Subversion Repositories ALCASAR

Rev

Rev 878 | Rev 885 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 878 Rev 879
1
#/bin/bash
1
#/bin/bash
2
# $Id: alcasar-conf.sh 878 2012-06-03 16:07:40Z richard $
2
# $Id: alcasar-conf.sh 879 2012-06-03 20:50:48Z richard $
3
 
3
 
4
# alcasar-conf.sh
4
# alcasar-conf.sh
5
# by REXY
5
# by REXY
6
# This script is distributed under the Gnu General Public License (GPL)
6
# This script is distributed under the Gnu General Public License (GPL)
7
 
7
 
8
# Ce script permet la mise à jour ALCASAR 
8
# Ce script permet la mise à jour ALCASAR 
9
#	- création et chargement de l'archive des fichiers de configuration (/tmp/alcasar-conf.tar.gz)
9
#	- création et chargement de l'archive des fichiers de configuration (/tmp/alcasar-conf.tar.gz)
10
#	- application des directives du fichier de conf central (/usr/local/etc/alcasar.conf)
10
#	- application des directives du fichier de conf central (/usr/local/etc/alcasar.conf)
11
# This script allows ALCASAR update 
11
# This script allows ALCASAR update 
12
#	- create and load the configuration files backup (/tmp/alcasar-conf.tar.gz)
12
#	- create and load the configuration files backup (/tmp/alcasar-conf.tar.gz)
13
#	- apply ALCASAR central configuration file (/usr/local/etc/alcasar.conf)
13
#	- apply ALCASAR central configuration file (/usr/local/etc/alcasar.conf)
14
 
14
 
15
new="$(date +%G%m%d-%Hh%M)"  			# date et heure des fichiers
15
new="$(date +%G%m%d-%Hh%M)"  			# date et heure des fichiers
16
fichier="alcasar-conf-$new.tar.gz"		# nom du fichier de sauvegarde
16
fichier="alcasar-conf-$new.tar.gz"		# nom du fichier de sauvegarde
17
DIR_UPDATE="/tmp/conf"				# répertoire de stockage des fichier de conf pour une mise à jour
17
DIR_UPDATE="/tmp/conf"				# répertoire de stockage des fichier de conf pour une mise à jour
18
DIR_WEB="/var/www/html"				# répertoire du centre de gestion
18
DIR_WEB="/var/www/html"				# répertoire du centre de gestion
19
DIR_BIN="/usr/local/bin"			# répertoire des scripts d'admin
19
DIR_BIN="/usr/local/bin"			# répertoire des scripts d'admin
20
DIR_SBIN="/usr/local/sbin"			# répertoire des scripts d'admin
20
DIR_SBIN="/usr/local/sbin"			# répertoire des scripts d'admin
21
DIR_ETC="/usr/local/etc"			# répertoire des fichiers de conf
21
DIR_ETC="/usr/local/etc"			# répertoire des fichiers de conf
22
DIR_SAVE="/var/Save/system_backup"		# répertoire de sauvegarde
22
DIR_SAVE="/var/Save/system_backup"		# répertoire de sauvegarde
23
CONF_FILE="$DIR_ETC/alcasar.conf"		# main alcasar conf file
23
CONF_FILE="$DIR_ETC/alcasar.conf"		# main alcasar conf file
24
VERSION="/var/www/html/VERSION"			# contient la version en cours
24
VERSION="/var/www/html/VERSION"			# contient la version en cours
25
EXTIF="eth0"					# ETH0 est l'interface connectée à Internet (Box FAI)
25
EXTIF="eth0"					# ETH0 est l'interface connectée à Internet (Box FAI)
26
INTIF="eth1"					# ETH1 est l'interface connectée au réseau local de consultation
26
INTIF="eth1"					# ETH1 est l'interface connectée au réseau local de consultation
27
HOSTNAME="alcasar"
27
HOSTNAME="alcasar"
28
DB_USER="radius"
28
DB_USER="radius"
29
radiuspwd=""
29
radiuspwd=""
30
SED="/bin/sed -i"
30
SED="/bin/sed -i"
31
RUNNING_VERSION=`cat $VERSION|cut -d" " -f1`
31
RUNNING_VERSION=`cat $VERSION|cut -d" " -f1`
32
MAJ_RUNNING_VERSION=`echo $RUNNING_VERSION|cut -d"." -f1`
32
MAJ_RUNNING_VERSION=`echo $RUNNING_VERSION|cut -d"." -f1`
33
MIN_RUNNING_VERSION=`echo $RUNNING_VERSION|cut -d"." -f2|cut -c1`
33
MIN_RUNNING_VERSION=`echo $RUNNING_VERSION|cut -d"." -f2|cut -c1`
34
UPD_RUNNING_VERSION=`echo $RUNNING_VERSION|cut -d"." -f3`
34
UPD_RUNNING_VERSION=`echo $RUNNING_VERSION|cut -d"." -f3`
35
DATE=`date '+%d %B %Y - %Hh%M'`
35
DATE=`date '+%d %B %Y - %Hh%M'`
36
private_network_calc ()
36
private_network_calc ()
37
{
37
{
38
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP $PRIVATE_NETMASK |cut -d"=" -f2`		# prefixe du réseau (ex. 24)
38
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP $PRIVATE_NETMASK |cut -d"=" -f2`		# prefixe du réseau (ex. 24)
39
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP $PRIVATE_NETMASK| cut -d"=" -f2`		# @ réseau de consultation (ex.: 192.168.182.0)
39
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP $PRIVATE_NETMASK| cut -d"=" -f2`		# @ réseau de consultation (ex.: 192.168.182.0)
40
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX					# @ + masque du réseau de consult (192.168.182.0/24)
40
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX					# @ + masque du réseau de consult (192.168.182.0/24)
41
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`		# classes de réseau (ex.: 2=classe B, 3=classe C)
41
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`		# classes de réseau (ex.: 2=classe B, 3=classe C)
42
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.			# @ compatible hosts.allow et hosts.deny (ex.: 192.168.182.)
42
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.			# @ compatible hosts.allow et hosts.deny (ex.: 192.168.182.)
43
}
43
}
44
 
