Subversion Repositories ALCASAR

Rev

Rev 1317 | Rev 1342 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1317 Rev 1336
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1317 2014-03-17 20:26:51Z richard $ 
2
#  $Id: alcasar.sh 1336 2014-04-28 17:07:37Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
22
#
22
#
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, squid, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, squid, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
24
 
24
 
25
# Options :
25
# Options :
26
#       -i or --install
26
#       -i or --install
27
#       -u or --uninstall
27
#       -u or --uninstall
28
 
28
 
29
# Functions :
29
# Functions :
30
#	testing			: connectivity tests and downloading before intall
30
#	testing			: connectivity tests and downloading before intall
31
#	init			: Installation of RPM and scripts
31
#	init			: Installation of RPM and scripts
32
#	network			: Network parameters
32
#	network			: Network parameters
33
#	ACC			: ALCASAR Control Center installation
33
#	ACC			: ALCASAR Control Center installation
34
#	CA			: Certification Authority initialization
34
#	CA			: Certification Authority initialization
35
#	init_db			: Initilization of radius database managed with MariaDB
35
#	init_db			: Initilization of radius database managed with MariaDB
36
#	param_radius		: FreeRadius initialisation
36
#	param_radius		: FreeRadius initialisation
37
#	param_web_radius	: copy ans modifiy original "freeradius web" in ACC
37
#	param_web_radius	: copy ans modifiy original "freeradius web" in ACC
38
#	param_chilli		: coovachilli initialisation (+authentication page)
38
#	param_chilli		: coovachilli initialisation (+authentication page)
39
#	param_squid		: Squid cache proxy configuration
39
#	param_squid		: Squid cache proxy configuration
40
#	param_dansguardian	: DansGuardian filtering HTTP proxy configuration
40
#	param_dansguardian	: DansGuardian filtering HTTP proxy configuration
41
#	antivirus		: HAVP + libclamav configuration
41
#	antivirus		: HAVP + libclamav configuration
42
#	param_nfsen		: Configuration du grapheur nfsen pour apache 
42
#	param_nfsen		: Configuration du grapheur nfsen pour apache 
43
#	dnsmasq			: Name server configuration
43
#	dnsmasq			: Name server configuration
44
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
44
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	cron			: Logs export + watchdog + connexion statistics
45
#	cron			: Logs export + watchdog + connexion statistics
46
#	fail2ban		: Fail2ban installation and configuration
46
#	fail2ban		: Fail2ban installation and configuration
47
#	post_install		: Security, log rotation, etc.
47
#	post_install		: Security, log rotation, etc.
48
 
48
 
49
DATE=`date '+%d %B %Y - %Hh%M'`
49
DATE=`date '+%d %B %Y - %Hh%M'`
50
DATE_SHORT=`date '+%d/%m/%Y'`
50
DATE_SHORT=`date '+%d/%m/%Y'`
51
Lang=`echo $LANG|cut -c 1-2`
51
Lang=`echo $LANG|cut -c 1-2`
52
# ******* Files parameters - paramètres fichiers *********
52
# ******* Files parameters - paramètres fichiers *********
53
DIR_INSTALL=`pwd`				# current directory 
53
DIR_INSTALL=`pwd`				# current directory 
54
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
54
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
55
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
55
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
56
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
56
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
57
DIR_WEB="/var/www/html"				# directory of APACHE
57
DIR_WEB="/var/www/html"				# directory of APACHE
58
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
58
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
59
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
59
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
60
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
60
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
61
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
61
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
62
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
62
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
63
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
63
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
64
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
64
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
65
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
65
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
66
# ******* DBMS parameters - paramètres SGBD ********
66
# ******* DBMS parameters - paramètres SGBD ********
67
DB_RADIUS="radius"				# database name used by FreeRadius server
67
DB_RADIUS="radius"				# database name used by FreeRadius server
68
DB_USER="radius"				# user name allows to request the users database
68
DB_USER="radius"				# user name allows to request the users database
69
# ******* Network parameters - paramètres réseau *******
69
# ******* Network parameters - paramètres réseau *******
70
HOSTNAME="alcasar"				# 
70
HOSTNAME="alcasar"				# 
71
DOMAIN="localdomain"				# default local domain
71
DOMAIN="localdomain"				# default local domain
72
EXTIF="eth0"					# ETH0 is connected to the ISP broadband modem/router (In France : Box-FAI )
72
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`	# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
-
 
73
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF"|cut -d" " -f2|tr -d ":"`		# INTIF is connected to the consultation network
73
MTU="1500"
74
MTU="1500"
74
ETHTOOL_OPTS='"autoneg off speed 100 duplex full"'
75
ETHTOOL_OPTS='"autoneg off speed 100 duplex full"'
75
INTIF="eth1"					# ETH1 is connected to the consultation network
-
 
76
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
76
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
77
# ****** Paths - chemin des commandes *******
77
# ****** Paths - chemin des commandes *******
78
SED="/bin/sed -i"
78
SED="/bin/sed -i"
79
# ****************** End of global parameters *********************
79
# ****************** End of global parameters *********************
80
 
80
 
81
license ()
81
license ()
82
{
82
{
83
	if [ $Lang == "fr" ]
83
	if [ $Lang == "fr" ]
84
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
84
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
85
	else cat $DIR_INSTALL/gpl-3.0.txt | more
85
	else cat $DIR_INSTALL/gpl-3.0.txt | more
86
	fi
86
	fi
87
	echo "Taper sur Entrée pour continuer !"
87
	echo "Taper sur Entrée pour continuer !"
88
	echo "Enter to continue."
88
	echo "Enter to continue."
89
	read a
89
	read a
90
}
90
}
91
 
91
 
92
header_install ()
92
header_install ()
93
{
93
{
94
	clear
94
	clear
95
	echo "-----------------------------------------------------------------------------"
95
	echo "-----------------------------------------------------------------------------"
96
	echo "                     ALCASAR V$VERSION Installation"
96
	echo "                     ALCASAR V$VERSION Installation"
97
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
97
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
98
	echo "-----------------------------------------------------------------------------"
98
	echo "-----------------------------------------------------------------------------"
99
} # End of header_install ()
99
} # End of header_install ()
100
 
100
 
101
#Launch network service (useful only when Mageia is running in SafeFail mode)
-
 
102
service network start
-
 
103
 
101
 
104
##################################################################
102
##################################################################
105
##			Function "testing"			##
103
##			Function "testing"			##
106
## - Test of Internet access					##
104
## - Test of Internet access					##
107
##################################################################
105
##################################################################
108
testing ()
106
testing ()
109
{
107
{
110
	if [ $Lang == "fr" ]
108
	if [ $Lang == "fr" ]
111
		then echo -n "Tests des paramètres réseau : "
109
		then echo -n "Tests des paramètres réseau : "
112
		else echo -n "Network parameters tests : "
110
		else echo -n "Network parameters tests : "
113
	fi
111
	fi
114
# We test eth0 config files
112
# We test EXTIF config files
-
 
113
 
115
	PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
114
	PUBLIC_IP=`grep IPADDR /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
116
	PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
115
	PUBLIC_GATEWAY=`grep GATEWAY /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`
117
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
116
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
118
		then
117
		then
119
		if [ $Lang == "fr" ]
118
		if [ $Lang == "fr" ]
120
		then 
119
		then 
121
			echo "Échec"
120
			echo "Échec"
122
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
121
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
123
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
122
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
124
			echo "Appliquez les changements : 'service network restart'"
123
			echo "Appliquez les changements : 'service network restart'"
125
		else
124
		else
126
			echo "Failed"
125
			echo "Failed"
127
			echo "The Internet connected network card ($EXTIF) isn't well configured."
126
			echo "The Internet connected network card ($EXTIF) isn't well configured."
128
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
127
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
129
			echo "Apply the new configuration 'service network restart'"
128
			echo "Apply the new configuration 'service network restart'"
130
		fi
129
		fi
131
		echo "DEVICE=$EXTIF"
130
		echo "DEVICE=$EXTIF"
132
		echo "IPADDR="
131
		echo "IPADDR="
133
		echo "NETMASK="
132
		echo "NETMASK="
134
		echo "GATEWAY="
133
		echo "GATEWAY="
135
		echo "DNS1="
134
		echo "DNS1="
136
		echo "DNS2="
135
		echo "DNS2="
137
		echo "ONBOOT=yes"
136
		echo "ONBOOT=yes"
138
		exit 0
137
		exit 0
139
	fi
138
	fi
140
	echo -n "."
139
	echo -n "."
141
# We test the Ethernet links state
140
# We test the Ethernet links state
142
	for i in $EXTIF $INTIF
141
	for i in $EXTIF $INTIF
143
	do
142
	do
144
		/sbin/ip link set $i up
143
		/sbin/ip link set $i up
145
		sleep 3
144
		sleep 3
146
		CMD=`/usr/sbin/ethtool $i |egrep 'Link detected'| awk '{print $NF}'`
145
		CMD=`/usr/sbin/ethtool $i |egrep 'Link detected'| awk '{print $NF}'`
147
		CMD2=`/sbin/mii-tool $i | grep link | awk '{print $NF}'`
146
		CMD2=`/sbin/mii-tool $i | grep link | awk '{print $NF}'`
148
		if [ $CMD != "yes" ] && [ $CMD2 != "ok" ]
147
		if [ $CMD != "yes" ] && [ $CMD2 != "ok" ]
149
			then
148
			then
150
			if [ $Lang == "fr" ]
149
			if [ $Lang == "fr" ]
151
			then 
150
			then 
152
				echo "Échec"
151
				echo "Échec"
153
				echo "Le lien réseau de la carte $i n'est pas actif."
152
				echo "Le lien réseau de la carte $i n'est pas actif."
154
				echo "Réglez ce problème puis relancez ce script."
153
				echo "Réglez ce problème puis relancez ce script."
155
			else
154
			else
156
				echo "Failed"
155
				echo "Failed"
157
				echo "The link state of $i interface id down."
156
				echo "The link state of $i interface id down."
158
				echo "Resolv this problem, then restart this script."
157
				echo "Resolv this problem, then restart this script."
159
			fi
158
			fi
160
			exit 0
159
			exit 0
161
		fi
160
		fi
162
	echo -n "."
161
	echo -n "."
163
	done
162
	done
164
# On teste la présence d'un routeur par défaut (Box FAI)
163
# On teste la présence d'un routeur par défaut (Box FAI)
165
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
164
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
166
		if [ $Lang == "fr" ]
165
		if [ $Lang == "fr" ]
167
		then 
166
		then 
168
			echo "Échec"
167
			echo "Échec"
169
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
168
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
170
			echo "Réglez ce problème puis relancez ce script."
169
			echo "Réglez ce problème puis relancez ce script."
171
		else
170
		else
172
			echo "Failed"
171
			echo "Failed"
173
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
172
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
174
			echo "Resolv this problem, then restart this script."
173
			echo "Resolv this problem, then restart this script."
175
		fi
174
		fi
176
		exit 0
175
		exit 0
177
	fi
176
	fi
178
	echo -n "."
177
	echo -n "."
179
# On traite le cas où l'interface configurée lors de l'installation est "eth1" au lieu de "eth0" (mystère sur certaines versions de BIOS et de VirtualBox)
-
 
180
	if [ `ip route list|grep ^default|grep -c eth1` -eq "1" ] ; then
-
 
181
		if [ $Lang == "fr" ]
-
 
182
			then echo "La configuration des cartes réseau va être corrigée."
-
 
183
			else echo "The Ethernet card configuration will be corrected."
-
 
184
		fi
-
 
185
		/etc/init.d/network stop
-
 
186
		mv -f /etc/sysconfig/network-scripts/ifcfg-eth1 /etc/sysconfig/network-scripts/ifcfg-eth0
-
 
