
#checkItem SMB-Account-CTRL-TEXT acctFlags
#checkItem SMB-Account-CTRL-TEXT sambaAcctFlags
#checkItem Expiration radiusExpiration
#checkItem NAS-IP-Address radiusNASIpAddress
#
#replyItem Service-Type radiusServiceType
#replyItem Framed-Protocol radiusFramedProtocol
#replyItem Framed-IP-Address radiusFramedIPAddress
#replyItem Framed-IP-Netmask radiusFramedIPNetmask
#replyItem Framed-Route radiusFramedRoute
#replyItem Framed-Routing radiusFramedRouting
#replyItem Filter-Id radiusFilterId
#replyItem Framed-MTU radiusFramedMTU
#replyItem Framed-Compression radiusFramedCompression
#replyItem Login-IP-Host radiusLoginIPHost
#replyItem Login-Service radiusLoginService
#replyItem Login-TCP-Port radiusLoginTCPPort
#replyItem Callback-Number radiusCallbackNumber
#replyItem Callback-Id radiusCallbackId
#replyItem Framed-IPX-Network radiusFramedIPXNetwork
#replyItem Class radiusClass
#replyItem Session-Timeout radiusSessionTimeout
#replyItem Idle-Timeout radiusIdleTimeout
#replyItem Termination-Action radiusTerminationAction
#replyItem Login-LAT-Service radiusLoginLATService
#replyItem Login-LAT-Node radiusLoginLATNode
#replyItem Login-LAT-Group radiusLoginLATGroup
#replyItem Framed-AppleTalk-Link radiusFramedAppleTalkLink
#replyItem Framed-AppleTalk-Network radiusFramedAppleTalkNetwork
#replyItem Framed-AppleTalk-Zone radiusFramedAppleTalkZone
#replyItem Port-Limit radiusPortLimit
#replyItem Login-LAT-Port radiusLoginLATPort
#replyItem Reply-Message radiusReplyMessage
/conf/alcasar-radius
0,0 → 1,503
######################################################################
#
# As of 2.0.0, FreeRADIUS supports virtual hosts using the
# "server" section, and configuration directives.
#
# Virtual hosts should be put into the "sites-available"
# directory. Soft links should be created in the "sites-enabled"
# directory to these files. This is done in a normal installation.
#
# $Id$
#
######################################################################
#
# Read "man radiusd" before editing this file. See the section
# titled DEBUGGING. It outlines a method where you can quickly
# obtain the configuration you want, without running into
# trouble. See also "man unlang", which documents the format
# of this file.
#
# This configuration is designed to work in the widest possible
# set of circumstances, with the widest possible number of
# authentication methods. This means that in general, you should
# need to make very few changes to this file.
#
# The best way to configure the server for your local system
# is to CAREFULLY edit this file. Most attempts to make large
# edits to this file will BREAK THE SERVER. Any edits should
# be small, and tested by running the server with "radiusd -X".
# Once the edits have been verified to work, save a copy of these
# configuration files somewhere. (e.g. as a "tar" file). Then,
# make more edits, and test, as above.
#
# There are many "commented out" references to modules such
# as ldap, sql, etc. These references serve as place-holders.
# If you need the functionality of that module, then configure
# it in radiusd.conf, and un-comment the references to it in
# this file. In most cases, those small changes will result
# in the server being able to connect to the DB, and to
# authenticate users.
#
######################################################################
 
#
# In 1.x, the "authorize", etc. sections were global in
# radiusd.conf. As of 2.0, they SHOULD be in a server section.
#
# The server section with no virtual server name is the "default"
# section. It is used when no server name is specified.
#
# We don't indent the rest of this file, because doing so
# would make it harder to read.
#
 
# Authorization. First preprocess (hints and huntgroups files),
# then realms, and finally look in the "users" file.
#
# The order of the realm modules will determine the order that
# we try to find a matching realm.
#
# Make *sure* that 'preprocess' comes before any realm if you
# need to setup hints for the remote radius server
authorize {
#
# The preprocess module takes care of sanitizing some bizarre
# attributes in the request, and turning them into attributes
# which are more standard.
#
# It takes care of processing the 'raddb/hints' and the
# 'raddb/huntgroups' files.
#
# It also adds the %{Client-IP-Address} attribute to the request.
preprocess
 
#
# If you want to have a log of authentication requests,
# un-comment the following line, and the 'detail auth_log'
# section, above.
# auth_log
 
#
# The chap module will set 'Auth-Type := CHAP' if we are
# handling a CHAP request and Auth-Type has not already been set
# chap
 
#
# If the users are logging in with an MS-CHAP-Challenge
# attribute for authentication, the mschap module will find
# the MS-CHAP-Challenge attribute, and add 'Auth-Type := MS-CHAP'
# to the request, which will cause the server to then use
# the mschap module for authentication.
# mschap
#
# If you have a Cisco SIP server authenticating against
# FreeRADIUS, uncomment the following line, and the 'digest'
# line in the 'authenticate' section.
# digest
 
#
# Look for IPASS style 'realm/', and if not found, look for
# '@realm', and decide whether or not to proxy, based on
# that.
# IPASS
 
#
# If you are using multiple kinds of realms, you probably
# want to set "ignore_null = yes" for all of them.
# Otherwise, when the first style of realm doesn't match,
# the other styles won't be checked.
#
# suffix
# ntdomain
 
#
# This module takes care of EAP-MD5, EAP-TLS, and EAP-LEAP
# authentication.
#
# It also sets the EAP-Type attribute in the request
# attribute list to the EAP type from the packet.
#
# As of 2.0, the EAP module returns "ok" in the authorize stage
# for TTLS and PEAP. In 1.x, it never returned "ok" here, so
# this change is compatible with older configurations.
#
# The example below uses module failover to avoid querying all
# of the following modules if the EAP module returns "ok".
# Therefore, your LDAP and/or SQL servers will not be queried
# for the many packets that go back and forth to set up TTLS
# or PEAP. The load on those servers will therefore be reduced.
#
# eap {
# ok = return
# }
 
#
# Pull crypt'd passwords from /etc/passwd or /etc/shadow,
# using the system API's to get the password. If you want
# to read /etc/passwd or /etc/shadow directly, see the
# passwd module in radiusd.conf.
#
# unix
 