44
 
45
usage="Usage: alcasar-conf.sh {--create ou -create} | {--load or -load} | {--apply or -apply}"
45
usage="Usage: alcasar-conf.sh {--create ou -create} | {--load or -load} | {--apply or -apply}"
46
nb_args=$#
46
nb_args=$#
47
args=$1
47
args=$1
48
if [ $nb_args -eq 0 ]
48
if [ $nb_args -eq 0 ]
49
then
49
then
50
	nb_args=1
50
	nb_args=1
51
	args="-h"
51
	args="-h"
52
fi
52
fi
53
case $args in
53
case $args in
54
	-\? | -h* | --h*)
54
	-\? | -h* | --h*)
55
		echo "$usage"
55
		echo "$usage"
56
		exit 0
56
		exit 0
57
		;;
57
		;;
58
	--create|-create)	
58
	--create|-create)	
59
		[ -d $DIR_UPDATE ] && rm -rf $DIR_UPDATE
59
		[ -d $DIR_UPDATE ] && rm -rf $DIR_UPDATE
60
		mkdir $DIR_UPDATE
60
		mkdir $DIR_UPDATE
61
# Sauvegarde de la base des usagers
61
# Sauvegarde de la base des usagers
62
		/usr/local/sbin/alcasar-mysql.sh -dump
62
		/usr/local/sbin/alcasar-mysql.sh -dump
63
		cp /var/Save/base/`ls /var/Save/base|tail -1` $DIR_UPDATE
63
		cp /var/Save/base/`ls /var/Save/base|tail -1` $DIR_UPDATE
64
# Sauvegarde du logo
64
# Sauvegarde du logo
65
		cp -f $DIR_WEB/images/organisme.png $DIR_UPDATE
65
		cp -f $DIR_WEB/images/organisme.png $DIR_UPDATE
66
# Sauvegarde des fichiers exploités par dansguardian 
66
# Sauvegarde des fichiers exploités par dansguardian 
67
		cp -f /etc/dansguardian/lists/exceptioniplist $DIR_UPDATE
67
		cp -f /etc/dansguardian/lists/exceptioniplist $DIR_UPDATE
-
 