187
		$SED "s?eth1?eth0?g" /etc/sysconfig/network-scripts/ifcfg-eth0
-
 
188
		/etc/init.d/network start
-
 
189
		echo 0 > /proc/sys/net/ipv4/conf/all/log_martians
-
 
190
		sleep 2
-
 
191
		if [ $Lang == "fr" ]
-
 
192
			then echo "Configuration corrigée"
-
 
193
			else echo "Configuration updated"
-
 
194
		fi
-
 
195
		sleep 2
-
 
196
		if [ $Lang == "fr" ]
-
 
197
			then echo "Vous pouvez relancer ce script."
-
 
198
			else echo "You can restart this script."
-
 
199
		fi
-
 
200
		exit 0
-
 
201
	fi
-
 
202
	echo -n "."
-
 
203
# On teste le lien vers le routeur par defaut
178
# On teste le lien vers le routeur par defaut
204
	IP_GW=`ip route list|grep ^default|cut -d" " -f3`
179
	IP_GW=`ip route list|grep ^default|cut -d" " -f3`
205
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $IP_GW|grep response|cut -d" " -f2`
180
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $IP_GW|grep response|cut -d" " -f2`
206
	if [ $(expr $arp_reply) -eq 0 ]
181
	if [ $(expr $arp_reply) -eq 0 ]
207
	       	then
182
	       	then
208
		if [ $Lang == "fr" ]
183
		if [ $Lang == "fr" ]
209
		then 
184
		then 
210
			echo "Échec"
185
			echo "Échec"
211
			echo "Le routeur de site ou la Box Internet ($IP_GW) ne répond pas."
186
			echo "Le routeur de site ou la Box Internet ($IP_GW) ne répond pas."
212
			echo "Réglez ce problème puis relancez ce script."
187
			echo "Réglez ce problème puis relancez ce script."
213
		else
188
		else
214
			echo "Failed"
189
			echo "Failed"
215
			echo "The Internet gateway doesn't answered"
190
			echo "The Internet gateway doesn't answered"
216
			echo "Resolv this problem, then restart this script."
191
			echo "Resolv this problem, then restart this script."
217
		fi
192
		fi
218
		exit 0
193
		exit 0
219
	fi
194
	fi
220
	echo -n "."
195
	echo -n "."
221
# On teste la connectivité Internet
196
# On teste la connectivité Internet
222
	rm -rf /tmp/con_ok.html
197
	rm -rf /tmp/con_ok.html
223
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
198
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
224
	if [ ! -e /tmp/con_ok.html ]
199
	if [ ! -e /tmp/con_ok.html ]
225
	then
200
	then
226
		if [ $Lang == "fr" ]
201
		if [ $Lang == "fr" ]
227
		then 
202
		then 
228
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
203
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
229
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
204
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
230
			echo "Vérifiez la validité des adresses IP des DNS."
205
			echo "Vérifiez la validité des adresses IP des DNS."
231
		else
206
		else
232
			echo "The Internet connection try failed (google.fr)."
207
			echo "The Internet connection try failed (google.fr)."
233
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
208
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
234
			echo "Verify the DNS IP addresses"
209
			echo "Verify the DNS IP addresses"
235
		fi
210
		fi
236
		exit 0
211
		exit 0
237
	fi
212
	fi
238
	rm -rf /tmp/con_ok.html
213
	rm -rf /tmp/con_ok.html
239
	echo ". : ok"
214
	echo ". : ok"
240
} # end of testing
215
} # end of testing
241
 
216
 
242
##################################################################
217
##################################################################
243
##			Function "init"				##
218
##			Function "init"				##
244
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
219
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
245
## - Installation et modification des scripts du portail	##
220
## - Installation et modification des scripts du portail	##
246
##################################################################
221
##################################################################
247
init ()
222
init ()
248
{
223
{
249
	if [ "$mode" != "update" ]
224
	if [ "$mode" != "update" ]
250
	then
225
	then
251
# On affecte le nom d'organisme
226
# On affecte le nom d'organisme
252
		header_install
227
		header_install
253
		ORGANISME=!
228
		ORGANISME=!
254
		PTN='^[a-zA-Z0-9-]*$'
229
		PTN='^[a-zA-Z0-9-]*$'
255
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
230
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
256
                do
231
                do
257
			if [ $Lang == "fr" ]
232
			if [ $Lang == "fr" ]
258
			       	then echo -n "Entrez le nom de votre organisme : "
233
			       	then echo -n "Entrez le nom de votre organisme : "
259
				else echo -n "Enter the name of your organism : "
234
				else echo -n "Enter the name of your organism : "
260
			fi
235
			fi
261
			read ORGANISME
236
			read ORGANISME
262
			if [ "$ORGANISME" == "" ]
237
			if [ "$ORGANISME" == "" ]
263
				then
238
				then
264
				ORGANISME=!
239
				ORGANISME=!
265
			fi
240
			fi
266
		done
241
		done
267
	fi
242
	fi
268
# On crée aléatoirement les mots de passe et les secrets partagés
243
# On crée aléatoirement les mots de passe et les secrets partagés
269
	rm -f $PASSWD_FILE
244
	rm -f $PASSWD_FILE
270
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# mot de passe de protection du menu Grub
245
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# mot de passe de protection du menu Grub
271
	echo -n "Password to protect the boot menu (GRUB) : " > $PASSWD_FILE
246
	echo -n "Password to protect the boot menu (GRUB) : " > $PASSWD_FILE
272
	echo "$grubpwd" >> $PASSWD_FILE
247
	echo "$grubpwd" >> $PASSWD_FILE
273
	md5_grubpwd=`/usr/bin/md5pass $grubpwd`
248
	md5_grubpwd=`/usr/bin/md5pass $grubpwd`
274
	$SED "/^password.*/d" /boot/grub/menu.lst
249
	$SED "/^password.*/d" /boot/grub/menu.lst
275
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
250
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
276
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# mot de passe de l'administrateur Mysqld
251
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# mot de passe de l'administrateur Mysqld
277
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
252
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
278
	echo "root / $mysqlpwd" >> $PASSWD_FILE
253
	echo "root / $mysqlpwd" >> $PASSWD_FILE
279
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# mot de passe de l'utilisateur Mysqld (utilisé par freeradius)
254
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# mot de passe de l'utilisateur Mysqld (utilisé par freeradius)
280
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
255
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
281
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
256
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
282
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# secret partagé entre intercept.php et coova-chilli
257
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# secret partagé entre intercept.php et coova-chilli
283
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
258
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
284
	echo "$secretuam" >> $PASSWD_FILE
259
	echo "$secretuam" >> $PASSWD_FILE
285
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# secret partagé entre coova-chilli et FreeRadius
260
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`	# secret partagé entre coova-chilli et FreeRadius
286
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
261
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
287
	echo "$secretradius" >> $PASSWD_FILE
262
	echo "$secretradius" >> $PASSWD_FILE
288
	chmod 640 $PASSWD_FILE
263
	chmod 640 $PASSWD_FILE
289
# Scripts and conf files copy 
264
# Scripts and conf files copy 
290
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
265
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
291
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
266
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
292
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
267
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
293
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
268
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
294
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
269
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
295
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
270
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
296
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
271
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
297
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
272
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
298
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
273
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
299
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
274
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
300
# generate central conf file
275
# generate central conf file
301
	cat <<EOF > $CONF_FILE
276
	cat <<EOF > $CONF_FILE
302
##########################################
277
##########################################
303
##                                      ##
278
##                                      ##
304
##          ALCASAR Parameters          ##
279
##          ALCASAR Parameters          ##
305
##                                      ##
280
##                                      ##
306
##########################################
281
##########################################
307
 
282
 
308
INSTALL_DATE=$DATE
283
INSTALL_DATE=$DATE
309
VERSION=$VERSION
284
VERSION=$VERSION
310
ORGANISM=$ORGANISME
285
ORGANISM=$ORGANISME
311
DOMAIN=$DOMAIN
286
DOMAIN=$DOMAIN
312
EOF
287
EOF
313
	chmod o-rwx $CONF_FILE
288
	chmod o-rwx $CONF_FILE
314
} # End of init ()
289
} # End of init ()
315
 