#
# Read the 'users' file
# files
 
#
# Look in an SQL database. The schema of the database
# is meant to mirror the "users" file.
#
# See "Authorization Queries" in sql.conf
sql
noresetcounter
dailycounter
monthlycounter
#
# If you are using /etc/smbpasswd, and are also doing
# mschap authentication, the un-comment this line, and
# configure the 'etc_smbpasswd' module, above.
# etc_smbpasswd
 
#
# The ldap module will set Auth-Type to LDAP if it has not
# already been set
# ldap
 
#
# Enforce daily limits on time spent logged in.
# daily
 
#
# Use the checkval module
# checkval
 
expiration
logintime
 
#
# If no other module has claimed responsibility for
# authentication, then try to use PAP. This allows the
# other modules listed above to add a "known good" password
# to the request, and to do nothing else. The PAP module
# will then see that password, and use it to do PAP
# authentication.
#
# This module should be listed last, so that the other modules
# get a chance to set Auth-Type for themselves.
#
# pap
 
#
# If "status_server = yes", then Status-Server messages are passed
# through the following section, and ONLY the following section.
# This permits you to do DB queries, for example. If the modules
# listed here return "fail", then NO response is sent.
#
# Autz-Type Status-Server {
#
# }
}
 
 
# Authentication.
#
#
# This section lists which modules are available for authentication.
# Note that it does NOT mean 'try each module in order'. It means
# that a module from the 'authorize' section adds a configuration
# attribute 'Auth-Type := FOO'. That authentication type is then
# used to pick the apropriate module from the list below.
#
 
# In general, you SHOULD NOT set the Auth-Type attribute. The server
# will figure it out on its own, and will do the right thing. The
# most common side effect of erroneously setting the Auth-Type
# attribute is that one authentication method will work, but the
# others will not.
#
# The common reasons to set the Auth-Type attribute by hand
# is to either forcibly reject the user (Auth-Type := Reject),
# or to or forcibly accept the user (Auth-Type := Accept).
#
# Note that Auth-Type := Accept will NOT work with EAP.
#
# Please do not put "unlang" configurations into the "authenticate"
# section. Put them in the "post-auth" section instead. That's what
# the post-auth section is for.
#
authenticate {
# #
# # PAP authentication, when a back-end database listed
# # in the 'authorize' section supplies a password. The
# # password can be clear-text, or encrypted.
# Auth-Type PAP {
# pap
# }
#
# #
# # Most people want CHAP authentication
# # A back-end database listed in the 'authorize' section
# # MUST supply a CLEAR TEXT password. Encrypted passwords
# # won't work.
# Auth-Type CHAP {
# chap
# }
#
# #
# # MSCHAP authentication.
# Auth-Type MS-CHAP {
# mschap
# }
#
# #
# # If you have a Cisco SIP server authenticating against
# # FreeRADIUS, uncomment the following line, and the 'digest'
# # line in the 'authorize' section.
# digest
#
# #
# # Pluggable Authentication Modules.
# pam
#
# #
# # See 'man getpwent' for information on how the 'unix'
# # module checks the users password. Note that packets
# # containing CHAP-Password attributes CANNOT be authenticated
# # against /etc/passwd! See the FAQ for details.
# #
# unix
#
# # Uncomment it if you want to use ldap for authentication
# #
# # Note that this means "check plain-text password against
# # the ldap database", which means that EAP won't work,
# # as it does not supply a plain-text password.
# Auth-Type LDAP {
# ldap
# }
#
# #
# # Allow EAP authentication.
# eap
}
 
 
#
# Pre-accounting. Decide which accounting type to use.
#
preacct {
preprocess
 
#
# Ensure that we have a semi-unique identifier for every
# request, and many NAS boxes are broken.
# acct_unique
 
#
# Look for IPASS-style 'realm/', and if not found, look for
# '@realm', and decide whether or not to proxy, based on
# that.
#
# Accounting requests are generally proxied to the same
# home server as authentication requests.
# IPASS
# suffix
# ntdomain
 
#
# Read the 'acct_users' file
# files
}
 
#
# Accounting. Log the accounting data.
#
accounting {
#
# Create a 'detail'ed log of the packets.
# Note that accounting requests which are proxied
# are also logged in the detail file.
# detail
# daily
 
# Update the wtmp file
#
# If you don't use "radlast", you can delete this line.
# unix
 
#
# For Simultaneous-Use tracking.
#
# Due to packet losses in the network, the data here
# may be incorrect. There is little we can do about it.
# radutmp
sradutmp
 
# Return an address to the IP Pool when we see a stop record.
# main_pool
 
#
# Log traffic to an SQL database.
#
# See "Accounting queries" in sql.conf
sql
 
#
# Instead of sending the query to the SQL server,
# write it into a log file.
#
# sql_log
 
# Cisco VoIP specific bulk accounting
# pgsql-voip
 
# Filter attributes from the accounting response.
attr_filter.accounting_response
 
#
# See "Autz-Type Status-Server" for how this works.
#
# Acct-Type Status-Server {
#
# }
}
 
 
# Session database, used for checking Simultaneous-Use. Either the radutmp
# or rlm_sql module can handle this.
# The rlm_sql module is *much* faster
session {
# radutmp
 
#
# See "Simultaneous Use Checking Queries" in sql.conf
sql
}
 
 
# Post-Authentication
# Once we KNOW that the user has been authenticated, there are
# additional steps we can take.
post-auth {
# Get an address from the IP Pool.
# main_pool
 
#
# If you want to have a log of authentication replies,
# un-comment the following line, and the 'detail reply_log'
# section, above.
# reply_log
 
#
# After authenticating the user, do another SQL query.
#
# See "Authentication Logging Queries" in sql.conf
# sql
 
#
# Instead of sending the query to the SQL server,
# write it into a log file.
#
# sql_log
 
#
# Un-comment the following if you have set
# 'edir_account_policy_check = yes' in the ldap module sub-section of
# the 'modules' section.
#
# ldap
 