68
		cp -f /etc/dansguardian/lists/urlregexplist $DIR_UPDATE
68
		cp -f /etc/dansguardian/lists/exceptionsitelist $DIR_UPDATE
69
		cp -f /etc/dansguardian/lists/exceptionsitelist $DIR_UPDATE
69
		cp -f /etc/dansguardian/lists/bannedsitelist $DIR_UPDATE
70
		cp -f /etc/dansguardian/lists/bannedsitelist $DIR_UPDATE
70
		cp -f /etc/dansguardian/lists/exceptionurllist $DIR_UPDATE
71
		cp -f /etc/dansguardian/lists/exceptionurllist $DIR_UPDATE
71
		cp -f /etc/dansguardian/lists/bannedurllist $DIR_UPDATE
72
		cp -f /etc/dansguardian/lists/bannedurllist $DIR_UPDATE
72
		cp -rf /etc/dansguardian/lists/blacklists/ossi $DIR_UPDATE
73
		cp -rf /etc/dansguardian/lists/blacklists/ossi $DIR_UPDATE
73
# sauvegarde des fichiers : de conf, de filtrage, d'exception, digest, etc.
74
# sauvegarde des fichiers : de conf, de filtrage, d'exception, digest, etc.
74
		mkdir $DIR_UPDATE/etc/
75
		mkdir $DIR_UPDATE/etc/
75
		cp -rf $DIR_ETC/* $DIR_UPDATE/etc/
76
		cp -rf $DIR_ETC/* $DIR_UPDATE/etc/
76
# particularité des versions
77
# particularité des versions
77
		rm -f $DIR_UPDATE/etc/alcasar-macallowed	# macallowed is replaced with macauth
78
		rm -f $DIR_UPDATE/etc/alcasar-macallowed	# macallowed is replaced with macauth
78
# si version <= 2.0
79
# si version <= 2.0
79
		if [ $MAJ_RUNNING_VERSION -lt 2 ] || ([ $MAJ_RUNNING_VERSION -eq 2 ] && [ $MIN_RUNNING_VERSION -eq 0 ])
80
		if [ $MAJ_RUNNING_VERSION -lt 2 ] || ([ $MAJ_RUNNING_VERSION -eq 2 ] && [ $MIN_RUNNING_VERSION -eq 0 ])
80
		then
81
		then
81
			rm -f $DIR_UPDATE/etc/alcasar-dns-name		# changement de format
82
			rm -f $DIR_UPDATE/etc/alcasar-dns-name		# changement de format
82
			rm -rf $DIR_UPDATE/etc/digest			# hostname=alcasar
83
			rm -rf $DIR_UPDATE/etc/digest			# hostname=alcasar
83
			if [ -e $DIR_UPDATE/etc/alcasar-uamallowed ]; then
84
			if [ -e $DIR_UPDATE/etc/alcasar-uamallowed ]; then
84
				uamallowed=`cat $DIR_UPDATE/etc/alcasar-uamallowed`
85
				uamallowed=`cat $DIR_UPDATE/etc/alcasar-uamallowed`
85
				if [ $uamallowed == "uamallowed=\"\"" ]
86
				if [ $uamallowed == "uamallowed=\"\"" ]
86
					then rm -f $DIR_UPDATE/etc/alcasar-uamallowed		# un uamallowed 'vide' perturbe coova
87
					then rm -f $DIR_UPDATE/etc/alcasar-uamallowed		# un uamallowed 'vide' perturbe coova
87
				fi
88
				fi
88
			fi
89
			fi
89
			if [ -e $DIR_UPDATE/etc/alcasar-uamdomain ]; then
90
			if [ -e $DIR_UPDATE/etc/alcasar-uamdomain ]; then
90
				uamdomain=`cat $DIR_UPDATE/etc/alcasar-uamdomain`
91
				uamdomain=`cat $DIR_UPDATE/etc/alcasar-uamdomain`
91
				if [ $uamdomain == "uamdomain=\"\"" ]
92
				if [ $uamdomain == "uamdomain=\"\"" ]
92
					then rm -f $DIR_UPDATE/etc/alcasar-uamdomain		# un uamdomain 'vide' perturbe coova
93
					then rm -f $DIR_UPDATE/etc/alcasar-uamdomain		# un uamdomain 'vide' perturbe coova
93
				fi
94
				fi
94
			fi
95
			fi
95
		else
96
		else
96
# si version >= 2.1 : sauvegarde des certificats (serveur et CA)
97
# si version >= 2.1 : sauvegarde des certificats (serveur et CA)
97
			mkdir $DIR_UPDATE/pki/
98
			mkdir $DIR_UPDATE/pki/
98
			cert_date=`/usr/bin/openssl x509 -noout -in /etc/pki/tls/certs/alcasar.crt -dates|grep After|cut -d"=" -f2`
99
			cert_date=`/usr/bin/openssl x509 -noout -in /etc/pki/tls/certs/alcasar.crt -dates|grep After|cut -d"=" -f2`
99
			cp -f /etc/pki/tls/certs/alcasar.crt $DIR_UPDATE
100
			cp -f /etc/pki/tls/certs/alcasar.crt $DIR_UPDATE
100
			cp -f /etc/pki/tls/private/alcasar.key $DIR_UPDATE
101
			cp -f /etc/pki/tls/private/alcasar.key $DIR_UPDATE
101
			cp -f /etc/pki/CA/alcasar-ca.crt $DIR_UPDATE
102
			cp -f /etc/pki/CA/alcasar-ca.crt $DIR_UPDATE
102
			cp -f /etc/pki/CA/private/alcasar-ca.key $DIR_UPDATE
103
			cp -f /etc/pki/CA/private/alcasar-ca.key $DIR_UPDATE
103
			if [ -e /etc/pki/tls/certs/server-chain.crt ]; then
104
			if [ -e /etc/pki/tls/certs/server-chain.crt ]; then
104
				cp -f /etc/pki/tls/certs/server-chain.crt $DIR_UPDATE
105
				cp -f /etc/pki/tls/certs/server-chain.crt $DIR_UPDATE
105
			else
106
			else
106