290
 
316
##################################################################
291
##################################################################
317
##			Function "network"			##
292
##			Function "network"			##
318
## - Définition du plan d'adressage du réseau de consultation	##
293
## - Définition du plan d'adressage du réseau de consultation	##
319
## - Nommage DNS du système 					##
294
## - Nommage DNS du système 					##
320
## - Configuration de l'interface eth1 (réseau de consultation)	##
295
## - Configuration de l'interface INTIF (réseau de consultation)##
321
## - Modification du fichier /etc/hosts				##
296
## - Modification du fichier /etc/hosts				##
322
## - Configuration du serveur de temps (NTP)			##
297
## - Configuration du serveur de temps (NTP)			##
323
## - Renseignement des fichiers hosts.allow et hosts.deny	##
298
## - Renseignement des fichiers hosts.allow et hosts.deny	##
324
##################################################################
299
##################################################################
325
network ()
300
network ()
326
{
301
{
327
	header_install
302
	header_install
328
	if [ "$mode" != "update" ]
303
	if [ "$mode" != "update" ]
329
		then
304
		then
330
		if [ $Lang == "fr" ]
305
		if [ $Lang == "fr" ]
331
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
306
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
332
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
307
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
333
		fi
308
		fi
334
		response=0
309
		response=0
335
		PTN='^[oOyYnN]$'
310
		PTN='^[oOyYnN]$'
336
		until [[ $(expr $response : $PTN) -gt 0 ]]
311
		until [[ $(expr $response : $PTN) -gt 0 ]]
337
		do
312
		do
338
			if [ $Lang == "fr" ]
313
			if [ $Lang == "fr" ]
339
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
314
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
340
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
315
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
341
			fi
316
			fi
342
			read response
317
			read response
343
		done
318
		done
344
		if [ "$response" = "n" ] || [ "$response" = "N" ]
319
		if [ "$response" = "n" ] || [ "$response" = "N" ]
345
		then
320
		then
346
			PRIVATE_IP_MASK="0"
321
			PRIVATE_IP_MASK="0"
347
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
322
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
348
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
323
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
349
			do
324
			do
350
				if [ $Lang == "fr" ]
325
				if [ $Lang == "fr" ]
351
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
326
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
352
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
327
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
353
				fi
328
				fi
354
				read PRIVATE_IP_MASK
329
				read PRIVATE_IP_MASK
355
			done
330
			done
356
		else
331
		else
357
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
332
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
358
		fi
333
		fi
359
	else
334
	else
360
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
335
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
361
		rm -rf conf/etc/alcasar.conf
336
		rm -rf conf/etc/alcasar.conf
362
	fi
337
	fi
363
# Define LAN side global parameters
338
# Define LAN side global parameters
364
	hostname $HOSTNAME.$DOMAIN
339
	hostname $HOSTNAME.$DOMAIN
365
	echo $HOSTNAME.$DOMAIN > /etc/hostname
340
	echo $HOSTNAME.$DOMAIN > /etc/hostname
366
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
341
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
367
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
342
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
368
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
343
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
369
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
344
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
370
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
345
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
371
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`	# ie.: 2=classe B, 3=classe C
346
	classe=$((PRIVATE_PREFIX/8)); classe_sup=`expr $classe + 1`; classe_sup_sup=`expr $classe + 2`	# ie.: 2=classe B, 3=classe C
372
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
347
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
373
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
348
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
374
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f$classe_sup`			# last octet of LAN address
349
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f$classe_sup`			# last octet of LAN address
375
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`			# last octet of LAN broadcast
350
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f$classe_sup`			# last octet of LAN broadcast
376
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`		# First network address (ex.: 192.168.182.1)
351
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`		# First network address (ex.: 192.168.182.1)
377
	PRIVATE_SECOND_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 2`	# second network address (ex.: 192.168.182.2)
352
	PRIVATE_SECOND_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 2`	# second network address (ex.: 192.168.182.2)
378
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
353
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
379
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF (eth1)
354
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
380
# Define Internet parameters
355
# Define Internet parameters
381
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
356
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
382
	DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
357
	DNS1=`grep DNS1 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 1er DNS
383
	DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
358
	DNS2=`grep DNS2 /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2` 	# @ip 2ème DNS
384
	DNS1=${DNS1:=208.67.220.220}
359
	DNS1=${DNS1:=208.67.220.220}
385
	DNS2=${DNS2:=208.67.222.222}
360
	DNS2=${DNS2:=208.67.222.222}
386
	PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
361
	PUBLIC_NETMASK=`grep NETMASK /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF|cut -d"=" -f2`
387
	DEFAULT_PUBLIC_NETMASK=`ipcalc -m $PUBLIC_IP | cut -d"=" -f2`
362
	DEFAULT_PUBLIC_NETMASK=`ipcalc -m $PUBLIC_IP | cut -d"=" -f2`
388
	PUBLIC_NETMASK=${PUBLIC_NETMASK:=$DEFAULT_PUBLIC_NETMASK}
363
	PUBLIC_NETMASK=${PUBLIC_NETMASK:=$DEFAULT_PUBLIC_NETMASK}
389
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
364
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
390
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
365
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
391
	echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
366
	echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
392
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
367
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
393
	echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
368
	echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
394
	echo "DNS1=$DNS1" >> $CONF_FILE
369
	echo "DNS1=$DNS1" >> $CONF_FILE
395
	echo "DNS2=$DNS2" >> $CONF_FILE
370
	echo "DNS2=$DNS2" >> $CONF_FILE
396
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
371
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
397
	echo "DHCP=full" >> $CONF_FILE
372
	echo "DHCP=full" >> $CONF_FILE
398
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
373
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
399
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
374
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
400
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
375
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
401
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
376
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
402
# config network
377
# config network
403
	cat <<EOF > /etc/sysconfig/network
378
	cat <<EOF > /etc/sysconfig/network
404
NETWORKING=yes
379
NETWORKING=yes
405
HOSTNAME="$HOSTNAME.$DOMAIN"
380
HOSTNAME="$HOSTNAME.$DOMAIN"
406
FORWARD_IPV4=true
381
FORWARD_IPV4=true
407
EOF
382
EOF
408
# config /etc/hosts
383
# config /etc/hosts
409
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
384
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
410
	cat <<EOF > /etc/hosts
385
	cat <<EOF > /etc/hosts
411
127.0.0.1	localhost
386
127.0.0.1	localhost
412
$PRIVATE_IP	$HOSTNAME.$DOMAIN
387
$PRIVATE_IP	$HOSTNAME.$DOMAIN
413
EOF
388
EOF
414
# Config eth0 (Internet)
389
# Config EXTIF (Internet)
415
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
390
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
416
DEVICE=$EXTIF
391
DEVICE=$EXTIF
417
BOOTPROTO=static
392
BOOTPROTO=static
418
IPADDR=$PUBLIC_IP
393
IPADDR=$PUBLIC_IP
419
NETMASK=$PUBLIC_NETMASK
394
NETMASK=$PUBLIC_NETMASK
420
GATEWAY=$PUBLIC_GATEWAY
395
GATEWAY=$PUBLIC_GATEWAY
421
DNS1=127.0.0.1
396
DNS1=127.0.0.1
422
ONBOOT=yes
397
ONBOOT=yes
423
METRIC=10
398
METRIC=10
424
NOZEROCONF=yes
399
NOZEROCONF=yes
425
MII_NOT_SUPPORTED=yes
400
MII_NOT_SUPPORTED=yes
426
IPV6INIT=no
401
IPV6INIT=no
427
IPV6TO4INIT=no
402
IPV6TO4INIT=no
428
ACCOUNTING=no
403
ACCOUNTING=no
429
USERCTL=no
404
USERCTL=no
430
MTU=$MTU
405
MTU=$MTU
431
EOF
406
EOF
432
# Config eth1 (consultation LAN) in normal mode
407
# Config INTIF (consultation LAN) in normal mode
433
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
408
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
434
DEVICE=$INTIF
409
DEVICE=$INTIF
435
BOOTPROTO=static
410
BOOTPROTO=static
436
ONBOOT=yes
411
ONBOOT=yes
437
NOZEROCONF=yes
412
NOZEROCONF=yes
438
MII_NOT_SUPPORTED=yes
413
MII_NOT_SUPPORTED=yes
439
IPV6INIT=no
414
IPV6INIT=no
440
IPV6TO4INIT=no
415
IPV6TO4INIT=no
441
ACCOUNTING=no
416
ACCOUNTING=no
442
USERCTL=no
417
USERCTL=no
443
ETHTOOL_OPTS=$ETHTOOL_OPTS
418
ETHTOOL_OPTS=$ETHTOOL_OPTS
444
EOF
419
EOF
445
# Config of eth1 in bypass mode (see "alcasar-bypass.sh")
420
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
446
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
421
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
447
DEVICE=$INTIF
422
DEVICE=$INTIF
448
BOOTPROTO=static
423
BOOTPROTO=static
449
IPADDR=$PRIVATE_IP
424
IPADDR=$PRIVATE_IP
450
NETMASK=$PRIVATE_NETMASK
425
NETMASK=$PRIVATE_NETMASK
451
ONBOOT=yes
426
ONBOOT=yes
452
METRIC=10
427
METRIC=10
453
NOZEROCONF=yes
428
NOZEROCONF=yes
454
MII_NOT_SUPPORTED=yes
429
MII_NOT_SUPPORTED=yes
455
IPV6INIT=no
430
IPV6INIT=no
456
IPV6TO4INIT=no
431
IPV6TO4INIT=no
457
ACCOUNTING=no
432
ACCOUNTING=no
458
USERCTL=no
433
USERCTL=no
459
EOF
434
EOF
460
# Mise à l'heure du serveur
435
# Mise à l'heure du serveur
461
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
436
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
462
	cat <<EOF > /etc/ntp/step-tickers
437
	cat <<EOF > /etc/ntp/step-tickers
463
0.fr.pool.ntp.org	# adapt to your country
438
0.fr.pool.ntp.org	# adapt to your country
464
1.fr.pool.ntp.org
439
1.fr.pool.ntp.org
465
2.fr.pool.ntp.org
440
2.fr.pool.ntp.org
466
EOF
441
EOF
467
# Configuration du serveur de temps (sur lui même)
442
# Configuration du serveur de temps (sur lui même)
468
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
443
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
469
	cat <<EOF > /etc/ntp.conf
444
	cat <<EOF > /etc/ntp.conf
470
server 0.fr.pool.ntp.org	# adapt to your country
445
server 0.fr.pool.ntp.org	# adapt to your country
471
server 1.fr.pool.ntp.org
446
server 1.fr.pool.ntp.org
472
server 2.fr.pool.ntp.org
447
server 2.fr.pool.ntp.org
473
server 127.127.1.0   		# local clock si NTP internet indisponible ...
448
server 127.127.1.0   		# local clock si NTP internet indisponible ...
474
fudge 127.127.1.0 stratum 10
449
fudge 127.127.1.0 stratum 10
475
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
450
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
476
restrict 127.0.0.1
451
restrict 127.0.0.1
477
driftfile /var/lib/ntp/drift
452
driftfile /var/lib/ntp/drift
478
logfile /var/log/ntp.log
453
logfile /var/log/ntp.log
479
EOF
454
EOF
480
 
455
 
481
	chown -R ntp:ntp /var/lib/ntp
456
	chown -R ntp:ntp /var/lib/ntp
482
# Renseignement des fichiers hosts.allow et hosts.deny
457
# Renseignement des fichiers hosts.allow et hosts.deny
483
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
458
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
484
	cat <<EOF > /etc/hosts.allow
459
	cat <<EOF > /etc/hosts.allow
485
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
460
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
486
sshd: ALL
461
sshd: ALL
487
ntpd: $PRIVATE_NETWORK_SHORT
462
ntpd: $PRIVATE_NETWORK_SHORT
488
EOF
463
EOF
489
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
464
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
490
	cat <<EOF > /etc/hosts.deny
465
	cat <<EOF > /etc/hosts.deny
491
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
466
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
492
EOF
467
EOF
493
# Firewall config
468
# Firewall config
494
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
469
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
495
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
470
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh  $DIR_DEST_BIN/alcasar-iptables-bypass.sh
496
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
471
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
497
# create the filter exception file and ip_bloqued file
472
# create the filter exception file and ip_bloqued file
498
	touch $DIR_DEST_ETC/alcasar-filter-exceptions
473
	touch $DIR_DEST_ETC/alcasar-filter-exceptions
499
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
474
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
500
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
475
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
501
# load conntrack ftp module
476
# load conntrack ftp module
502
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
477
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
503
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
478
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
504
# load ipt_NETFLOW module
479
# load ipt_NETFLOW module
505
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
480
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
506
# 
481
# 
507
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
482
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
508
} # End of network ()
483
} # End of network ()
509
 