# exec
 
#
# Access-Reject packets are sent through the REJECT sub-section of the
# post-auth section.
#
# Add the ldap module name (or instance) if you have set
# 'edir_account_policy_check = yes' in the ldap module configuration
#
Post-Auth-Type REJECT {
attr_filter.access_reject
}
}
 
#
# When the server decides to proxy a request to a home server,
# the proxied request is first passed through the pre-proxy
# stage. This stage can re-write the request, or decide to
# cancel the proxy.
#
# Only a few modules currently have this method.
#
pre-proxy {
# attr_rewrite
 
# Uncomment the following line if you want to change attributes
# as defined in the preproxy_users file.
# files
 
# Uncomment the following line if you want to filter requests
# sent to remote servers based on the rules defined in the
# 'attrs.pre-proxy' file.
# attr_filter.pre-proxy
 
# If you want to have a log of packets proxied to a home
# server, un-comment the following line, and the
# 'detail pre_proxy_log' section, above.
# pre_proxy_log
}
 
#
# When the server receives a reply to a request it proxied
# to a home server, the request may be massaged here, in the
# post-proxy stage.
#
post-proxy {
 
# If you want to have a log of replies from a home server,
# un-comment the following line, and the 'detail post_proxy_log'
# section, above.
# post_proxy_log
 
# attr_rewrite
 
# Uncomment the following line if you want to filter replies from
# remote proxies based on the rules defined in the 'attrs' file.
# attr_filter.post-proxy
 
#
# If you are proxying LEAP, you MUST configure the EAP
# module, and you MUST list it here, in the post-proxy
# stage.
#
# You MUST also use the 'nostrip' option in the 'realm'
# configuration. Otherwise, the User-Name attribute
# in the proxied request will not match the user name
# hidden inside of the EAP packet, and the end server will
# reject the EAP request.
#
# eap
 
#
# If the server tries to proxy a request and fails, then the
# request is processed through the modules in this section.
#
# The main use of this section is to permit robust proxying
# of accounting packets. The server can be configured to
# proxy accounting packets as part of normal processing.
# Then, if the home server goes down, accounting packets can
# be logged to a local "detail" file, for processing with
# radrelay. When the home server comes back up, radrelay
# will read the detail file, and send the packets to the
# home server.
#
# With this configuration, the server always responds to
# Accounting-Requests from the NAS, but only writes
# accounting packets to disk if the home server is down.
#
# Post-Proxy-Type Fail {
# detail
# }
 
}
 
/conf/radiusd-db-vierge.sql
0,0 → 1,349
-- MySQL dump 10.11
--
-- Host: localhost Database: radius
-- ------------------------------------------------------
-- Server version 5.0.67
 
/*!40101 SET @OLD_CHARACTER_SET_CLIENT=@@CHARACTER_SET_CLIENT */;
/*!40101 SET @OLD_CHARACTER_SET_RESULTS=@@CHARACTER_SET_RESULTS */;
/*!40101 SET @OLD_COLLATION_CONNECTION=@@COLLATION_CONNECTION */;
/*!40101 SET NAMES utf8 */;
/*!40103 SET @OLD_TIME_ZONE=@@TIME_ZONE */;
/*!40103 SET TIME_ZONE='+00:00' */;
/*!40014 SET @OLD_UNIQUE_CHECKS=@@UNIQUE_CHECKS, UNIQUE_CHECKS=0 */;
/*!40014 SET @OLD_FOREIGN_KEY_CHECKS=@@FOREIGN_KEY_CHECKS, FOREIGN_KEY_CHECKS=0 */;
/*!40101 SET @OLD_SQL_MODE=@@SQL_MODE, SQL_MODE='NO_AUTO_VALUE_ON_ZERO' */;
/*!40111 SET @OLD_SQL_NOTES=@@SQL_NOTES, SQL_NOTES=0 */;
 
--
-- Current Database: `radius`
--
 
CREATE DATABASE /*!32312 IF NOT EXISTS*/ `radius` /*!40100 DEFAULT CHARACTER SET utf8 COLLATE utf8_unicode_ci */;
 
USE `radius`;
 
--
-- Table structure for table `mtotacct`
--
 
DROP TABLE IF EXISTS `mtotacct`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `mtotacct` (
`MTotAcctId` bigint(21) NOT NULL auto_increment,
`UserName` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`AcctDate` date NOT NULL default '0000-00-00',
`ConnNum` bigint(12) default NULL,
`ConnTotDuration` bigint(12) default NULL,
`ConnMaxDuration` bigint(12) default NULL,
`ConnMinDuration` bigint(12) default NULL,
`InputOctets` bigint(12) default NULL,
`OutputOctets` bigint(12) default NULL,
`NASIPAddress` varchar(15) collate utf8_unicode_ci default NULL,
PRIMARY KEY (`MTotAcctId`),
KEY `UserName` (`UserName`),
KEY `AcctDate` (`AcctDate`),
KEY `UserOnDate` (`UserName`,`AcctDate`),
KEY `NASIPAddress` (`NASIPAddress`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `mtotacct`
--
 
LOCK TABLES `mtotacct` WRITE;
/*!40000 ALTER TABLE `mtotacct` DISABLE KEYS */;
/*!40000 ALTER TABLE `mtotacct` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `radacct`
--
 