				cp -f /etc/pki/tls/certs/alcasar.crt $DIR_UPDATE/server-chain.crt
107
				cp -f /etc/pki/tls/certs/alcasar.crt $DIR_UPDATE/server-chain.crt
107
			fi
108
			fi
108
		fi
109
		fi
109
# si version < 2.2
110
# si version < 2.2
110
		if [ $MAJ_RUNNING_VERSION -lt 2 ] || ([ $MAJ_RUNNING_VERSION -eq 2 ] && [ $MIN_RUNNING_VERSION -lt 2 ])
111
		if [ $MAJ_RUNNING_VERSION -lt 2 ] || ([ $MAJ_RUNNING_VERSION -eq 2 ] && [ $MIN_RUNNING_VERSION -lt 2 ])
111
		then
112
		then
112
			ORGANISM=`cat $DIR_WEB/intercept.php|grep '$organisme =' | cut -d"=" -f2|tr -d ";\" "` # Sauvegarde du nom d'organisme
113
			ORGANISM=`cat $DIR_WEB/intercept.php|grep '$organisme =' | cut -d"=" -f2|tr -d ";\" "` # Sauvegarde du nom d'organisme
113
			rm -f $DIR_UPDATE/etc/alcasar-ethers		# This file doesn't contain comments
114
			rm -f $DIR_UPDATE/etc/alcasar-ethers		# This file doesn't contain comments
114
			rm -f $DIR_UPDATE/exceptionurllist		# This file was not empty (comments)
115
			rm -f $DIR_UPDATE/exceptionurllist		# This file was not empty (comments)
115
			# Create the initial conf file (doesn't exist in earlier versions)
116
			# Create the initial conf file (doesn't exist in earlier versions)
116
			cat <<EOF > $CONF_FILE
117
			cat <<EOF > $CONF_FILE
117
##########################################
118
##########################################
118
##                                      ##
119
##                                      ##
119
##          ALCASAR Parameters          ##
120
##          ALCASAR Parameters          ##
120
##                                      ##
121
##                                      ##
121
##########################################
122
##########################################
122
 
123
 
123
INSTALL_DATE=$DATE
124
INSTALL_DATE=$DATE
124
VERSION=$RUNNING_VERSION
125
VERSION=$RUNNING_VERSION
125
ORGANISM=$ORGANISM
126
ORGANISM=$ORGANISM
126
EOF
127
EOF
127
			PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip du portail (côté Internet)
128
			PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip du portail (côté Internet)
128
			PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
129
			PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
129
			PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK |cut -d"=" -f2`		# prefixe du réseau (ex. 24)
130
			PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK |cut -d"=" -f2`		# prefixe du réseau (ex. 24)
130
			PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
131
			PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
131
			DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
132
			DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
132
			DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
133
			DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
133
			DNS1=${DNS1:=208.67.220.220}
134
			DNS1=${DNS1:=208.67.220.220}
134
			DNS2=${DNS2:=208.67.222.222}
135
			DNS2=${DNS2:=208.67.222.222}
135
			PRIVATE_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$INTIF|cut -d"=" -f2` 	# @ip du portail (côté LAN)
136
			PRIVATE_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$INTIF|cut -d"=" -f2` 	# @ip du portail (côté LAN)
136
			PRIVATE_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/ifcfg-$INTIF|cut -d"=" -f2`
137
			PRIVATE_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/ifcfg-$INTIF|cut -d"=" -f2`
137
			private_network_calc
138
			private_network_calc
138
			echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE 
139
			echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE 
139
			echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
140
			echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE
140
			echo "DNS1=$DNS1" >> $CONF_FILE
141
			echo "DNS1=$DNS1" >> $CONF_FILE
141
			echo "DNS2=$DNS2" >> $CONF_FILE 
142
			echo "DNS2=$DNS2" >> $CONF_FILE 
142
			echo "PRIVATE_IP=$PRIVATE_IP/$PRIVATE_PREFIX" >> $CONF_FILE 
143
			echo "PRIVATE_IP=$PRIVATE_IP/$PRIVATE_PREFIX" >> $CONF_FILE 
143
			echo "DHCP=half" >> $CONF_FILE
144
			echo "DHCP=half" >> $CONF_FILE
144
 