484
 
510
##################################################################
485
##################################################################
511
##			Function "ACC"				##
486
##			Function "ACC"				##
512
## - installation du centre de gestion (ALCASAR Control Center)	##
487
## - installation du centre de gestion (ALCASAR Control Center)	##
513
## - configuration du serveur web (Apache)			##
488
## - configuration du serveur web (Apache)			##
514
## - définition du 1er comptes de gestion 			##
489
## - définition du 1er comptes de gestion 			##
515
## - sécurisation des accès					##
490
## - sécurisation des accès					##
516
##################################################################
491
##################################################################
517
ACC ()
492
ACC ()
518
{
493
{
519
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
494
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
520
	mkdir $DIR_WEB
495
	mkdir $DIR_WEB
521
# Copie et configuration des fichiers du centre de gestion
496
# Copie et configuration des fichiers du centre de gestion
522
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
497
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
523
	echo "$VERSION" > $DIR_WEB/VERSION
498
	echo "$VERSION" > $DIR_WEB/VERSION
524
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
499
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
525
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
500
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
526
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
501
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
527
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
502
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
528
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
503
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
529
	chown -R apache:apache $DIR_WEB/*
504
	chown -R apache:apache $DIR_WEB/*
530
	for i in system_backup base logs/firewall logs/httpd logs/squid logs/security;
505
	for i in system_backup base logs/firewall logs/httpd logs/squid logs/security;
531
	do
506
	do
532
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
507
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
533
	done
508
	done
534
	chown -R root:apache $DIR_SAVE
509
	chown -R root:apache $DIR_SAVE
535
# Configuration et sécurisation php
510
# Configuration et sécurisation php
536
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
511
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
537
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
512
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
538
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
513
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
539
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
514
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
540
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
515
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
541
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
516
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
542
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
517
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
543
# Configuration et sécurisation Apache
518
# Configuration et sécurisation Apache
544
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
519
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
545
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
520
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
546
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
521
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
547
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
522
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
548
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
523
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
549
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
524
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
550
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
525
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
551
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
526
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
552
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
527
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
553
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
528
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
554
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
529
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
555
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
530
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
556
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
531
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
557
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
532
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
558
	FIC_MOD_SSL=`find /etc/httpd/modules.d/ -type f -name *mod_ssl.conf`
533
	FIC_MOD_SSL=`find /etc/httpd/modules.d/ -type f -name *mod_ssl.conf`
559
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" $FIC_MOD_SSL # On écoute en SSL que sur INTIF
534
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" $FIC_MOD_SSL # On écoute en SSL que sur INTIF
560
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /var/www/error/include/top.html
535
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /var/www/error/include/top.html
561
	[ -e /var/www/error/include/bottom.html.default ] || mv /var/www/error/include/bottom.html /var/www/error/include/bottom.html.default
536
	[ -e /var/www/error/include/bottom.html.default ] || mv /var/www/error/include/bottom.html /var/www/error/include/bottom.html.default
562
	cat <<EOF > /var/www/error/include/bottom.html
537
	cat <<EOF > /var/www/error/include/bottom.html
563
</body>
538
</body>
564
</html>
539
</html>
565
EOF
540
EOF
566
# Définition du premier compte lié au profil 'admin'
541
# Définition du premier compte lié au profil 'admin'
567
	header_install
542
	header_install
568
	if [ "$mode" = "install" ]
543
	if [ "$mode" = "install" ]
569
	then
544
	then
570
		admin_portal=!
545
		admin_portal=!
571
		PTN='^[a-zA-Z0-9-]*$'
546
		PTN='^[a-zA-Z0-9-]*$'
572
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
547
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
573
                	do
548
                	do
574
			header_install
549
			header_install
575
			if [ $Lang == "fr" ]
550
			if [ $Lang == "fr" ]
576
			then 
551
			then 
577
				echo ""
552
				echo ""
578
				echo "Définissez un premier compte d'administration du portail :"
553
				echo "Définissez un premier compte d'administration du portail :"
579
				echo
554
				echo
580
				echo -n "Nom : "
555
				echo -n "Nom : "
581
			else
556
			else
582
				echo ""
557
				echo ""
583
				echo "Define the first account allow to administrate the portal :"
558
				echo "Define the first account allow to administrate the portal :"
584
				echo
559
				echo
585
				echo -n "Account : "
560
				echo -n "Account : "
586
			fi
561
			fi
587
			read admin_portal
562
			read admin_portal
588
			if [ "$admin_portal" == "" ]
563
			if [ "$admin_portal" == "" ]
589
				then
564
				then
590
				admin_portal=!
565
				admin_portal=!
591
			fi
566
			fi
592
			done
567
			done
593
# Creation of keys file for the admin account ("admin")
568
# Creation of keys file for the admin account ("admin")
594
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
569
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
595
		mkdir -p $DIR_DEST_ETC/digest
570
		mkdir -p $DIR_DEST_ETC/digest
596
		chmod 755 $DIR_DEST_ETC/digest
571
		chmod 755 $DIR_DEST_ETC/digest
597
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
572
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
598
			do
573
			do
599
				/usr/sbin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
574
				/usr/sbin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
600
			done
575
			done
601
		$DIR_DEST_SBIN/alcasar-profil.sh --list
576
		$DIR_DEST_SBIN/alcasar-profil.sh --list
602
	fi
577
	fi
603
# synchronisation horaire
578
# synchronisation horaire
604
	ntpd -q -g &
579
	ntpd -q -g &
605
# Sécurisation du centre
580
# Sécurisation du centre
606
	rm -f /etc/httpd/conf/webapps.d/alcasar*
581
	rm -f /etc/httpd/conf/webapps.d/alcasar*
607
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
582
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
608
<Directory $DIR_ACC>
583
<Directory $DIR_ACC>
609
	SSLRequireSSL
584
	SSLRequireSSL
610
	AllowOverride None
585
	AllowOverride None
611
	Order deny,allow
586
	Order deny,allow
612
	Deny from all
587
	Deny from all
613
	Allow from 127.0.0.1
588
	Allow from 127.0.0.1
614
	Allow from $PRIVATE_NETWORK_MASK
589
	Allow from $PRIVATE_NETWORK_MASK
615
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
590
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
616
	require valid-user
591
	require valid-user
617
	AuthType digest
592
	AuthType digest
618
	AuthName $HOSTNAME.$DOMAIN
593
	AuthName $HOSTNAME.$DOMAIN
619
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
594
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
620
	AuthUserFile $DIR_DEST_ETC/digest/key_all
595
	AuthUserFile $DIR_DEST_ETC/digest/key_all
621
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
596
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
622
</Directory>
597
</Directory>
623
<Directory $DIR_ACC/admin>
598
<Directory $DIR_ACC/admin>
624
	SSLRequireSSL
599
	SSLRequireSSL
625
	AllowOverride None
600
	AllowOverride None
626
	Order deny,allow
601
	Order deny,allow
627
	Deny from all
602
	Deny from all
628
	Allow from 127.0.0.1
603
	Allow from 127.0.0.1
629
	Allow from $PRIVATE_NETWORK_MASK
604
	Allow from $PRIVATE_NETWORK_MASK
630
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
605
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
631
	require valid-user
606
	require valid-user
632
	AuthType digest
607
	AuthType digest
633
	AuthName $HOSTNAME.$DOMAIN
608
	AuthName $HOSTNAME.$DOMAIN
634
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
609
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
635
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
610
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
636
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
611
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
637
</Directory>
612
</Directory>
638
<Directory $DIR_ACC/manager>
613
<Directory $DIR_ACC/manager>
639
	SSLRequireSSL
614
	SSLRequireSSL
640
	AllowOverride None
615
	AllowOverride None
641
	Order deny,allow
616
	Order deny,allow
642
	Deny from all
617
	Deny from all
643
	Allow from 127.0.0.1
618
	Allow from 127.0.0.1
644
	Allow from $PRIVATE_NETWORK_MASK
619
	Allow from $PRIVATE_NETWORK_MASK
645
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
620
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
646
	require valid-user
621
	require valid-user
647
	AuthType digest
622
	AuthType digest
648
	AuthName $HOSTNAME.$DOMAIN
623
	AuthName $HOSTNAME.$DOMAIN
649
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
624
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
650
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
625
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
651
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
626
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
652
</Directory>
627
</Directory>
653
<Directory $DIR_ACC/backup>
628
<Directory $DIR_ACC/backup>
654
	SSLRequireSSL
629
	SSLRequireSSL
655
	AllowOverride None
630
	AllowOverride None
656
	Order deny,allow
631
	Order deny,allow
657
	Deny from all
632
	Deny from all
658
	Allow from 127.0.0.1
633
	Allow from 127.0.0.1
659
	Allow from $PRIVATE_NETWORK_MASK
634
	Allow from $PRIVATE_NETWORK_MASK
660
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
635
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
661
	require valid-user
636
	require valid-user
662
	AuthType digest
637
	AuthType digest
663
	AuthName $HOSTNAME.$DOMAIN
638
	AuthName $HOSTNAME.$DOMAIN
664
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
639
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
665
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
640
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
666
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
641
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
667
</Directory>
642
</Directory>
668
Alias /save/ "$DIR_SAVE/"
643
Alias /save/ "$DIR_SAVE/"
669
<Directory $DIR_SAVE>
644
<Directory $DIR_SAVE>
670
	SSLRequireSSL
645
	SSLRequireSSL
671
	Options Indexes
646
	Options Indexes
672
	Order deny,allow
647
	Order deny,allow
673
	Deny from all
648
	Deny from all
674
	Allow from 127.0.0.1
649
	Allow from 127.0.0.1
675
	Allow from $PRIVATE_NETWORK_MASK
650
	Allow from $PRIVATE_NETWORK_MASK
676
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
651
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
677
	require valid-user
652
	require valid-user
678
	AuthType digest
653
	AuthType digest
679
	AuthName $HOSTNAME.$DOMAIN
654
	AuthName $HOSTNAME.$DOMAIN
680
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
655
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
681
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
656
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
682
</Directory>
657
</Directory>
683
EOF
658
EOF
684
} # End of ACC()
659
} # End of ACC()
685
 
660
 
686
##########################################################################################
661
##########################################################################################
687
##				Fonction "CA"						##
662
##				Fonction "CA"						##
688
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
663
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
689
##########################################################################################
664
##########################################################################################
690
CA ()
665
CA ()
691
{
666
{
692
	$SED "s?ifcfg-eth.?ifcfg-$INTIF?g" $DIR_DEST_BIN/alcasar-CA.sh
667
	$SED "s?ifcfg-eth.?ifcfg-$INTIF?g" $DIR_DEST_BIN/alcasar-CA.sh
693
	$DIR_DEST_BIN/alcasar-CA.sh
668
	$DIR_DEST_BIN/alcasar-CA.sh
694
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
669
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
695
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
670
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
696
	$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
671
	$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
697
	$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
672
	$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
698
	$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
673
	$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
699
	chown -R root:apache /etc/pki
674
	chown -R root:apache /etc/pki
700
	chmod -R 750 /etc/pki
675
	chmod -R 750 /etc/pki
701
} # End CA ()
676
} # End CA ()
702
 
677
 
703
##########################################################################################
678
##########################################################################################
704
##			Fonction "init_db"						##
679
##			Fonction "init_db"						##
705
## - Initialisation de la base Mysql							##
680
## - Initialisation de la base Mysql							##
706
## - Affectation du mot de passe de l'administrateur (root)				##
681
## - Affectation du mot de passe de l'administrateur (root)				##
707
## - Suppression des bases et des utilisateurs superflus				##
682
## - Suppression des bases et des utilisateurs superflus				##
708
## - Création de la base 'radius'							##
683
## - Création de la base 'radius'							##
709
## - Installation du schéma de cette base						##
684
## - Installation du schéma de cette base						##
710
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
685
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
711
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
686
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
712
##########################################################################################
687
##########################################################################################
713
init_db ()
688
init_db ()
714
{
689
{
715
	mkdir -p /var/lib/mysql/.tmp
690
	mkdir -p /var/lib/mysql/.tmp
716
	chown -R mysql:mysql /var/lib/mysql/
691
	chown -R mysql:mysql /var/lib/mysql/
717
	[ -e /etc/my.cnf.rpmnew ] && mv /etc/my.cnf.rpmnew /etc/my.cnf		# prend en compte les migrations de MySQL
692
	[ -e /etc/my.cnf.rpmnew ] && mv /etc/my.cnf.rpmnew /etc/my.cnf		# prend en compte les migrations de MySQL
718
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
693
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
719
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
694
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
720
	/etc/init.d/mysqld start
695
	/etc/init.d/mysqld start
721
	sleep 4
696
	sleep 4
722
	mysqladmin -u root password $mysqlpwd
697
	mysqladmin -u root password $mysqlpwd
723
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
698
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
724
# Delete exemple databases if exist
699
# Delete exemple databases if exist
725
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;CONNECT mysql;DELETE from user where user='';FLUSH PRIVILEGES;" 
700
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;CONNECT mysql;DELETE from user where user='';FLUSH PRIVILEGES;" 
726
# Create 'radius' database
701
# Create 'radius' database
727
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
702
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
728
# Add an empty radius database structure
703
# Add an empty radius database structure
729
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
704
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
730
# modify the start script in order to close accounting connexion when the system is comming down or up
705
# modify the start script in order to close accounting connexion when the system is comming down or up
731
	[ -e /etc/init.d/mysqld.default ] || cp /etc/init.d/mysqld /etc/init.d/mysqld.default
706
	[ -e /etc/init.d/mysqld.default ] || cp /etc/init.d/mysqld /etc/init.d/mysqld.default
732
	$SED "/wait_for_pid created/a echo \"Flush ALCASAR open accounting sessions\"; /usr/local/sbin/alcasar-mysql.sh -acct_stop" /etc/init.d/mysqld
707
	$SED "/wait_for_pid created/a echo \"Flush ALCASAR open accounting sessions\"; /usr/local/sbin/alcasar-mysql.sh -acct_stop" /etc/init.d/mysqld
733
	$SED "/'stop')/a echo \"Flush ALCASAR open accounting sessions\"; /usr/local/sbin/alcasar-mysql.sh -acct_stop" /etc/init.d/mysqld
708
	$SED "/'stop')/a echo \"Flush ALCASAR open accounting sessions\"; /usr/local/sbin/alcasar-mysql.sh -acct_stop" /etc/init.d/mysqld
734
} # End init_db ()
709
} # End init_db ()
735
 