DROP TABLE IF EXISTS `radacct`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `radacct` (
`radacctid` bigint(21) NOT NULL auto_increment,
`acctsessionid` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`acctuniqueid` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`realm` varchar(64) collate utf8_unicode_ci default '',
`nasipaddress` varchar(15) collate utf8_unicode_ci NOT NULL default '',
`nasportid` varchar(15) collate utf8_unicode_ci default NULL,
`nasporttype` varchar(32) collate utf8_unicode_ci default NULL,
`acctstarttime` datetime default NULL,
`acctstoptime` datetime default NULL,
`acctsessiontime` int(12) default NULL,
`acctauthentic` varchar(32) collate utf8_unicode_ci default NULL,
`connectinfo_start` varchar(50) collate utf8_unicode_ci default NULL,
`connectinfo_stop` varchar(50) collate utf8_unicode_ci default NULL,
`acctinputoctets` bigint(20) default NULL,
`acctoutputoctets` bigint(20) default NULL,
`calledstationid` varchar(50) collate utf8_unicode_ci NOT NULL default '',
`callingstationid` varchar(50) collate utf8_unicode_ci NOT NULL default '',
`acctterminatecause` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`servicetype` varchar(32) collate utf8_unicode_ci default NULL,
`framedprotocol` varchar(32) collate utf8_unicode_ci default NULL,
`framedipaddress` varchar(15) collate utf8_unicode_ci NOT NULL default '',
`acctstartdelay` int(12) default NULL,
`acctstopdelay` int(12) default NULL,
`xascendsessionsvrkey` varchar(10) collate utf8_unicode_ci default NULL,
PRIMARY KEY (`radacctid`),
KEY `username` (`username`),
KEY `framedipaddress` (`framedipaddress`),
KEY `acctsessionid` (`acctsessionid`),
KEY `acctsessiontime` (`acctsessiontime`),
KEY `acctuniqueid` (`acctuniqueid`),
KEY `acctstarttime` (`acctstarttime`),
KEY `acctstoptime` (`acctstoptime`),
KEY `nasipaddress` (`nasipaddress`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `radacct`
--
 
LOCK TABLES `radacct` WRITE;
/*!40000 ALTER TABLE `radacct` DISABLE KEYS */;
/*!40000 ALTER TABLE `radacct` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `radcheck`
--
 
DROP TABLE IF EXISTS `radcheck`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `radcheck` (
`id` int(11) unsigned NOT NULL auto_increment,
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`op` char(2) collate utf8_unicode_ci NOT NULL default '==',
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '',
PRIMARY KEY (`id`),
KEY `username` (`username`(32))
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `radcheck`
--
 
LOCK TABLES `radcheck` WRITE;
/*!40000 ALTER TABLE `radcheck` DISABLE KEYS */;
/*!40000 ALTER TABLE `radcheck` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `radgroupcheck`
--
 
DROP TABLE IF EXISTS `radgroupcheck`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `radgroupcheck` (
`id` int(11) unsigned NOT NULL auto_increment,
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`op` char(2) collate utf8_unicode_ci NOT NULL default '==',
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '',
PRIMARY KEY (`id`),
KEY `groupname` (`groupname`(32))
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `radgroupcheck`
--
 
LOCK TABLES `radgroupcheck` WRITE;
/*!40000 ALTER TABLE `radgroupcheck` DISABLE KEYS */;
/*!40000 ALTER TABLE `radgroupcheck` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `radgroupreply`
--
 
DROP TABLE IF EXISTS `radgroupreply`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `radgroupreply` (
`id` int(11) unsigned NOT NULL auto_increment,
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`op` char(2) collate utf8_unicode_ci NOT NULL default '=',
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '',
PRIMARY KEY (`id`),
KEY `groupname` (`groupname`(32))
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `radgroupreply`
--
 
LOCK TABLES `radgroupreply` WRITE;
/*!40000 ALTER TABLE `radgroupreply` DISABLE KEYS */;
/*!40000 ALTER TABLE `radgroupreply` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `radpostauth`
--
 
DROP TABLE IF EXISTS `radpostauth`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `radpostauth` (
`id` int(11) NOT NULL auto_increment,
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`reply` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`authdate` timestamp NOT NULL default CURRENT_TIMESTAMP on update CURRENT_TIMESTAMP,
PRIMARY KEY (`id`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `radpostauth`
--
 
LOCK TABLES `radpostauth` WRITE;
/*!40000 ALTER TABLE `radpostauth` DISABLE KEYS */;
/*!40000 ALTER TABLE `radpostauth` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `radreply`
--
 
DROP TABLE IF EXISTS `radreply`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `radreply` (
`id` int(11) unsigned NOT NULL auto_increment,
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`attribute` varchar(32) collate utf8_unicode_ci NOT NULL default '',
`op` char(2) collate utf8_unicode_ci NOT NULL default '=',
`value` varchar(253) collate utf8_unicode_ci NOT NULL default '',
PRIMARY KEY (`id`),
KEY `username` (`username`(32))
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `radreply`
--
 
LOCK TABLES `radreply` WRITE;
/*!40000 ALTER TABLE `radreply` DISABLE KEYS */;
/*!40000 ALTER TABLE `radreply` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `radusergroup`
--
 
DROP TABLE IF EXISTS `radusergroup`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `radusergroup` (
`username` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`groupname` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`priority` int(11) NOT NULL default '1',
KEY `username` (`username`(32))
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `radusergroup`
--
 
LOCK TABLES `radusergroup` WRITE;
/*!40000 ALTER TABLE `radusergroup` DISABLE KEYS */;
/*!40000 ALTER TABLE `radusergroup` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `totacct`
--
 
DROP TABLE IF EXISTS `totacct`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `totacct` (
`TotAcctId` bigint(21) NOT NULL auto_increment,
`UserName` varchar(64) collate utf8_unicode_ci NOT NULL default '',
`AcctDate` date NOT NULL default '0000-00-00',
`ConnNum` bigint(12) default NULL,
`ConnTotDuration` bigint(12) default NULL,
`ConnMaxDuration` bigint(12) default NULL,
`ConnMinDuration` bigint(12) default NULL,
`InputOctets` bigint(12) default NULL,
`OutputOctets` bigint(12) default NULL,
`NASIPAddress` varchar(15) collate utf8_unicode_ci default NULL,
PRIMARY KEY (`TotAcctId`),
KEY `UserName` (`UserName`),
KEY `AcctDate` (`AcctDate`),
KEY `UserOnDate` (`UserName`,`AcctDate`),
KEY `NASIPAddress` (`NASIPAddress`),
KEY `NASIPAddressOnDate` (`AcctDate`,`NASIPAddress`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `totacct`
--
 
LOCK TABLES `totacct` WRITE;
/*!40000 ALTER TABLE `totacct` DISABLE KEYS */;
/*!40000 ALTER TABLE `totacct` ENABLE KEYS */;
UNLOCK TABLES;
 