145
 
145
			if [ -r /var/run/sshd.pid ]; then
146
			if [ -r /var/run/sshd.pid ]; then
146
				echo "SSH=on" >> $CONF_FILE
147
				echo "SSH=on" >> $CONF_FILE
147
			else
148
			else
148
				echo "SSH=off" >> $CONF_FILE
149
				echo "SSH=off" >> $CONF_FILE
149
			fi
150
			fi
150
			echo "QOS=off" >> $CONF_FILE
151
			echo "QOS=off" >> $CONF_FILE
151
			echo "WEB_ANTIVIRUS=on" >> $CONF_FILE
152
			echo "WEB_ANTIVIRUS=on" >> $CONF_FILE
152
			if [ `grep ^ldap /etc/raddb/sites-available/alcasar | wc -l` -eq "0" ];	then
153
			if [ `grep ^ldap /etc/raddb/sites-available/alcasar | wc -l` -eq "0" ];	then
153
				echo "LDAP=off" >> $CONF_FILE
154
				echo "LDAP=off" >> $CONF_FILE
154
			else
155
			else
155
				echo "LDAP=on" >> $CONF_FILE
156
				echo "LDAP=on" >> $CONF_FILE
156
			fi
157
			fi
157
			PROTOCOLS_FILTERING=`grep ^PROTO_FILTERING /usr/local/bin/alcasar-iptables.sh | cut -d"=" -f2`
158
			PROTOCOLS_FILTERING=`grep ^PROTO_FILTERING /usr/local/bin/alcasar-iptables.sh | cut -d"=" -f2`
158
			PROTOCOLS_FILTERING=${PROTOCOLS_FILTERING:="no"}
159
			PROTOCOLS_FILTERING=${PROTOCOLS_FILTERING:="no"}
159
			if [ $PROTOCOLS_FILTERING = "no" ]; then
160
			if [ $PROTOCOLS_FILTERING = "no" ]; then
160
				echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
161
				echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
161
			else
162
			else
162
				echo "PROTOCOLS_FILTERING=on" >> $CONF_FILE
163
				echo "PROTOCOLS_FILTERING=on" >> $CONF_FILE
163
			fi
164
			fi
164
			DNS_FILTERING=`grep ^reportinglevel /etc/dansguardian/dansguardian.conf | cut -d"=" -f2 | tr -d " "`
165
			DNS_FILTERING=`grep ^reportinglevel /etc/dansguardian/dansguardian.conf | cut -d"=" -f2 | tr -d " "`
165
			DNS_FILTERING=${DNS_FILTERING:="-1"}
166
			DNS_FILTERING=${DNS_FILTERING:="-1"}
166
			if [ $DNS_FILTERING -eq "-1" ]; then
167
			if [ $DNS_FILTERING -eq "-1" ]; then
167
				echo "DNS_FILTERING=off" >> $CONF_FILE
168
				echo "DNS_FILTERING=off" >> $CONF_FILE
168
			else
169
			else
169
				echo "DNS_FILTERING=on" >> $CONF_FILE
170
				echo "DNS_FILTERING=on" >> $CONF_FILE
170
			fi
171
			fi
171
		fi
172
		fi
172
# DHCP mode can be "off/half/full" since V2.6
173
# DHCP mode can be "off/half/full" since V2.6
173
		DHCP_mode=`cat $CONF_FILE|grep DHCP=|cut -d"=" -f2`
174
		DHCP_mode=`cat $CONF_FILE|grep DHCP=|cut -d"=" -f2`
174
		if [ $DHCP_mode = "on" ]; then
175
		if [ $DHCP_mode = "on" ]; then
175
			$SED "s?^DHCP=on.*?DHCP=half?" $CONF_FILE	# DHCP option can be "off/half/full" since V2.6
176
			$SED "s?^DHCP=on.*?DHCP=half?" $CONF_FILE	# DHCP option can be "off/half/full" since V2.6
176
		fi
177
		fi
177
		cp $CONF_FILE $DIR_UPDATE/etc/
178
		cp $CONF_FILE $DIR_UPDATE/etc/
178
# le paramêtre 'EXT_LAN_FILTERING' n'existe plus depuis la V2.6
179
# le paramêtre 'EXT_LAN_FILTERING' n'existe plus depuis la V2.6
179
		$SED "/^EXT_LAN/d" $DIR_UPDATE/etc/alcasar.conf
180
		$SED "/^EXT_LAN/d" $DIR_UPDATE/etc/alcasar.conf
180
# la catégorie de sites filtrés "ip" n'existe plus depuis la V2.6
181
# la catégorie de sites filtrés "ip" n'existe plus depuis la V2.6
181
		$SED "/\/ip\/urls/d" $DIR_UPDATE/bannedurllist;	$SED "/\/ip\/domains/d" $DIR_UPDATE/bannedsitelist
182
		$SED "/\/ip\/urls/d" $DIR_UPDATE/bannedurllist;	$SED "/\/ip\/domains/d" $DIR_UPDATE/bannedsitelist
182
		$SED "/blacklists\/ip/d" $DIR_UPDATE/etc/alcasar-bl-categories; $SED "/^ip/d" $DIR_UPDATE/alcasar-bl-categories-enabled
183
		$SED "/blacklists\/ip/d" $DIR_UPDATE/etc/alcasar-bl-categories; $SED "/^ip/d" $DIR_UPDATE/alcasar-bl-categories-enabled
183