710
 
736
##########################################################################
711
##########################################################################
737
##			Fonction "param_radius"				##
712
##			Fonction "param_radius"				##
738
## - Paramètrage des fichiers de configuration FreeRadius		##
713
## - Paramètrage des fichiers de configuration FreeRadius		##
739
## - Affectation du secret partagé entre coova-chilli et freeradius	##
714
## - Affectation du secret partagé entre coova-chilli et freeradius	##
740
## - Modification de fichier de conf pour l'accès à Mysql		##
715
## - Modification de fichier de conf pour l'accès à Mysql		##
741
##########################################################################
716
##########################################################################
742
param_radius ()
717
param_radius ()
743
{
718
{
744
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
719
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
745
	chown -R radius:radius /etc/raddb
720
	chown -R radius:radius /etc/raddb
746
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
721
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
747
# Set radius.conf parameters
722
# Set radius.conf parameters
748
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
723
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
749
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
724
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
750
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
725
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
751
# remove the proxy function
726
# remove the proxy function
752
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
727
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
753
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
728
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
754
# remove EAP module
729
# remove EAP module
755
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
730
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
756
# listen on loopback (should be modified later if EAP enabled)
731
# listen on loopback (should be modified later if EAP enabled)
757
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
732
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
758
# enable the  SQL module (and SQL counter)
733
# enable the  SQL module (and SQL counter)
759
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
734
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
760
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
735
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
761
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
736
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
762
# remvove virtual server and copy our conf file
737
# remvove virtual server and copy our conf file
763
	rm -f /etc/raddb/sites-enabled/*
738
	rm -f /etc/raddb/sites-enabled/*
764
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
739
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
765
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
740
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
766
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
741
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
767
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
742
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
768
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
743
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
769
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
744
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
770
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
745
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
771
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
746
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
772
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
747
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
773
	cat << EOF > /etc/raddb/clients.conf
748
	cat << EOF > /etc/raddb/clients.conf
774
client 127.0.0.1 {
749
client 127.0.0.1 {
775
	secret = $secretradius
750
	secret = $secretradius
776
	shortname = localhost
751
	shortname = localhost
777
}
752
}
778
EOF
753
EOF
779
# sql.conf modification
754
# sql.conf modification
780
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
755
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
781
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
756
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
782
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
757
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
783
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
758
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
784
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
759
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
785
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
760
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
786
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
761
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
787
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
762
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
788
# counter.conf modification (change the Max-All-Session-Time counter)
763
# counter.conf modification (change the Max-All-Session-Time counter)
789
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
764
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
790
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
765
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
791
	chown -R radius:radius /etc/raddb/sql/mysql/*
766
	chown -R radius:radius /etc/raddb/sql/mysql/*
792
# insures that mysql is up before radius start
767
# insures that mysql is up before radius start
793
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
768
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
794
 
769
 
795
} # End param_radius ()
770
} # End param_radius ()
796
 
771
 
797
##########################################################################
772
##########################################################################
798
##			Function "param_web_radius"			##
773
##			Function "param_web_radius"			##
799
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
774
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
800
## - Création du lien vers la page de changement de mot de passe        ##
775
## - Création du lien vers la page de changement de mot de passe        ##
801
##########################################################################
776
##########################################################################
802
param_web_radius ()
777
param_web_radius ()
803
{
778
{
804
# copie de l'interface d'origine dans la structure Alcasar
779
# copie de l'interface d'origine dans la structure Alcasar
805
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
780
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
806
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
781
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
807
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
782
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
808
# copie des fichiers modifiés
783
# copie des fichiers modifiés
809
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
784
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
810
	chown -R apache:apache $DIR_ACC/manager/
785
	chown -R apache:apache $DIR_ACC/manager/
811
# Modification des fichiers de configuration
786
# Modification des fichiers de configuration
812
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
787
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
813
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
788
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
814
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
789
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
815
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
790
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
816
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
791
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
817
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
792
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
818
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
793
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
819
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
794
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
820
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
795
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
821
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
796
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
822
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
797
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
823
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
798
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
824
	cat <<EOF > /etc/freeradius-web/naslist.conf
799
	cat <<EOF > /etc/freeradius-web/naslist.conf
825
nas1_name: alcasar-$ORGANISME
800
nas1_name: alcasar-$ORGANISME
826
nas1_model: Portail captif
801
nas1_model: Portail captif
827
nas1_ip: $PRIVATE_IP
802
nas1_ip: $PRIVATE_IP
828
nas1_port_num: 0
803
nas1_port_num: 0
829
nas1_community: public
804
nas1_community: public
830
EOF
805
EOF
831
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
806
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
832
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
807
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
833
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
808
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
834
# Ajout du mappage des attributs chillispot
809
# Ajout du mappage des attributs chillispot
835
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
810
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
836
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
811
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
837
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
812
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
838
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
813
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
839
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
814
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
840
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
815
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
841
	chown -R apache:apache /etc/freeradius-web
816
	chown -R apache:apache /etc/freeradius-web
842
# Ajout de l'alias vers la page de "changement de mot de passe usager"
817
# Ajout de l'alias vers la page de "changement de mot de passe usager"
843
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
818
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
844
<Directory $DIR_WEB/pass>
819
<Directory $DIR_WEB/pass>
845
	SSLRequireSSL
820
	SSLRequireSSL
846
	AllowOverride None
821
	AllowOverride None
847
	Order deny,allow
822
	Order deny,allow
848
	Deny from all
823
	Deny from all
849
	Allow from 127.0.0.1
824
	Allow from 127.0.0.1
850
	Allow from $PRIVATE_NETWORK_MASK
825
	Allow from $PRIVATE_NETWORK_MASK
851
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
826
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
852
</Directory>
827
</Directory>
853
EOF
828
EOF
854
} # End of param_web_radius ()
829
} # End of param_web_radius ()
855
 
830
 
856
##################################################################################
831
##################################################################################
857
##			Fonction "param_chilli"					##
832
##			Fonction "param_chilli"					##
858
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
833
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
859
## - Paramètrage de la page d'authentification (intercept.php)			##
834
## - Paramètrage de la page d'authentification (intercept.php)			##
860
##################################################################################
835
##################################################################################
861
param_chilli ()
836
param_chilli ()
862
{
837
{
863
# init file creation
838
# init file creation
864
	[ -e /etc/init.d/chilli.default ] || cp /etc/init.d/chilli /etc/init.d/chilli.default
839
	[ -e /etc/init.d/chilli.default ] || cp /etc/init.d/chilli /etc/init.d/chilli.default
865
	cat <<EOF > /etc/init.d/chilli
840
	cat <<EOF > /etc/init.d/chilli
866
#!/bin/sh
841
#!/bin/sh
867
#
842
#
868
# chilli CoovaChilli init
843
# chilli CoovaChilli init
869
#
844
#
870
# chkconfig: 2345 65 35
845
# chkconfig: 2345 65 35
871
# description: CoovaChilli
846
# description: CoovaChilli
872
### BEGIN INIT INFO
847
### BEGIN INIT INFO
873
# Provides:       chilli
848
# Provides:       chilli
874
# Required-Start: network 
849
# Required-Start: network 
875
# Should-Start: 
850
# Should-Start: 
876
# Required-Stop:  network
851
# Required-Stop:  network
877
# Should-Stop: 
852
# Should-Stop: 
878
# Default-Start:  2 3 5
853
# Default-Start:  2 3 5
879
# Default-Stop:
854
# Default-Stop:
880
# Description:    CoovaChilli access controller
855
# Description:    CoovaChilli access controller
881
### END INIT INFO
856
### END INIT INFO
882
 
857
 
883
[ -f /usr/sbin/chilli ] || exit 0
858
[ -f /usr/sbin/chilli ] || exit 0
884
. /etc/init.d/functions
859
. /etc/init.d/functions
885
CONFIG=/etc/chilli.conf
860
CONFIG=/etc/chilli.conf
886
pidfile=/var/run/chilli.pid
861
pidfile=/var/run/chilli.pid
887
[ -f \$CONFIG ] || {
862
[ -f \$CONFIG ] || {
888
    echo "\$CONFIG Not found"
863
    echo "\$CONFIG Not found"
889
    exit 0
864
    exit 0
890
}
865
}
891
RETVAL=0
866
RETVAL=0
892
prog="chilli"
867
prog="chilli"
893
case \$1 in
868
case \$1 in
894
    start)
869
    start)
895
	if [ -f \$pidfile ] ; then 
870
	if [ -f \$pidfile ] ; then 
896
		gprintf "chilli is already running"
871
		gprintf "chilli is already running"
897
	else
872
	else
898
        	gprintf "Starting \$prog: "
873
        	gprintf "Starting \$prog: "
899
		rm -f /var/run/chilli* # cleaning
874
		rm -f /var/run/chilli* # cleaning
900
        	/sbin/modprobe tun >/dev/null 2>&1
875
        	/sbin/modprobe tun >/dev/null 2>&1
901
        	echo 1 > /proc/sys/net/ipv4/ip_forward
876
        	echo 1 > /proc/sys/net/ipv4/ip_forward
902
		[ -e /dev/net/tun ] || {
877
		[ -e /dev/net/tun ] || {
903
	    	(cd /dev; 
878
	    	(cd /dev; 
904
			mkdir net; 
879
			mkdir net; 
905
			cd net; 
880
			cd net; 
906
			mknod tun c 10 200)
881
			mknod tun c 10 200)
907
		}
882
		}
908
		ifconfig eth1 0.0.0.0
883
		ifconfig $INTIF 0.0.0.0
909
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
884
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
910
        	RETVAL=$?
885
        	RETVAL=$?
911
	fi
886
	fi
912
	;;
887
	;;
913
 
888
 
914
    reload)
889
    reload)
915
	killall -HUP chilli
890
	killall -HUP chilli
916
	;;
891
	;;
917
 
892
 
918
    restart)
893
    restart)
919
	\$0 stop
894
	\$0 stop
920
        sleep 2
895
        sleep 2
921
	\$0 start
896
	\$0 start
922
	;;
897
	;;
923
    
898
    
924
    status)
899
    status)
925
        status chilli
900
        status chilli
926
        RETVAL=0
901
        RETVAL=0
927
        ;;
902
        ;;
928
 
903
 
929
    stop)
904
    stop)
930
	if [ -f \$pidfile ] ; then  
905
	if [ -f \$pidfile ] ; then  
931
        	gprintf "Shutting down \$prog: "
906
        	gprintf "Shutting down \$prog: "
932
		killproc /usr/sbin/chilli
907
		killproc /usr/sbin/chilli
933
		RETVAL=\$?
908
		RETVAL=\$?
934
		[ \$RETVAL = 0 ] && rm -f $pidfile
909
		[ \$RETVAL = 0 ] && rm -f $pidfile
935
	else	
910
	else	
936
        	gprintf "chilli is not running"
911
        	gprintf "chilli is not running"
937
	fi
912
	fi
938
	;;
913
	;;
939
    
914
    
940
    *)
915
    *)
941
        echo "Usage: \$0 {start|stop|restart|reload|status}"
916
        echo "Usage: \$0 {start|stop|restart|reload|status}"
942
        exit 1
917
        exit 1
943
esac
918
esac
944
echo
919
echo
945
EOF
920
EOF
946
 