--
-- Table structure for table `userinfo`
--
 
DROP TABLE IF EXISTS `userinfo`;
SET @saved_cs_client = @@character_set_client;
SET character_set_client = utf8;
CREATE TABLE `userinfo` (
`id` int(10) NOT NULL auto_increment,
`UserName` varchar(30) collate utf8_unicode_ci default NULL,
`Name` varchar(200) collate utf8_unicode_ci default NULL,
`Mail` varchar(200) collate utf8_unicode_ci default NULL,
`Department` varchar(200) collate utf8_unicode_ci default NULL,
`WorkPhone` varchar(200) collate utf8_unicode_ci default NULL,
`HomePhone` varchar(200) collate utf8_unicode_ci default NULL,
`Mobile` varchar(200) collate utf8_unicode_ci default NULL,
PRIMARY KEY (`id`),
KEY `UserName` (`UserName`),
KEY `Department` (`Department`)
) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci;
SET character_set_client = @saved_cs_client;
 
--
-- Dumping data for table `userinfo`
--
 
LOCK TABLES `userinfo` WRITE;
/*!40000 ALTER TABLE `userinfo` DISABLE KEYS */;
/*!40000 ALTER TABLE `userinfo` ENABLE KEYS */;
UNLOCK TABLES;
/*!40103 SET TIME_ZONE=@OLD_TIME_ZONE */;
 
/*!40101 SET SQL_MODE=@OLD_SQL_MODE */;
/*!40014 SET FOREIGN_KEY_CHECKS=@OLD_FOREIGN_KEY_CHECKS */;
/*!40014 SET UNIQUE_CHECKS=@OLD_UNIQUE_CHECKS */;
/*!40101 SET CHARACTER_SET_CLIENT=@OLD_CHARACTER_SET_CLIENT */;
/*!40101 SET CHARACTER_SET_RESULTS=@OLD_CHARACTER_SET_RESULTS */;
/*!40101 SET COLLATION_CONNECTION=@OLD_COLLATION_CONNECTION */;
/*!40111 SET SQL_NOTES=@OLD_SQL_NOTES */;
 
-- Dump completed on 2009-01-01 21:20:42
/conf/blacklists.tar.gz
Cannot display: file marked as a binary type.
svn:mime-type = application/octet-stream
Property changes:
Added: svn:mime-type
+application/octet-stream
\ No newline at end of property
/conf/dansguardian-init
0,0 → 1,103
#!/bin/sh
#
# Startup script for dansguardian
#
# chkconfig: 345 92 8
# description: A web content filtering plugin for web \
# proxies, developed to filter using lists of \
# banned phrases, MIME types, filename \
# extensions and PICS labelling.
# processname: dansguardian
# pidfile: /var/run/dansguardian.pid
# config: /etc/dansguardian/dansguardian.conf
 
### BEGIN INIT INFO
# Provides: dansguardian
# Required-Start: $network
# Required-Stop: $network
# Should-Start: $named
# Should-Stop: $named
# Default-Start: 3 4 5
# Short-Description: Starts the dansguardian daemon
# Description: A web content filtering plugin for web \
# proxies, developed to filter using lists of \
# banned phrases, MIME types, filename \
# extensions and PICS labelling.
### END INIT INFO
 
# Source function library.
. /etc/rc.d/init.d/functions
 
# Source networking configuration.
. /etc/sysconfig/network
 
# Check that networking is up.
[ ${NETWORKING} = "no" ] && exit 0
 
RETVAL=0
 
start() {
gprintf "Starting dansguardian: "
daemon dansguardian
RETVAL=$?
echo
[ $RETVAL -eq 0 ] && touch /var/lock/subsys/dansguardian
return $RETVAL
}
 
stop() {
gprintf "Shutting down dansguardian: "
killproc dansguardian
if [ ! -z "`pidof dansguardian`" ]; then
echo
gprintf "Giving dansguardian more time to exit: "
while [ ! -z "`pidof dansguardian`" ]; do echo -n "."; sleep 1; done && success || failure
fi
echo
RETVAL=$?
[ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/dansguardian /var/run/dansguardian/dansguardian.pid \
/var/lib/dansguardian/.dguardianipc /var/lib/dansguardian/.dguardianurlipc \
/var/lib/dansguardian/.dguardianipipc
return $RETVAL
}
 
restart() {
stop
start
}
 
reload() {
gprintf "Reloading dansguardian: "
killproc dansguardian -HUP
RETVAL=$?
echo
return $RETVAL
}
 
case "$1" in
start)
start
;;
stop)
stop
;;
restart)
restart
;;
reload)
reload
;;
condrestart)
[ -e /var/lock/subsys/dansguardian ] && restart
RETVAL=$?
;;
status)
status dansguardian
RETVAL=$?
;;
*)
gprintf "Usage: %s {start|stop|restart|reload|condrestart|status}\n" "$0"
RETVAL=1
esac
 
exit $RETVAL
/conf/rpms-update/python-coova-chilli-1.2.1-1mdv2010.0.noarch.rpm
Cannot display: file marked as a binary type.
svn:mime-type = application/octet-stream
Property changes:
Added: svn:mime-type
+application/octet-stream
\ No newline at end of property
/conf/rpms-update/coova-chilli-1.2.1-1mdv2010.0.i586.rpm
Cannot display: file marked as a binary type.
svn:mime-type = application/octet-stream
Property changes:
Added: svn:mime-type
+application/octet-stream
\ No newline at end of property
/conf/rpms-update/libchilli0-1.2.1-1mdv2010.0.i586.rpm
Cannot display: file marked as a binary type.
svn:mime-type = application/octet-stream
Property changes:
Added: svn:mime-type
+application/octet-stream
\ No newline at end of property
/conf/rpms-update/mindi-2.0.7.1-1.mdv2010.0.i586.rpm
Cannot display: file marked as a binary type.
svn:mime-type = application/octet-stream
Property changes:
Added: svn:mime-type
+application/octet-stream
\ No newline at end of property
/conf/bashrc
0,0 → 1,46
# /etc/bashrc
 
# System wide functions and aliases
# Environment stuff goes in /etc/profile
 
# by default, we want this to get set.
# Even for non-interactive, non-login shells.
if [ "`id -gn`" = "`id -un`" -a `id -u` -gt 99 ]; then
umask 002
else
umask 022
fi
 