# le répertoire "ISO" est remplacé par "system_backup" suite à la suppression de "mondoarchive" (V2.5)
184
# le répertoire "ISO" est remplacé par "system_backup" suite à la suppression de "mondoarchive" (V2.5)
184
		rm -rf /var/Save/ISO
185
		rm -rf /var/Save/ISO
185
# création de l'archive et copie dans le répertoire WEB associé
186
# création de l'archive et copie dans le répertoire WEB associé
186
		cd /tmp
187
		cd /tmp
187
		tar -cf alcasar-conf.tar conf/
188
		tar -cf alcasar-conf.tar conf/
188
		gzip -f alcasar-conf.tar
189
		gzip -f alcasar-conf.tar
189
		[ -d $DIR_SAVE ] && cp alcasar-conf.tar.gz $DIR_SAVE/$fichier
190
		[ -d $DIR_SAVE ] && cp alcasar-conf.tar.gz $DIR_SAVE/$fichier
190
		rm -rf $DIR_UPDATE
191
		rm -rf $DIR_UPDATE
191
		;;
192
		;;
192
	--load|-load)
193
	--load|-load)
193
		cd /tmp
194
		cd /tmp
194
		tar -xf /tmp/alcasar-conf.tar.gz
195
		tar -xf /tmp/alcasar-conf.tar.gz
195
# Récupération du logo
196
# Récupération du logo
196
		[ -e $DIR_UPDATE/organisme.png ] && cp -f $DIR_UPDATE/organisme.png $DIR_WEB/images/
197
		[ -e $DIR_UPDATE/organisme.png ] && cp -f $DIR_UPDATE/organisme.png $DIR_WEB/images/
197
		chown apache:apache $DIR_WEB/images/organisme.png $DIR_WEB/intercept.php
198
		chown apache:apache $DIR_WEB/images/organisme.png $DIR_WEB/intercept.php
198
# Récupération des certificats (CA et serveur)
199
# Récupération des certificats (CA et serveur)
199
		[ -e $DIR_UPDATE/alcasar-ca.crt ] && cp -f $DIR_UPDATE/alcasar-ca.crt /etc/pki/CA/
200
		[ -e $DIR_UPDATE/alcasar-ca.crt ] && cp -f $DIR_UPDATE/alcasar-ca.crt /etc/pki/CA/
200
		[ -e $DIR_UPDATE/alcasar-ca.key ] && cp -f $DIR_UPDATE/alcasar-ca.key /etc/pki/CA/private/
201
		[ -e $DIR_UPDATE/alcasar-ca.key ] && cp -f $DIR_UPDATE/alcasar-ca.key /etc/pki/CA/private/
201
		[ -e $DIR_UPDATE/alcasar.crt ] && cp -f $DIR_UPDATE/alcasar.crt /etc/pki/tls/certs/
202
		[ -e $DIR_UPDATE/alcasar.crt ] && cp -f $DIR_UPDATE/alcasar.crt /etc/pki/tls/certs/
202
		[ -e $DIR_UPDATE/alcasar.key ] && cp -f $DIR_UPDATE/alcasar.key /etc/pki/tls/private/
203
		[ -e $DIR_UPDATE/alcasar.key ] && cp -f $DIR_UPDATE/alcasar.key /etc/pki/tls/private/
203
		[ -e $DIR_UPDATE/server-chain.crt ] &&	cp -f $DIR_UPDATE/server-chain.crt /etc/pki/tls/certs/
204
		[ -e $DIR_UPDATE/server-chain.crt ] &&	cp -f $DIR_UPDATE/server-chain.crt /etc/pki/tls/certs/
204
		chown -R root:apache /etc/pki
205
		chown -R root:apache /etc/pki
205
		chmod -R 750 /etc/pki
206
		chmod -R 750 /etc/pki
206
# Import de la dernière base usagers
207
# Import de la dernière base usagers
207
		mysql -u$DB_USER -p$radiuspwd < `ls $DIR_UPDATE/radius*`
208
		mysql -u$DB_USER -p$radiuspwd < `ls $DIR_UPDATE/radius*`
208
# Récupération des paramêtres locaux (fichier de conf, règles de filtrage, fichiers d'exception, comptes de gestion, etc.)
209
# Récupération des paramêtres locaux (fichier de conf, règles de filtrage, fichiers d'exception, comptes de gestion, etc.)
209
		[ -d $DIR_UPDATE/etc ] && cp -rf $DIR_UPDATE/etc/* $DIR_ETC/
210
		[ -d $DIR_UPDATE/etc ] && cp -rf $DIR_UPDATE/etc/* $DIR_ETC/
210
# Récupération des fichiers de Dansguardian
211
# Récupération des fichiers de Dansguardian
211
		[ -e $DIR_UPDATE/exceptioniplist ] && cp -f $DIR_UPDATE/exceptioniplist /etc/dansguardian/lists/
212
		[ -e $DIR_UPDATE/exceptioniplist ] && cp -f $DIR_UPDATE/exceptioniplist /etc/dansguardian/lists/
212
		[ -e $DIR_UPDATE/exceptionsitelist ] && cp -f $DIR_UPDATE/exceptionsitelist /etc/dansguardian/lists/
213
		[ -e $DIR_UPDATE/exceptionsitelist ] && cp -f $DIR_UPDATE/exceptionsitelist /etc/dansguardian/lists/
-
 