921
 
947
# conf file creation
922
# conf file creation
948
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
923
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
949
	cat <<EOF > /etc/chilli.conf
924
	cat <<EOF > /etc/chilli.conf
950
# coova config for ALCASAR
925
# coova config for ALCASAR
951
cmdsocket	/var/run/chilli.sock
926
cmdsocket	/var/run/chilli.sock
952
unixipc		chilli.eth1.ipc
927
unixipc		chilli.$INTIF.ipc
953
pidfile		/var/run/chilli.eth1.pid
928
pidfile		/var/run/chilli.$INTIF.pid
954
net		$PRIVATE_NETWORK_MASK
929
net		$PRIVATE_NETWORK_MASK
955
dhcpif		$INTIF
930
dhcpif		$INTIF
956
ethers		$DIR_DEST_ETC/alcasar-ethers
931
ethers		$DIR_DEST_ETC/alcasar-ethers
957
#nodynip
932
#nodynip
958
#statip
933
#statip
959
dynip		$PRIVATE_NETWORK_MASK
934
dynip		$PRIVATE_NETWORK_MASK
960
domain		$DOMAIN
935
domain		$DOMAIN
961
dns1		$PRIVATE_IP
936
dns1		$PRIVATE_IP
962
dns2		$PRIVATE_IP
937
dns2		$PRIVATE_IP
963
uamlisten	$PRIVATE_IP
938
uamlisten	$PRIVATE_IP
964
uamport		3990
939
uamport		3990
965
macauth
940
macauth
966
macpasswd	password
941
macpasswd	password
967
locationname	$HOSTNAME.$DOMAIN
942
locationname	$HOSTNAME.$DOMAIN
968
radiusserver1	127.0.0.1
943
radiusserver1	127.0.0.1
969
radiusserver2	127.0.0.1
944
radiusserver2	127.0.0.1
970
radiussecret	$secretradius
945
radiussecret	$secretradius
971
radiusauthport	1812
946
radiusauthport	1812
972
radiusacctport	1813
947
radiusacctport	1813
973
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
948
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
974
radiusnasid	$HOSTNAME.$DOMAIN
949
radiusnasid	$HOSTNAME.$DOMAIN
975
uamsecret	$secretuam
950
uamsecret	$secretuam
976
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
951
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
977
coaport		3799
952
coaport		3799
978
#conup		$DIR_DEST_BIN/alcasar-conup.sh
953
#conup		$DIR_DEST_BIN/alcasar-conup.sh
979
#condown	$DIR_DEST_BIN/alcasar-condown.sh
954
#condown	$DIR_DEST_BIN/alcasar-condown.sh
980
include		$DIR_DEST_ETC/alcasar-uamallowed
955
include		$DIR_DEST_ETC/alcasar-uamallowed
981
include		$DIR_DEST_ETC/alcasar-uamdomain
956
include		$DIR_DEST_ETC/alcasar-uamdomain
982
#dhcpgateway
957
#dhcpgateway
983
#dhcprelayagent
958
#dhcprelayagent
984
#dhcpgatewayport
959
#dhcpgatewayport
985
EOF
960
EOF
986
# create file for DHCP static ip. Reserve the second IP address for eth1 (the first one is for tun0)
961
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
987
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
962
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
988
# create files for trusted domains and urls
963
# create files for trusted domains and urls
989
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
964
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
990
	chown root:apache $DIR_DEST_ETC/alcasar-*
965
	chown root:apache $DIR_DEST_ETC/alcasar-*
991
	chmod 660 $DIR_DEST_ETC/alcasar-*
966
	chmod 660 $DIR_DEST_ETC/alcasar-*
992
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
967
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
993
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
968
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
994
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
969
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
995
# user 'chilli' creation (in order to run conup/off and up/down scripts
970
# user 'chilli' creation (in order to run conup/off and up/down scripts
996
	chilli_exist=`grep chilli /etc/passwd|wc -l`
971
	chilli_exist=`grep chilli /etc/passwd|wc -l`
997
	if [ "$chilli_exist" == "1" ]
972
	if [ "$chilli_exist" == "1" ]
998
	then
973
	then
999
	      userdel -r chilli 2>/dev/null
974
	      userdel -r chilli 2>/dev/null
1000
	fi
975
	fi
1001
	groupadd -f chilli
976
	groupadd -f chilli
1002
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
977
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1003
}  # End of param_chilli ()
978
}  # End of param_chilli ()
1004
 
979
 
1005
##########################################################
980
##########################################################
1006
##			Fonction "param_squid"		##
981
##			Fonction "param_squid"		##
1007
## - Paramètrage du proxy 'squid' en mode 'cache'	##
982
## - Paramètrage du proxy 'squid' en mode 'cache'	##
1008
## - Initialisation de la base de données  		##
983
## - Initialisation de la base de données  		##
1009
##########################################################
984
##########################################################
1010
param_squid ()
985
param_squid ()
1011
{
986
{
1012
# paramètrage de Squid (connecté en série derrière Dansguardian)
987
# paramètrage de Squid (connecté en série derrière Dansguardian)
1013
	[ -e /etc/squid/squid.conf.default  ] || cp /etc/squid/squid.conf /etc/squid/squid.conf.default
988
	[ -e /etc/squid/squid.conf.default  ] || cp /etc/squid/squid.conf /etc/squid/squid.conf.default
1014
# suppression des références 'localnet', 'icp', 'htcp' et 'always_direct'
989
# suppression des références 'localnet', 'icp', 'htcp' et 'always_direct'
1015
	$SED "/^acl localnet/d" /etc/squid/squid.conf
990
	$SED "/^acl localnet/d" /etc/squid/squid.conf
1016
	$SED "/^icp_access allow localnet/d" /etc/squid/squid.conf
991
	$SED "/^icp_access allow localnet/d" /etc/squid/squid.conf
1017
	$SED "/^icp_port 3130/d" /etc/squid/squid.conf
992
	$SED "/^icp_port 3130/d" /etc/squid/squid.conf
1018
	$SED "/^http_access allow localnet/d" /etc/squid/squid.conf
993
	$SED "/^http_access allow localnet/d" /etc/squid/squid.conf
1019
	$SED "/^htcp_access allow localnet/d" /etc/squid/squid.conf
994
	$SED "/^htcp_access allow localnet/d" /etc/squid/squid.conf
1020
	$SED "/^always_direct allow localnet/d" /etc/squid/squid.conf
995
	$SED "/^always_direct allow localnet/d" /etc/squid/squid.conf
1021
# mode 'proxy transparent local'
996
# mode 'proxy transparent local'
1022
	$SED "s?^http_port.*?http_port 127.0.0.1:3128 transparent?g" /etc/squid/squid.conf
997
	$SED "s?^http_port.*?http_port 127.0.0.1:3128 transparent?g" /etc/squid/squid.conf
1023
# Configuration du cache local
998
# Configuration du cache local
1024
	$SED "s?^#cache_dir.*?cache_dir ufs \/var\/spool\/squid 256 16 256?g" /etc/squid/squid.conf
999
	$SED "s?^#cache_dir.*?cache_dir ufs \/var\/spool\/squid 256 16 256?g" /etc/squid/squid.conf
1025
# désactivation des "access log"
1000
# désactivation des "access log"
1026
	echo '#Disable access log' >> /etc/squid/squid.conf
1001
	echo '#Disable access log' >> /etc/squid/squid.conf
1027
        echo "access_log none" >> /etc/squid/squid.conf
1002
        echo "access_log none" >> /etc/squid/squid.conf
1028
# anonymisation of squid version
1003
# anonymisation of squid version
1029
	echo "via off" >> /etc/squid/squid.conf
1004
	echo "via off" >> /etc/squid/squid.conf
1030
# remove the 'X_forwarded' http option
1005
# remove the 'X_forwarded' http option
1031
	echo "forwarded_for delete" >> /etc/squid/squid.conf
1006
	echo "forwarded_for delete" >> /etc/squid/squid.conf
1032
# linked squid output in HAVP input
1007
# linked squid output in HAVP input
1033
	echo "cache_peer 127.0.0.1 parent 8090 0 no-query default" >> /etc/squid/squid.conf
1008
	echo "cache_peer 127.0.0.1 parent 8090 0 no-query default" >> /etc/squid/squid.conf
1034
	echo "never_direct allow all" >> /etc/squid/squid.conf
1009
	echo "never_direct allow all" >> /etc/squid/squid.conf
1035
# avoid error messages on network interfaces state changes
1010
# avoid error messages on network interfaces state changes
1036
	$SED "s?^SQUID_AUTO_RELOAD.*?SQUID_AUTO_RELOAD=no?g" /etc/sysconfig/squid
1011
	$SED "s?^SQUID_AUTO_RELOAD.*?SQUID_AUTO_RELOAD=no?g" /etc/sysconfig/squid
1037
# reduce squid shutdown time (100 to 50)
1012
# reduce squid shutdown time (100 to 50)
1038
	$SED "s?^SQUID_SHUTDOWN_TIMEOUT.*?SQUID_SHUTDOWN_TIMEOUT=50?g" /etc/sysconfig/squid
1013
	$SED "s?^SQUID_SHUTDOWN_TIMEOUT.*?SQUID_SHUTDOWN_TIMEOUT=50?g" /etc/sysconfig/squid
1039
 
1014
 
1040
# Squid cache init
1015
# Squid cache init
1041
	/usr/sbin/squid -z
1016
	/usr/sbin/squid -z
1042
}  # End of param_squid ()
1017
}  # End of param_squid ()
1043
	
1018
	
1044
##################################################################
1019
##################################################################
1045
##		Fonction "param_dansguardian"			##
1020
##		Fonction "param_dansguardian"			##
1046
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1021
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1047
##################################################################
1022
##################################################################
1048
param_dansguardian ()
1023
param_dansguardian ()
1049
{
1024
{
1050
	mkdir /var/dansguardian
1025
	mkdir /var/dansguardian
1051
	chown dansguardian /var/dansguardian
1026
	chown dansguardian /var/dansguardian
1052
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1027
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1053
# By default the filter is off 
1028
# By default the filter is off 
1054
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1029
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1055
# French deny HTML page
1030
# French deny HTML page
1056
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1031
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1057
# Listen only on LAN side
1032
# Listen only on LAN side
1058
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1033
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1059
# DG send its flow to SQUID
1034
# DG send its flow to SQUID
1060
	$SED "s?^proxyport.*?proxyport = 3128?g" $DIR_DG/dansguardian.conf
1035
	$SED "s?^proxyport.*?proxyport = 3128?g" $DIR_DG/dansguardian.conf
1061
# replace the default deny HTML page
1036
# replace the default deny HTML page
1062
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1037
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1063
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1038
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1064
# Don't log
1039
# Don't log
1065
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1040
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1066
# Run 10 daemons (20 in largest server)
1041
# Run 10 daemons (20 in largest server)
1067
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1042
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1068
# on désactive par défaut le controle de contenu des pages html
1043
# on désactive par défaut le controle de contenu des pages html
1069
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1044
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1070
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1045
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1071
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1046
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1072
# on désactive par défaut le contrôle d'URL par expressions régulières
1047
# on désactive par défaut le contrôle d'URL par expressions régulières
1073
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1048
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1074
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1049
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1075
# on désactive par défaut le contrôle de téléchargement de fichiers
1050
# on désactive par défaut le contrôle de téléchargement de fichiers
1076
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1051
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1077
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1052
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1078
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1053
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1079
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1054
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1080
	touch $DIR_DG/lists/bannedextensionlist
1055
	touch $DIR_DG/lists/bannedextensionlist
1081
	touch $DIR_DG/lists/bannedmimetypelist
1056
	touch $DIR_DG/lists/bannedmimetypelist
1082
# 'Safesearch' regex actualisation
1057
# 'Safesearch' regex actualisation
1083
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1058
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1084
# empty LAN IP list that won't be WEB filtered
1059
# empty LAN IP list that won't be WEB filtered
1085
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1060
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1086
	touch $DIR_DG/lists/exceptioniplist
1061
	touch $DIR_DG/lists/exceptioniplist
1087
# Keep a copy of URL & domain filter configuration files
1062
# Keep a copy of URL & domain filter configuration files
1088
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1063
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1089
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1064
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1090
} # End of param_dansguardian ()
1065
} # End of param_dansguardian ()
1091
 