# are we an interactive shell?
if [ "$PS1" ]; then
case $TERM in
xterm*)
PROMPT_COMMAND='echo -ne "\033]0;${USER}@${HOSTNAME}: ${PWD}\007"'
;;
*)
;;
esac
# [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\u@\h \W]\\$ "
if [ `id -un` = root ]; then
PS1='\[\033[1;31m\]\h:\w\$\[\033[0m\] '
else
PS1='\[\033[1;30m\]\h:\w\$\[\033[0m\] '
fi
if [ -z "$loginsh" ]; then # We're not a login shell
# Not all scripts in profile.d are compatible with other shells
# TODO: make the scripts compatible or check the running shell by
# themselves.
if [ -n "${BASH_VERSION}${KSH_VERSION}${ZSH_VERSION}" ]; then
for i in /etc/profile.d/*.sh; do
if [ -x $i ]; then
. $i
fi
done
unset i
fi
fi
fi
 
unset loginsh
/conf/dialup.conf
0,0 → 1,303
# -*- text -*-
##
## dialup.conf -- MySQL configuration for default schema (schema.sql)
##
## $Id$
 
# Safe characters list for sql queries. Everything else is replaced
# with their mime-encoded equivalents.
# The default list should be ok
#safe-characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
 
#######################################################################
# Query config: Username
#######################################################################
# This is the username that will get substituted, escaped, and added
# as attribute 'SQL-User-Name'. '%{SQL-User-Name}' should be used below
# everywhere a username substitution is needed so you you can be sure
# the username passed from the client is escaped properly.
#
# Uncomment the next line, if you want the sql_user_name to mean:
#
# Use Stripped-User-Name, if it's there.
# Else use User-Name, if it's there,
# Else use hard-coded string "DEFAULT" as the user name.
#sql_user_name = "%{%{Stripped-User-Name}:-%{%{User-Name}:-DEFAULT}}"
#
sql_user_name = "%{User-Name}"
 
#######################################################################
# Default profile
#######################################################################
# This is the default profile. It is found in SQL by group membership.
# That means that this profile must be a member of at least one group
# which will contain the corresponding check and reply items.
# This profile will be queried in the authorize section for every user.
# The point is to assign all users a default profile without having to
# manually add each one to a group that will contain the profile.
# The SQL module will also honor the User-Profile attribute. This
# attribute can be set anywhere in the authorize section (ie the users
# file). It is found exactly as the default profile is found.
# If it is set then it will *overwrite* the default profile setting.
# The idea is to select profiles based on checks on the incoming packets,
# not on user group membership. For example:
# -- users file --
# DEFAULT Service-Type == Outbound-User, User-Profile := "outbound"
# DEFAULT Service-Type == Framed-User, User-Profile := "framed"
#
# By default the default_user_profile is not set
#
#default_user_profile = "DEFAULT"
 
#######################################################################
# NAS Query
#######################################################################
# This query retrieves the radius clients
#
# 0. Row ID (currently unused)
# 1. Name (or IP address)
# 2. Shortname
# 3. Type
# 4. Secret
#######################################################################
 
nas_query = "SELECT id, nasname, shortname, type, secret FROM ${nas_table}"
 
#######################################################################
# Authorization Queries
#######################################################################
# These queries compare the check items for the user
# in ${authcheck_table} and setup the reply items in
# ${authreply_table}. You can use any query/tables
# you want, but the return data for each row MUST
# be in the following order:
#
# 0. Row ID (currently unused)
# 1. UserName/GroupName
# 2. Item Attr Name
# 3. Item Attr Value
# 4. Item Attr Operation
#######################################################################
# Use these for case sensitive usernames.
authorize_check_query = "SELECT id, username, attribute, value, op \
FROM ${authcheck_table} \
WHERE username = BINARY '%{SQL-User-Name}' \
ORDER BY id"
authorize_reply_query = "SELECT id, username, attribute, value, op \
FROM ${authreply_table} \
WHERE username = BINARY '%{SQL-User-Name}' \
ORDER BY id"
 
# The default queries are case insensitive. (for compatibility with
# older versions of FreeRADIUS)
# authorize_check_query = "SELECT id, username, attribute, value, op \
# FROM ${authcheck_table} \
# WHERE username = '%{SQL-User-Name}' \
# ORDER BY id"
# authorize_reply_query = "SELECT id, username, attribute, value, op \
# FROM ${authreply_table} \
# WHERE username = '%{SQL-User-Name}' \
# ORDER BY id"
 
# Use these for case sensitive usernames.
group_membership_query = "SELECT groupname \
FROM ${usergroup_table} \
WHERE username = BINARY '%{SQL-User-Name}' \
ORDER BY priority"
 
# group_membership_query = "SELECT groupname \
# FROM ${usergroup_table} \
# WHERE username = '%{SQL-User-Name}' \
# ORDER BY priority"
 
authorize_group_check_query = "SELECT id, groupname, attribute, \
Value, op \
FROM ${groupcheck_table} \
WHERE groupname = '%{Sql-Group}' \
ORDER BY id"
authorize_group_reply_query = "SELECT id, groupname, attribute, \
value, op \
FROM ${groupreply_table} \
WHERE groupname = '%{Sql-Group}' \
ORDER BY id"
 
#######################################################################
# Accounting Queries
#######################################################################
# accounting_onoff_query - query for Accounting On/Off packets
# accounting_update_query - query for Accounting update packets
# accounting_update_query_alt - query for Accounting update packets
# (alternate in case first query fails)
# accounting_start_query - query for Accounting start packets
# accounting_start_query_alt - query for Accounting start packets
# (alternate in case first query fails)
# accounting_stop_query - query for Accounting stop packets
# accounting_stop_query_alt - query for Accounting start packets
# (alternate in case first query doesn't
# affect any existing rows in the table)
#######################################################################
accounting_onoff_query = "\
UPDATE ${acct_table1} \
SET \
acctstoptime = '%S', \
acctsessiontime = unix_timestamp('%S') - \
unix_timestamp(acctstarttime), \
acctterminatecause = '%{Acct-Terminate-Cause}', \
acctstopdelay = %{%{Acct-Delay-Time}:-0} \
WHERE acctstoptime IS NULL \
AND nasipaddress = '%{NAS-IP-Address}' \
AND acctstarttime <= '%S'"
 