214
		[ -e $DIR_UPDATE/urlregexplist ] && cp -f $DIR_UPDATE/urlregexplist /etc/dansguardian/lists/
213
		[ -e $DIR_UPDATE/bannedsitelist ] && cp -f $DIR_UPDATE/bannedsitelist /etc/dansguardian/lists/ 
215
		[ -e $DIR_UPDATE/bannedsitelist ] && cp -f $DIR_UPDATE/bannedsitelist /etc/dansguardian/lists/ 
214
		[ -e $DIR_UPDATE/exceptionurllist ] && cp -f $DIR_UPDATE/exceptionurllist /etc/dansguardian/lists/
216
		[ -e $DIR_UPDATE/exceptionurllist ] && cp -f $DIR_UPDATE/exceptionurllist /etc/dansguardian/lists/
215
		[ -e $DIR_UPDATE/bannedurllist ] && cp -f $DIR_UPDATE/bannedurllist /etc/dansguardian/lists/
217
		[ -e $DIR_UPDATE/bannedurllist ] && cp -f $DIR_UPDATE/bannedurllist /etc/dansguardian/lists/
216
		[ -d $DIR_UPDATE/ossi ] && cp -rf $DIR_UPDATE/ossi /etc/dansguardian/lists/blacklists/
218
		[ -d $DIR_UPDATE/ossi ] && cp -rf $DIR_UPDATE/ossi /etc/dansguardian/lists/blacklists/
217
		chown -R dansguardian:apache /etc/dansguardian/lists
219
		chown -R dansguardian:apache /etc/dansguardian/lists
218
		chmod -R g+rw /etc/dansguardian/lists
220
		chmod -R g+rw /etc/dansguardian/lists
219
# Start / Stop DNS/URL filtering
221
# Start / Stop DNS/URL filtering
220
		PARENT_SCRIPT=$0
222
		PARENT_SCRIPT=$0
221
		export PARENT_SCRIPT
223
		export PARENT_SCRIPT
222
		$DIR_SBIN/alcasar-bl.sh -reload
224
		$DIR_SBIN/alcasar-bl.sh -reload
223
# Prise en compte des comptes de gestion (admin + manager + backup)
225
# Prise en compte des comptes de gestion (admin + manager + backup)
224
		$DIR_SBIN/alcasar-profil.sh --list
226
		$DIR_SBIN/alcasar-profil.sh --list
225
# Start / Stop SSH Daemon
227
# Start / Stop SSH Daemon
226
		ssh_active=`grep SSH $CONF_FILE|cut -d"=" -f2`
228
		ssh_active=`grep SSH $CONF_FILE|cut -d"=" -f2`
227
		if [ $ssh_active = "on" ]
229
		if [ $ssh_active = "on" ]
228
		then
230
		then
229
			/sbin/chkconfig --add sshd
231
			/sbin/chkconfig --add sshd
230
		else
232
		else
231
			/sbin/chkconfig --del sshd
233
			/sbin/chkconfig --del sshd
232
		fi
234
		fi
233
# Effacement du répertoire d'update
235
# Effacement du répertoire d'update
234
		rm -rf $DIR_UPDATE
236
		rm -rf $DIR_UPDATE
235
		;;
237
		;;
236
	--apply|-apply)
238
	--apply|-apply)
237
		PTN="\b(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\/[012]?[0-9]\b"
239
		PTN="\b(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\/[012]?[0-9]\b"
238
		PRIVATE_IP_MASK=`grep PRIVATE_IP $CONF_FILE|cut -d"=" -f2`
240
		PRIVATE_IP_MASK=`grep PRIVATE_IP $CONF_FILE|cut -d"=" -f2`
239
		check=$(echo $PRIVATE_IP_MASK | egrep $PTN)
241
		check=$(echo $PRIVATE_IP_MASK | egrep $PTN)
240
		if [[ "$?" -ne 0 ]]
242
		if [[ "$?" -ne 0 ]]
241
		then 
243
		then 
242
			echo "Syntax error for PRIVATE_IP_MASK ($PRIVATE_IP_MASK)"
244
			echo "Syntax error for PRIVATE_IP_MASK ($PRIVATE_IP_MASK)"
243
			exit 0
245
			exit 0
244
		fi
246
		fi
245
		PUBLIC_IP_MASK=`grep PUBLIC_IP $CONF_FILE|cut -d"=" -f2`
247
		PUBLIC_IP_MASK=`grep PUBLIC_IP $CONF_FILE|cut -d"=" -f2`
246
		check=$(echo $PUBLIC_IP_MASK | egrep $PTN)
248
		check=$(echo $PUBLIC_IP_MASK | egrep $PTN)
247
		if [[ "$?" -ne 0 ]]
249
		if [[ "$?" -ne 0 ]]
248
		then 
250
		then 
249
			echo "Syntax error for PUBLIC_IP_MASK ($PUBLIC_IP_MASK)"
251
			echo "Syntax error for PUBLIC_IP_MASK ($PUBLIC_IP_MASK)"
250
			exit 0
252
			exit 0
251
		fi
253
		fi
252
		PTN="\b(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\b"
254
		PTN="\b(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\b"
253
		PUBLIC_GATEWAY=`grep GW $CONF_FILE|cut -d"=" -f2`
255
		PUBLIC_GATEWAY=`grep GW $CONF_FILE|cut -d"=" -f2`
254
		check=$(echo $PUBLIC_GATEWAY | egrep $PTN)
256
		check=$(echo $PUBLIC_GATEWAY | egrep $PTN)
255
		if [[ "$?" -ne 0 ]]
257
		if [[ "$?" -ne 0 ]]
256
			then 
258
			then 
257
			echo "Syntax error for the Gateway IP ($PUBLIC_GATEWAY)"
259
			echo "Syntax error for the Gateway IP ($PUBLIC_GATEWAY)"
258
			exit 0
260
			exit 0
259
		fi
261
		fi
260
		DNS1=`grep DNS1 $CONF_FILE|cut -d"=" -f2`
262
		DNS1=`grep DNS1 $CONF_FILE|cut -d"=" -f2`
261
		check=$(echo $DNS1 | egrep $PTN)
263
		check=$(echo $DNS1 | egrep $PTN)
262
		if [[ "$?" -ne 0 ]]
264
		if [[ "$?" -ne 0 ]]
263
		then 
265
		then 
264
			echo "Syntax error for the IP address of the first DNS server ($DNS1)"
266
			echo "Syntax error for the IP address of the first DNS server ($DNS1)"
265
			exit 0
267
			exit 0
266
		fi
268
		fi
267
		DNS2=`grep DNS2 $CONF_FILE|cut -d"=" -f2`
269
		DNS2=`grep DNS2 $CONF_FILE|cut -d"=" -f2`
268
		check=$(echo $DNS2 | egrep $PTN)
270
		check=$(echo $DNS2 | egrep $PTN)
269
		if [[ "$?" -ne 0 ]]
271
		if [[ "$?" -ne 0 ]]
270
		then 
272
		then 
271
			echo "Syntax error for the IP address of the second DNS server ($DNS2)"
273
			echo "Syntax error for the IP address of the second DNS server ($DNS2)"
272
			exit 0
274
			exit 0
273
		fi
275
		fi
274
		PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
276
		PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
275
		PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
277
		PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
276
		PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`
278
		PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`
277
		PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`
279
		PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`
278
		private_network_calc
280
		private_network_calc
279
		VERSION=`grep VERSION $CONF_FILE|cut -d"=" -f2`
281
		VERSION=`grep VERSION $CONF_FILE|cut -d"=" -f2`
280
		INSTALL_DATE=`grep INSTALL_DATE $CONF_FILE|cut -d"=" -f2`
282
		INSTALL_DATE=`grep INSTALL_DATE $CONF_FILE|cut -d"=" -f2`
281
		ORGANISME=`grep ORGANISM $CONF_FILE|cut -d"=" -f2`
283
		ORGANISME=`grep ORGANISM $CONF_FILE|cut -d"=" -f2`
282
		DHCP_mode=`grep DHCP= $CONF_FILE|cut -d"=" -f2`
284
		DHCP_mode=`grep DHCP= $CONF_FILE|cut -d"=" -f2`
283
# Logout everybody
285
# Logout everybody
284
		$DIR_SBIN/alcasar-logout.sh all		
286
		$DIR_SBIN/alcasar-logout.sh all		
285
# Services stop
287
# Services stop
286
		for i in squid ntpd chilli httpd sshd network
288
		for i in squid ntpd chilli httpd sshd network
287
		do
289
		do
288
			[ -e /etc/init.d/$i ] && /etc/init.d/$i stop && killall $i 2>/dev/null
290
			[ -e /etc/init.d/$i ] && /etc/init.d/$i stop && killall $i 2>/dev/null
289
		done
291
		done
290
 