1066
 
1092
##################################################################
1067
##################################################################
1093
##			Fonction "antivirus"			##
1068
##			Fonction "antivirus"			##
1094
## - configuration havp + libclamav				##
1069
## - configuration havp + libclamav				##
1095
##################################################################
1070
##################################################################
1096
antivirus ()		
1071
antivirus ()		
1097
{
1072
{
1098
# création de l'usager 'havp'
1073
# création de l'usager 'havp'
1099
	havp_exist=`grep havp /etc/passwd|wc -l`
1074
	havp_exist=`grep havp /etc/passwd|wc -l`
1100
	if [ "$havp_exist" == "1" ]
1075
	if [ "$havp_exist" == "1" ]
1101
	then
1076
	then
1102
	      userdel -r havp 2>/dev/null
1077
	      userdel -r havp 2>/dev/null
1103
	      groupdel havp 2>/dev/null
1078
	      groupdel havp 2>/dev/null
1104
	fi
1079
	fi
1105
	groupadd -f havp
1080
	groupadd -f havp
1106
	useradd -r -g havp -s /bin/false -c "system user for havp" havp
1081
	useradd -r -g havp -s /bin/false -c "system user for havp" havp
1107
	mkdir -p /var/tmp/havp /var/log/havp
1082
	mkdir -p /var/tmp/havp /var/log/havp
1108
	chown -R havp /var/tmp/havp /var/log/havp /var/run/havp
1083
	chown -R havp /var/tmp/havp /var/log/havp /var/run/havp
1109
# configuration d'HAVP
1084
# configuration d'HAVP
1110
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1085
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1111
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1086
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1112
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on 8090			
1087
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on 8090			
1113
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1088
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1114
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1089
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1115
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1090
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1116
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1091
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1117
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1092
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1118
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1093
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1119
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1094
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1120
# skip checking of youtube flow (too heavy load / risk too low)
1095
# skip checking of youtube flow (too heavy load / risk too low)
1121
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1096
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1122
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1097
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1123
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1098
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1124
# remplacement du fichier d'initialisation
1099
# remplacement du fichier d'initialisation
1125
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1100
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1126
# if keep old init file : $SED "/$HAVP_BIN -c $HAVP_CONFIG/i chown -R havp:havp \/var\/tmp\/havp" /etc/init.d/havp
1101
# if keep old init file : $SED "/$HAVP_BIN -c $HAVP_CONFIG/i chown -R havp:havp \/var\/tmp\/havp" /etc/init.d/havp
1127
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1102
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1128
# on remplace la page d'interception (template)
1103
# on remplace la page d'interception (template)
1129
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1104
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1130
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1105
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1131
# automatisation de la mise à jour de la base antivirale (toutes les 2 heures)
1106
# automatisation de la mise à jour de la base antivirale (toutes les 2 heures)
1132
	$SED "s?^Checks.*?Checks 12?g" /etc/freshclam.conf
1107
	$SED "s?^Checks.*?Checks 12?g" /etc/freshclam.conf
1133
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1108
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1134
# Virus database update
1109
# Virus database update
1135
	rm -f /var/lib/clamav/*.cld # in case of old database scheme
1110
	rm -f /var/lib/clamav/*.cld # in case of old database scheme
1136
	cp -f $DIR_CONF/clamav-main.cvd /var/lib/clamav/main.cvd
1111
	cp -f $DIR_CONF/clamav-main.cvd /var/lib/clamav/main.cvd
1137
	/usr/bin/freshclam
1112
	/usr/bin/freshclam
1138
}
1113
}
1139
 
1114
 
1140
##################################################################################
1115
##################################################################################
1141
##			function "param_ulogd"					##
1116
##			function "param_ulogd"					##
1142
## - Ulog config for multi-log files 						##
1117
## - Ulog config for multi-log files 						##
1143
##################################################################################
1118
##################################################################################
1144
param_ulogd ()
1119
param_ulogd ()
1145
{
1120
{
1146
# Three instances of ulogd (three different logfiles)
1121
# Three instances of ulogd (three different logfiles)
1147
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1122
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1148
	nl=1
1123
	nl=1
1149
	for log_type in tracability ssh ext-access
1124
	for log_type in tracability ssh ext-access
1150
	do
1125
	do
1151
		[ -e /var/log/firewall/$log_type.log ] || touch /var/log/firewall/$log_type.log
1126
		[ -e /var/log/firewall/$log_type.log ] || touch /var/log/firewall/$log_type.log
1152
		cp -f /etc/ulogd.conf /etc/ulogd-$log_type.conf
1127
		cp -f /etc/ulogd.conf /etc/ulogd-$log_type.conf
1153
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1128
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1154
		$SED '/OPRINT/,$d' /etc/ulogd-$log_type.conf
1129
		$SED '/OPRINT/,$d' /etc/ulogd-$log_type.conf
1155
		cat << EOF >> /etc/ulogd-$log_type.conf
1130
		cat << EOF >> /etc/ulogd-$log_type.conf
1156
[LOGEMU]
1131
[LOGEMU]
1157
file="/var/log/firewall/$log_type.log"
1132
file="/var/log/firewall/$log_type.log"
1158
sync=1
1133
sync=1
1159
EOF
1134
EOF
1160
		nl=`expr $nl + 1`
1135
		nl=`expr $nl + 1`
1161
	done
1136
	done
1162
	chown -R root:apache /var/log/firewall
1137
	chown -R root:apache /var/log/firewall
1163
	chmod 750 /var/log/firewall
1138
	chmod 750 /var/log/firewall
1164
	chmod 640 /var/log/firewall/*
1139
	chmod 640 /var/log/firewall/*
1165
	[ -e /etc/init.d/ulogd.default ] || cp /etc/init.d/ulogd /etc/init.d/ulogd.default
1140
	[ -e /etc/init.d/ulogd.default ] || cp /etc/init.d/ulogd /etc/init.d/ulogd.default
1166
	cp -f $DIR_CONF/ulogd-init /etc/init.d/ulogd
1141
	cp -f $DIR_CONF/ulogd-init /etc/init.d/ulogd
1167
}  # End of param_ulogd ()
1142
}  # End of param_ulogd ()
1168
 
1143
 
1169
 
1144
 
1170
##########################################################
1145
##########################################################
1171
##              Function "param_nfsen"			##
1146
##              Function "param_nfsen"			##
1172
##########################################################
1147
##########################################################
1173
param_nfsen()
1148
param_nfsen()
1174
{
1149
{
1175
#Decompression tarball
1150
#Decompression tarball
1176
	tar xvzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1151
	tar xvzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1177
#Création groupe et utilisteur
1152
#Création groupe et utilisteur
1178
	if grep "^www-data:" /etc/group > /dev/null; then
1153
	if grep "^www-data:" /etc/group > /dev/null; then
1179
		echo "Group already exists !"
1154
		echo "Group already exists !"
1180
	else
1155
	else
1181
		groupadd www-data
1156
		groupadd www-data
1182
		echo "Group 'www-data' created !"
1157
		echo "Group 'www-data' created !"
1183
	fi
1158
	fi
1184
	if grep "^nfsen:" /etc/passwd > /dev/null; then
1159
	if grep "^nfsen:" /etc/passwd > /dev/null; then
1185
		echo "User already exists !"
1160
		echo "User already exists !"
1186
	else
1161
	else
1187
		useradd -m nfsen
1162
		useradd -m nfsen
1188
		echo "User 'nfsen' created !"
1163
		echo "User 'nfsen' created !"
1189
	fi
1164
	fi
1190
	usermod -G www-data nfsen
1165
	usermod -G www-data nfsen
1191
#Ajout du plugin nfsen : PortTracker
1166
#Ajout du plugin nfsen : PortTracker
1192
	mkdir -p /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1167
	mkdir -p /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1193
	chown -R nfsen:www-data /var/www/nfsen
1168
	chown -R nfsen:www-data /var/www/nfsen
1194
	chown -R apache:apache /usr/share/nfsen /var/log/netflow/porttracker
1169
	chown -R apache:apache /usr/share/nfsen /var/log/netflow/porttracker
1195
	cp -f $DIR_CONF/nfsen/PortTracker.pm /tmp/nfsen-1.3.6p1/contrib/PortTracker/
1170
	cp -f $DIR_CONF/nfsen/PortTracker.pm /tmp/nfsen-1.3.6p1/contrib/PortTracker/
1196
#Copie du fichier de conf modifié de nfsen
1171
#Copie du fichier de conf modifié de nfsen
1197
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1172
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1198
#Copie du script d'initialisation de nfsen
1173
#Copie du script d'initialisation de nfsen
1199
	cp $DIR_CONF/nfsen/nfsen.service /lib/systemd/system/
1174
	cp $DIR_CONF/nfsen/nfsen.service /lib/systemd/system/
1200
#Installation de nfsen via le scrip Perl
1175
#Installation de nfsen via le scrip Perl
1201
	DirTmp=$(pwd)
1176
	DirTmp=$(pwd)
1202
	cd /tmp/nfsen-1.3.6p1/
1177
	cd /tmp/nfsen-1.3.6p1/
1203
	/usr/bin/perl5 install.pl etc/nfsen.conf #script lancé deux fois pour corriger,
1178
	/usr/bin/perl5 install.pl etc/nfsen.conf #script lancé deux fois pour corriger,
1204
	/usr/bin/perl5 install.pl etc/nfsen.conf #un problème Perl : "Semaphore introuvable"
1179
	/usr/bin/perl5 install.pl etc/nfsen.conf #un problème Perl : "Semaphore introuvable"
1205
#Création de la DB pour rrdtool
1180
#Création de la DB pour rrdtool
1206
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1181
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1207
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1182
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1208
	sudo -u apache nftrack -I -d /var/log/netflow/porttracker
1183
	sudo -u apache nftrack -I -d /var/log/netflow/porttracker
1209
	chown -R apache:www-data /var/log/netflow/porttracker/
1184
	chown -R apache:www-data /var/log/netflow/porttracker/
1210
	chmod -R 775 /var/log/netflow/porttracker
1185
	chmod -R 775 /var/log/netflow/porttracker
1211
#Configuration du fichier de conf d'apache
1186
#Configuration du fichier de conf d'apache
1212
	if [ -f /etc/httpd/conf.d/nfsen.conf ];then
1187
	if [ -f /etc/httpd/conf.d/nfsen.conf ];then
1213
		rm -f /etc/httpd/conf.d/nfsen.conf
1188
		rm -f /etc/httpd/conf.d/nfsen.conf
1214
	fi
1189
	fi
1215
	cat <<EOF >> /etc/httpd/conf.d/nfsen.conf
1190
	cat <<EOF >> /etc/httpd/conf.d/nfsen.conf
1216
Alias /nfsen /var/www/nfsen 
1191
Alias /nfsen /var/www/nfsen 
1217
<Directory /var/www/nfsen/> 
1192
<Directory /var/www/nfsen/> 
1218
DirectoryIndex nfsen.php 
1193
DirectoryIndex nfsen.php 
1219
Options -Indexes 
1194
Options -Indexes 
1220
AllowOverride all 
1195
AllowOverride all 
1221
order allow,deny 
1196
order allow,deny 
1222
allow from all 
1197
allow from all 
1223
AddType application/x-httpd-php .php 
1198
AddType application/x-httpd-php .php 
1224
php_flag magic_quotes_gpc on 
1199
php_flag magic_quotes_gpc on 
1225
php_flag track_vars on 
1200
php_flag track_vars on 
1226
</Directory>
1201
</Directory>
1227
EOF
1202
EOF
1228
#Ajout du paramètre : IP d'écoute pour le collecteur (nfcapd)
1203
#Ajout du paramètre : IP d'écoute pour le collecteur (nfcapd)
1229
$SED s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1";'?g /usr/libexec/NfSenRC.pm 
1204
$SED s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1";'?g /usr/libexec/NfSenRC.pm 
1230
#Configuration du délais d'expiration des captures du profile "live"
1205
#Configuration du délais d'expiration des captures du profile "live"
1231
	nfsen -m live -e 62d 2>/dev/null
1206
	nfsen -m live -e 62d 2>/dev/null
1232
#Suppression des sources de nfsen
1207
#Suppression des sources de nfsen
1233
	cd $DirTmp
1208
	cd $DirTmp
1234
	rm -rf /tmp/nfsen-1.3.6p1/
1209
	rm -rf /tmp/nfsen-1.3.6p1/
1235
} # End of param_nfsen
1210
} # End of param_nfsen
1236
 