accounting_update_query = " \
UPDATE ${acct_table1} \
SET \
framedipaddress = '%{Framed-IP-Address}', \
acctsessiontime = '%{Acct-Session-Time}', \
acctinputoctets = '%{%{Acct-Input-Gigawords}:-0}' << 32 | \
'%{%{Acct-Input-Octets}:-0}', \
acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | \
'%{%{Acct-Output-Octets}:-0}' \
WHERE acctsessionid = '%{Acct-Session-Id}' \
AND username = '%{SQL-User-Name}' \
AND nasipaddress = '%{NAS-IP-Address}'"
 
accounting_update_query_alt = " \
INSERT INTO ${acct_table1} \
(acctsessionid, acctuniqueid, username, \
realm, nasipaddress, nasportid, \
nasporttype, acctstarttime, acctsessiontime, \
acctauthentic, connectinfo_start, acctinputoctets, \
acctoutputoctets, calledstationid, callingstationid, \
servicetype, framedprotocol, framedipaddress, \
acctstartdelay, xascendsessionsvrkey) \
VALUES \
('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', \
'%{SQL-User-Name}', \
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', \
'%{NAS-Port-Type}', \
DATE_SUB('%S', \
INTERVAL (%{%{Acct-Session-Time}:-0} + \
%{%{Acct-Delay-Time}:-0}) SECOND), \
'%{Acct-Session-Time}', \
'%{Acct-Authentic}', '', \
'%{%{Acct-Input-Gigawords}:-0}' << 32 | \
'%{%{Acct-Input-Octets}:-0}', \
'%{%{Acct-Output-Gigawords}:-0}' << 32 | \
'%{%{Acct-Output-Octets}:-0}', \
'%{Called-Station-Id}', '%{Calling-Station-Id}', \
'%{Service-Type}', '%{Framed-Protocol}', \
'%{Framed-IP-Address}', \
'0', '%{X-Ascend-Session-Svr-Key}')"
 
accounting_start_query = " \
INSERT INTO ${acct_table1} \
(acctsessionid, acctuniqueid, username, \
realm, nasipaddress, nasportid, \
nasporttype, acctstarttime, acctstoptime, \
acctsessiontime, acctauthentic, connectinfo_start, \
connectinfo_stop, acctinputoctets, acctoutputoctets, \
calledstationid, callingstationid, acctterminatecause, \
servicetype, framedprotocol, framedipaddress, \
acctstartdelay, acctstopdelay, xascendsessionsvrkey) \
VALUES \
('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', \
'%{SQL-User-Name}', \
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', \
'%{NAS-Port-Type}', '%S', NULL, \
'0', '%{Acct-Authentic}', '%{Connect-Info}', \
'', '0', '0', \
'%{Called-Station-Id}', '%{Calling-Station-Id}', '', \
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', \
'%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}')"
 
accounting_start_query_alt = " \
UPDATE ${acct_table1} SET \
acctstarttime = '%S', \
acctstartdelay = '%{%{Acct-Delay-Time}:-0}', \
connectinfo_start = '%{Connect-Info}' \
WHERE acctsessionid = '%{Acct-Session-Id}' \
AND username = '%{SQL-User-Name}' \
AND nasipaddress = '%{NAS-IP-Address}'"
 
accounting_stop_query = " \
UPDATE ${acct_table2} SET \
acctstoptime = '%S', \
acctsessiontime = '%{Acct-Session-Time}', \
acctinputoctets = '%{%{Acct-Input-Gigawords}:-0}' << 32 | \
'%{%{Acct-Input-Octets}:-0}', \
acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | \
'%{%{Acct-Output-Octets}:-0}', \
acctterminatecause = '%{Acct-Terminate-Cause}', \
acctstopdelay = '%{%{Acct-Delay-Time}:-0}', \
connectinfo_stop = '%{Connect-Info}' \
WHERE acctsessionid = '%{Acct-Session-Id}' \
AND username = '%{SQL-User-Name}' \
AND nasipaddress = '%{NAS-IP-Address}'"
 
accounting_stop_query_alt = " \
INSERT INTO ${acct_table2} \
(acctsessionid, acctuniqueid, username, \
realm, nasipaddress, nasportid, \
nasporttype, acctstarttime, acctstoptime, \
acctsessiontime, acctauthentic, connectinfo_start, \
connectinfo_stop, acctinputoctets, acctoutputoctets, \
calledstationid, callingstationid, acctterminatecause, \
servicetype, framedprotocol, framedipaddress, \
acctstartdelay, acctstopdelay) \
VALUES \
('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', \
'%{SQL-User-Name}', \
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', \
'%{NAS-Port-Type}', \
DATE_SUB('%S', \
INTERVAL (%{%{Acct-Session-Time}:-0} + \
%{%{Acct-Delay-Time}:-0}) SECOND), \
'%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '', \
'%{Connect-Info}', \
'%{%{Acct-Input-Gigawords}:-0}' << 32 | \
'%{%{Acct-Input-Octets}:-0}', \
'%{%{Acct-Output-Gigawords}:-0}' << 32 | \
'%{%{Acct-Output-Octets}:-0}', \
'%{Called-Station-Id}', '%{Calling-Station-Id}', \
'%{Acct-Terminate-Cause}', \
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', \
'0', '%{%{Acct-Delay-Time}:-0}')"
 
#######################################################################
# Simultaneous Use Checking Queries
#######################################################################
# simul_count_query - query for the number of current connections
# - If this is not defined, no simultaneouls use checking
# - will be performed by this module instance
# simul_verify_query - query to return details of current connections for verification
# - Leave blank or commented out to disable verification step
# - Note that the returned field order should not be changed.
#######################################################################
 
# Uncomment simul_count_query to enable simultaneous use checking
simul_count_query = "SELECT COUNT(*) \
FROM ${acct_table1} \
WHERE username = '%{SQL-User-Name}' \
AND acctstoptime IS NULL"
 
#simul_verify_query = "SELECT radacctid, acctsessionid, username, \
#nasipaddress, nasportid, framedipaddress, \
#callingstationid, framedprotocol \
#FROM ${acct_table1} \
#WHERE username = '%{SQL-User-Name}' \
#AND acctstoptime IS NULL"
 