292
 
291
# /etc/hosts
293
# /etc/hosts
292
		cat <<EOF > /etc/hosts
294
		cat <<EOF > /etc/hosts
293
127.0.0.1	localhost
295
127.0.0.1	localhost
294
$PRIVATE_IP	$HOSTNAME 
296
$PRIVATE_IP	$HOSTNAME 
295
EOF
297
EOF
296
 
298
 
297
# Ext Network Card config
299
# Ext Network Card config
298
		$SED "s?^IPADDR=.*?IPADDR=$PUBLIC_IP?" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
300
		$SED "s?^IPADDR=.*?IPADDR=$PUBLIC_IP?" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
299
		$SED "s?^NETMASK=.*?NETMASK=$PUBLIC_NETMASK?" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
301
		$SED "s?^NETMASK=.*?NETMASK=$PUBLIC_NETMASK?" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
300
		$SED "s?^GATEWAY=.*?GATEWAY=$PUBLIC_GATEWAY?" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
302
		$SED "s?^GATEWAY=.*?GATEWAY=$PUBLIC_GATEWAY?" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
301
# NTP server
303
# NTP server
302
		$SED "/127.0.0.1/!s?^restrict.*?restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap?g" /etc/ntp.conf
304
		$SED "/127.0.0.1/!s?^restrict.*?restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap?g" /etc/ntp.conf
303
# host.allow 
305
# host.allow 
304
		cat <<EOF > /etc/hosts.allow
306
		cat <<EOF > /etc/hosts.allow
305
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
307
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
306
sshd: ALL
308
sshd: ALL
307
ntpd: $PRIVATE_NETWORK_SHORT
309
ntpd: $PRIVATE_NETWORK_SHORT
308
EOF
310
EOF
309
# Alcasar Control Center
311
# Alcasar Control Center
310
		echo "$VERSION du $INSTALL_DATE" > /var/www/html/VERSION; chown apache:apache /var/www/html/VERSION
312
		echo "$VERSION du $INSTALL_DATE" > /var/www/html/VERSION; chown apache:apache /var/www/html/VERSION
311
		$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
313
		$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
312
		FIC_MOD_SSL=`find /etc/httpd/modules.d/ -type f -name *mod_ssl.conf`
314
		FIC_MOD_SSL=`find /etc/httpd/modules.d/ -type f -name *mod_ssl.conf`
313
		$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" $FIC_MOD_SSL
315
		$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" $FIC_MOD_SSL
314
		$SED "/127.0.0.1/!s?Allow from .*?Allow from $PRIVATE_NETWORK_MASK?g" /etc/httpd/conf/webapps.d/alcasar.conf
316
		$SED "/127.0.0.1/!s?Allow from .*?Allow from $PRIVATE_NETWORK_MASK?g" /etc/httpd/conf/webapps.d/alcasar.conf
315
# Dialup_Admin
317
# Dialup_Admin
316
		$SED "s?^nas1_name:.*?nas1_name: alcasar-$ORGANISME?g" /etc/freeradius-web/naslist.conf
318
		$SED "s?^nas1_name:.*?nas1_name: alcasar-$ORGANISME?g" /etc/freeradius-web/naslist.conf
317
		$SED "s?^nas1_ip:.*?nas1_ip: $PRIVATE_IP?g" /etc/freeradius-web/naslist.conf
319
		$SED "s?^nas1_ip:.*?nas1_ip: $PRIVATE_IP?g" /etc/freeradius-web/naslist.conf
318
# coova
320
# coova
319
		$SED "s?ifconfig.*?ifconfig \$HS_LANIF $PRIVATE_IP?g" /etc/init.d/chilli
321
		$SED "s?ifconfig.*?ifconfig \$HS_LANIF $PRIVATE_IP?g" /etc/init.d/chilli
320
		$SED "s?^net.*?net\t\t$PRIVATE_NETWORK_MASK?g" /etc/chilli.conf
322
		$SED "s?^net.*?net\t\t$PRIVATE_NETWORK_MASK?g" /etc/chilli.conf
321
		$SED "s?^dns1.*?dns1\t\t$PRIVATE_IP?g" /etc/chilli.conf
323
		$SED "s?^dns1.*?dns1\t\t$PRIVATE_IP?g" /etc/chilli.conf
322
		$SED "s?^dns2.*?dns2\t\t$PRIVATE_IP?g" /etc/chilli.conf
324
		$SED "s?^dns2.*?dns2\t\t$PRIVATE_IP?g" /etc/chilli.conf
323
		$SED "s?^uamlisten.*?uamlisten\t$PRIVATE_IP?g" /etc/chilli.conf
325
		$SED "s?^uamlisten.*?uamlisten\t$PRIVATE_IP?g" /etc/chilli.conf
324
		$SED "s?^\$organisme = .*?\$organisme = \"$ORGANISME\";?g" /var/www/html/intercept.php /var/www/html/status.php
326
		$SED "s?^\$organisme = .*?\$organisme = \"$ORGANISME\";?g" /var/www/html/intercept.php /var/www/html/status.php
325
# dhcp (coova + dnsmasq)
327
# dhcp (coova + dnsmasq)
326
		$DIR_SBIN/alcasar-dhcp.sh -$DHCP_mode
328
		$DIR_SBIN/alcasar-dhcp.sh -$DHCP_mode
327
# awstat
329
# awstat
328
		$SED "s?^HostAliases=.*?HostAliases=\"$PRIVATE_IP\"?g" /etc/awstats/awstats.conf
330
		$SED "s?^HostAliases=.*?HostAliases=\"$PRIVATE_IP\"?g" /etc/awstats/awstats.conf
329
# dnsmasq
331
# dnsmasq
330
		$SED "/127.0.0.1/!s?^listen-address=.*?listen-address=$PRIVATE_IP?g" /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf
332
		$SED "/127.0.0.1/!s?^listen-address=.*?listen-address=$PRIVATE_IP?g" /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf
331
		for i in /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf
333
		for i in /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf
332
		do
334
		do
333
			$SED "/^server=/d" $i
335
			$SED "/^server=/d" $i
334
			echo "server=$DNS1" >> $i
336
			echo "server=$DNS1" >> $i
335
			echo "server=$DNS2" >> $i
337
			echo "server=$DNS2" >> $i
336
		done
338
		done
337
		$SED "s?^dhcp-option=option:router.*?dhcp-option=option:router,$PRIVATE_IP?g" /etc/dnsmasq.conf
339
		$SED "s?^dhcp-option=option:router.*?dhcp-option=option:router,$PRIVATE_IP?g" /etc/dnsmasq.conf
338
# DG + BL
340
# DG + BL
339
		$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" /etc/dansguardian/dansguardian.conf
341
		$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" /etc/dansguardian/dansguardian.conf
340
# Watchdog
342
# Watchdog
341
		$SED "s?^PRIVATE_IP=.*?PRIVATE_IP=\"$PRIVATE_IP\"?g" $DIR_BIN/alcasar-watchdog.sh
343
		$SED "s?^PRIVATE_IP=.*?PRIVATE_IP=\"$PRIVATE_IP\"?g" $DIR_BIN/alcasar-watchdog.sh
342
# SSHD
344
# SSHD
343
		$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
345
		$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
344
		$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config
346
		$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config
345
# Prompts
347
# Prompts
346
		$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
348
		$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
347
# sudoers
349
# sudoers
348
		$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
350
		$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
349
# Services start
351
# Services start
350
		for i in network squid ntpd chilli httpd 
352
		for i in network squid ntpd chilli httpd 
351
		do
353
		do
352
			[ -e /etc/init.d/$i ] && /etc/init.d/$i start 2>/dev/null
354
			[ -e /etc/init.d/$i ] && /etc/init.d/$i start 2>/dev/null
353
		done
355
		done
354
# Start / Stop SSH Daemon
356
# Start / Stop SSH Daemon
355
		ssh_active=`grep SSH $CONF_FILE|cut -d"=" -f2`
357
		ssh_active=`grep SSH $CONF_FILE|cut -d"=" -f2`
356
		if [ $ssh_active = "on" ]
358
		if [ $ssh_active = "on" ]
357
		then
359
		then
358
			/sbin/chkconfig --add sshd
360
			/sbin/chkconfig --add sshd
359
			/etc/init.d/sshd start
361
			/etc/init.d/sshd start
360
		else
362
		else
361
			/sbin/chkconfig --del sshd
363
			/sbin/chkconfig --del sshd
362
		fi
364
		fi
363
# Reload BL (restart DG, dnsmasq & iptables)
365
# Reload BL (restart DG, dnsmasq & iptables)
364
		$DIR_SBIN/alcasar-bl.sh -reload
366
		$DIR_SBIN/alcasar-bl.sh -reload
365
		;;
367
		;;
366
	*)
368
	*)
367
		echo "Argument inconnu :$1";
369
		echo "Argument inconnu :$1";
368
		echo "$usage"
370
		echo "$usage"
369
		exit 1
371
		exit 1
370
		;;
372
		;;
371
esac
373
esac
372
 
374
 
373
 
375