#######################################################################
# Authentication Logging Queries
#######################################################################
# postauth_query - Insert some info after authentication
#######################################################################
# (username, pass, reply, authdate) \
# '%{%{User-Password}:-%{Chap-Password}}', \
 
postauth_query = "INSERT INTO ${postauth_table} \
(username, reply, authdate) \
VALUES ( \
'%{User-Name}', \
'%{reply:Packet-Type}', '%S')"
 
/conf/bannedurllist
0,0 → 1,41
# site de test :
badboys.com
 
#univ-toulouse url/blacklists collection.
.Include</etc/dansguardian/lists/blacklists/adult/urls>
.Include</etc/dansguardian/lists/blacklists/agressif/urls>
#.Include</etc/dansguardian/lists/blacklists/astrology/urls>
#.Include</etc/dansguardian/lists/blacklists/audio-video/urls>
#.Include</etc/dansguardian/lists/blacklists/blog/urls>
#.Include</etc/dansguardian/lists/blacklists/celebrity/urls>
#.Include</etc/dansguardian/lists/blacklists/child/urls>
#.Include</etc/dansguardian/lists/blacklists/cleaning/urls>
.Include</etc/dansguardian/lists/blacklists/dangerous_material/urls>
.Include</etc/dansguardian/lists/blacklists/dating/urls>
.Include</etc/dansguardian/lists/blacklists/drogue/urls>
#.Include</etc/dansguardian/lists/blacklists/filehosting/urls>
#.Include</etc/dansguardian/lists/blacklists/financial/urls>
#.Include</etc/dansguardian/lists/blacklists/forums/urls>
.Include</etc/dansguardian/lists/blacklists/gambling/urls>
#.Include</etc/dansguardian/lists/blacklists/games/urls>
.Include</etc/dansguardian/lists/blacklists/hacking/urls>
.Include</etc/dansguardian/lists/blacklists/malware/urls>
#.Include</etc/dansguardian/lists/blacklists/manga/urls>
.Include</etc/dansguardian/lists/blacklists/marketingware/urls>
.Include</etc/dansguardian/lists/blacklists/mixed_adult/urls>
#.Include</etc/dansguardian/lists/blacklists/mobile-phone/urls>
.Include</etc/dansguardian/lists/blacklists/phishing/urls>
#.Include</etc/dansguardian/lists/blacklists/publicite/urls>
#.Include</etc/dansguardian/lists/blacklists/radio/urls>
#.Include</etc/dansguardian/lists/blacklists/reaffected/urls>
.Include</etc/dansguardian/lists/blacklists/redirector/urls>
.Include</etc/dansguardian/lists/blacklists/sect/urls>
#.Include</etc/dansguardian/lists/blacklists/sexual_education/urls>
#.Include</etc/dansguardian/lists/blacklists/shopping/urls>
.Include</etc/dansguardian/lists/blacklists/strict_redirector/urls>
.Include</etc/dansguardian/lists/blacklists/strong_redirector/urls>
.Include</etc/dansguardian/lists/blacklists/tricheur/urls>
.Include</etc/dansguardian/lists/blacklists/warez/urls>
#.Include</etc/dansguardian/lists/blacklists/webmail/urls>
 
.Include</etc/dansguardian/lists/blacklists/ossi/urls>
/conf/bannedsitelist
0,0 → 1,41
# site de test :
badboys.com
 
#univ-toulouse url/blacklists collection.
.Include</etc/dansguardian/lists/blacklists/adult/domains>
.Include</etc/dansguardian/lists/blacklists/agressif/domains>
#.Include</etc/dansguardian/lists/blacklists/astrology/domains>
#.Include</etc/dansguardian/lists/blacklists/audio-video/domains>
#.Include</etc/dansguardian/lists/blacklists/blog/domains>
#.Include</etc/dansguardian/lists/blacklists/celebrity/domains>
#.Include</etc/dansguardian/lists/blacklists/child/domains>
#.Include</etc/dansguardian/lists/blacklists/cleaning/domains>
.Include</etc/dansguardian/lists/blacklists/dangerous_material/domains>
.Include</etc/dansguardian/lists/blacklists/dating/domains>
.Include</etc/dansguardian/lists/blacklists/drogue/domains>
#.Include</etc/dansguardian/lists/blacklists/filehosting/domains>
#.Include</etc/dansguardian/lists/blacklists/financial/domains>
#.Include</etc/dansguardian/lists/blacklists/forums/domains>
.Include</etc/dansguardian/lists/blacklists/gambling/domains>
#.Include</etc/dansguardian/lists/blacklists/games/domains>
.Include</etc/dansguardian/lists/blacklists/hacking/domains>
.Include</etc/dansguardian/lists/blacklists/malware/domains>
#.Include</etc/dansguardian/lists/blacklists/manga/domains>
.Include</etc/dansguardian/lists/blacklists/marketingware/domains>
.Include</etc/dansguardian/lists/blacklists/mixed_adult/domains>
#.Include</etc/dansguardian/lists/blacklists/mobile-phone/domains>
.Include</etc/dansguardian/lists/blacklists/phishing/domains>
#.Include</etc/dansguardian/lists/blacklists/publicite/domains>
#.Include</etc/dansguardian/lists/blacklists/radio/domains>
#.Include</etc/dansguardian/lists/blacklists/reaffected/domains>
.Include</etc/dansguardian/lists/blacklists/redirector/domains>
.Include</etc/dansguardian/lists/blacklists/sect/domains>
#.Include</etc/dansguardian/lists/blacklists/sexual_education/domains>
#.Include</etc/dansguardian/lists/blacklists/shopping/domains>
.Include</etc/dansguardian/lists/blacklists/strict_redirector/domains>
.Include</etc/dansguardian/lists/blacklists/strong_redirector/domains>
.Include</etc/dansguardian/lists/blacklists/tricheur/domains>
.Include</etc/dansguardian/lists/blacklists/warez/domains>
#.Include</etc/dansguardian/lists/blacklists/webmail/domains>
 
.Include</etc/dansguardian/lists/blacklists/ossi/domains>