1211
 
1237
##########################################################
1212
##########################################################
1238
##		Function "param_dnsmasq"		##
1213
##		Function "param_dnsmasq"		##
1239
##########################################################
1214
##########################################################
1240
param_dnsmasq ()
1215
param_dnsmasq ()
1241
{
1216
{
1242
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1217
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1243
	$SED "s?^DHCP_LEASE=.*?DHCP_LEASE=/var/log/dnsmasq/lease.log?g" /etc/sysconfig/dnsmasq # fichier contenant les baux
1218
	$SED "s?^DHCP_LEASE=.*?DHCP_LEASE=/var/log/dnsmasq/lease.log?g" /etc/sysconfig/dnsmasq # fichier contenant les baux
1244
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1219
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1245
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if bypass is on.
1220
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if bypass is on.
1246
	cat << EOF > /etc/dnsmasq.conf 
1221
	cat << EOF > /etc/dnsmasq.conf 
1247
# Configuration file for "dnsmasq in forward mode"
1222
# Configuration file for "dnsmasq in forward mode"
1248
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1223
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1249
listen-address=$PRIVATE_IP
1224
listen-address=$PRIVATE_IP
1250
listen-address=127.0.0.1
1225
listen-address=127.0.0.1
1251
no-dhcp-interface=$INTIF
1226
no-dhcp-interface=$INTIF
1252
bind-interfaces
1227
bind-interfaces
1253
cache-size=256
1228
cache-size=256
1254
domain=$DOMAIN
1229
domain=$DOMAIN
1255
domain-needed
1230
domain-needed
1256
expand-hosts
1231
expand-hosts
1257
bogus-priv
1232
bogus-priv
1258
filterwin2k
1233
filterwin2k
1259
server=$DNS1
1234
server=$DNS1
1260
server=$DNS2
1235
server=$DNS2
1261
# le servive DHCP est configuré mais n'est exploité que pour le "bypass"
1236
# le servive DHCP est configuré mais n'est exploité que pour le "bypass"
1262
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1237
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1263
dhcp-option=option:router,$PRIVATE_IP
1238
dhcp-option=option:router,$PRIVATE_IP
1264
#dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
1239
#dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
1265
 
1240
 
1266
# Exemple de configuration statique : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1241
# Exemple de configuration statique : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1267
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1242
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1268
EOF
1243
EOF
1269
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blackhole")
1244
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blackhole")
1270
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1245
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1271
	# Configuration file for "dnsmasq with blackhole"
1246
	# Configuration file for "dnsmasq with blackhole"
1272
# Inclusion de la blacklist <domains> de Toulouse dans la configuration
1247
# Inclusion de la blacklist <domains> de Toulouse dans la configuration
1273
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1248
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1274
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1249
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# zone de definition de noms DNS locaux
1275
listen-address=$PRIVATE_IP
1250
listen-address=$PRIVATE_IP
1276
port=54
1251
port=54
1277
no-dhcp-interface=$INTIF
1252
no-dhcp-interface=$INTIF
1278
bind-interfaces
1253
bind-interfaces
1279
cache-size=256
1254
cache-size=256
1280
domain=$DOMAIN
1255
domain=$DOMAIN
1281
domain-needed
1256
domain-needed
1282
expand-hosts
1257
expand-hosts
1283
bogus-priv
1258
bogus-priv
1284
filterwin2k
1259
filterwin2k
1285
server=$DNS1
1260
server=$DNS1
1286
server=$DNS2
1261
server=$DNS2
1287
EOF
1262
EOF
1288
 
1263
 
1289
# Init file modification
1264
# Init file modification
1290
	[ -e /etc/init.d/dnsmasq.default ] || cp /etc/init.d/dnsmasq /etc/init.d/dnsmasq.default
1265
	[ -e /etc/init.d/dnsmasq.default ] || cp /etc/init.d/dnsmasq /etc/init.d/dnsmasq.default
1291
# Start and stop a 2nd process for the "DNS blackhole"
1266
# Start and stop a 2nd process for the "DNS blackhole"
1292
	cp -f $DIR_CONF/dnsmasq /etc/init.d/dnsmasq			
1267
	cp -f $DIR_CONF/dnsmasq /etc/init.d/dnsmasq			
1293
# Start after chilli (65) which create tun0
1268
# Start after chilli (65) which create tun0
1294
	$SED "s?^# chkconfig:.*?# chkconfig: 2345 99 40?g" /etc/init.d/dnsmasq
1269
	$SED "s?^# chkconfig:.*?# chkconfig: 2345 99 40?g" /etc/init.d/dnsmasq
1295
# Optionnellement on pré-active les logs DNS des clients
1270
# Optionnellement on pré-active les logs DNS des clients
1296
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1271
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1297
	$SED "s?log-facility?#OPTIONS=\"-q --log-facility=/var/log/dnsmasq/queries.log\"?g"  /etc/sysconfig/dnsmasq
1272
	$SED "s?log-facility?#OPTIONS=\"-q --log-facility=/var/log/dnsmasq/queries.log\"?g"  /etc/sysconfig/dnsmasq
1298
# Optionnellement, exemple de paramètre supplémentaire pour le cache memoire
1273
# Optionnellement, exemple de paramètre supplémentaire pour le cache memoire
1299
	echo '#OPTIONS="$OPTIONS --cache-size=250"' >> /etc/sysconfig/dnsmasq
1274
	echo '#OPTIONS="$OPTIONS --cache-size=250"' >> /etc/sysconfig/dnsmasq
1300
# Optionnellement, exemple de configuration avec un A.D.
1275
# Optionnellement, exemple de configuration avec un A.D.
1301
	echo '#OPTIONS="$OPTIONS --server=/your.domain/192.168.182.3"' >> /etc/sysconfig/dnsmasq
1276
	echo '#OPTIONS="$OPTIONS --server=/your.domain/192.168.182.3"' >> /etc/sysconfig/dnsmasq
1302
} # End dnsmasq
1277
} # End dnsmasq
1303
 
1278
 
1304
##########################################################
1279
##########################################################
1305
##		Fonction "BL"				##
1280
##		Fonction "BL"				##
1306
##########################################################
1281
##########################################################
1307
BL ()
1282
BL ()
1308
{
1283
{
1309
# on copie par défaut la BL de toulouse embarqués dans l'archive d'ALCASAR
1284
# on copie par défaut la BL de toulouse embarqués dans l'archive d'ALCASAR
1310
	rm -rf $DIR_DG/lists/blacklists
1285
	rm -rf $DIR_DG/lists/blacklists
1311
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1286
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1312
# on crée le répertoire ossi (noms de domaine et URLs ajoutés à la BL)
1287
# on crée le répertoire ossi (noms de domaine et URLs ajoutés à la BL)
1313
	mkdir $DIR_DG/lists/blacklists/ossi
1288
	mkdir $DIR_DG/lists/blacklists/ossi
1314
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1289
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1315
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1290
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1316
# On crée les fichiers vides de sites ou d'URL réhabilités
1291
# On crée les fichiers vides de sites ou d'URL réhabilités
1317
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1292
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1318
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1293
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1319
	touch $DIR_DG/lists/exceptionsitelist
1294
	touch $DIR_DG/lists/exceptionsitelist
1320
	touch $DIR_DG/lists/exceptionurllist
1295
	touch $DIR_DG/lists/exceptionurllist
1321
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1296
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1322
	cat <<EOF > $DIR_DG/lists/bannedurllist
1297
	cat <<EOF > $DIR_DG/lists/bannedurllist
1323
# Dansguardian filter config for ALCASAR
1298
# Dansguardian filter config for ALCASAR
1324
EOF
1299
EOF
1325
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1300
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1326
# Dansguardian domain filter config for ALCASAR
1301
# Dansguardian domain filter config for ALCASAR
1327
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1302
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1328
#**
1303
#**
1329
# block all SSL and CONNECT tunnels
1304
# block all SSL and CONNECT tunnels
1330
**s
1305
**s
1331
# block all SSL and CONNECT tunnels specified only as an IP
1306
# block all SSL and CONNECT tunnels specified only as an IP
1332
*ips
1307
*ips
1333
# block all sites specified only by an IP
1308
# block all sites specified only by an IP
1334
*ip
1309
*ip
1335
EOF
1310
EOF
1336
# Add Bing and Youtube to the safesearch url regext list (parental control)
1311
# Add Bing and Youtube to the safesearch url regext list (parental control)
1337
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1312
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1338
# Bing - add 'adlt=strict'
1313
# Bing - add 'adlt=strict'
1339
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1314
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1340
# Youtube - add 'edufilter=your_ID' 
1315
# Youtube - add 'edufilter=your_ID' 
1341
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1316
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1342
EOF
1317
EOF
1343
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1318
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1344
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1319
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1345
	chown -R dansguardian:apache $DIR_DG
1320
	chown -R dansguardian:apache $DIR_DG
1346
	chmod -R g+rw $DIR_DG
1321
	chmod -R g+rw $DIR_DG
1347
# On adapte la BL de Toulouse à notre structure
1322
# On adapte la BL de Toulouse à notre structure
1348
	if [ "$mode" != "update" ]; then
1323
	if [ "$mode" != "update" ]; then
1349
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1324
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1350
	fi
1325
	fi
1351
}
1326
}
1352
 
1327
 
1353
##########################################################
1328
##########################################################
1354
##		Fonction "cron"				##
1329
##		Fonction "cron"				##
1355
## - Mise en place des différents fichiers de cron	##
1330
## - Mise en place des différents fichiers de cron	##
1356
##########################################################
1331
##########################################################
1357
cron ()
1332
cron ()
1358
{
1333
{
1359
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1334
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1360
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1335
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1361
	cat <<EOF > /etc/crontab
1336
	cat <<EOF > /etc/crontab
1362
SHELL=/bin/bash
1337
SHELL=/bin/bash
1363
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1338
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1364
MAILTO=root
1339
MAILTO=root
1365
HOME=/
1340
HOME=/
1366
 
1341
 
1367
# run-parts
1342
# run-parts
1368
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1343
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1369
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1344
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1370
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1345
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1371
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1346
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1372
EOF
1347
EOF
1373
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1348
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1374
	cat <<EOF >> /etc/anacrontab
1349
	cat <<EOF >> /etc/anacrontab
1375
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1350
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1376
7       10      cron.logExport          nice /etc/cron.d/alcasar-export_log
1351
7       10      cron.logExport          nice /etc/cron.d/alcasar-export_log
1377
7       15      cron.logClean           nice /etc/cron.d/alcasar-clean_log
1352
7       15      cron.logClean           nice /etc/cron.d/alcasar-clean_log
1378
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1353
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1379
EOF
1354
EOF
1380
 
1355
 
1381
	cat <<EOF > /etc/cron.d/alcasar-mysql
1356
	cat <<EOF > /etc/cron.d/alcasar-mysql
1382
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1357
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1383
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1358
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1384
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1359
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1385
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1360
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1386
EOF
1361
EOF
1387
	cat <<EOF > /etc/cron.d/alcasar-archive
1362
	cat <<EOF > /etc/cron.d/alcasar-archive
1388
# Archive des logs et de la base de données (tous les lundi à 5h35)
1363
# Archive des logs et de la base de données (tous les lundi à 5h35)
1389
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1364
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1390
EOF
1365
EOF
1391
	cat << EOF > /etc/cron.d/alcasar-clean_import
1366
	cat << EOF > /etc/cron.d/alcasar-clean_import
1392
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1367
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1393
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1368
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1394
EOF
1369
EOF
1395
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1370
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1396
# mise à jour automatique de la distribution tous les jours 3h30
1371
# mise à jour automatique de la distribution tous les jours 3h30
1397
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1372
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1398
EOF
1373
EOF
1399
	#cat << EOF > /etc/cron.d/alcasar-netflow
1374
	#cat << EOF > /etc/cron.d/alcasar-netflow
1400
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1375
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1401
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1376
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1402
#EOF
1377
#EOF
1403
 
1378
 
1404
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1379
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1405
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1380
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1406
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1381
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1407
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1382
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1408
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1383
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1409
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1384
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1410
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1385
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1411
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1386
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1412
	rm -f /etc/cron.daily/freeradius-web
1387
	rm -f /etc/cron.daily/freeradius-web
1413
	rm -f /etc/cron.monthly/freeradius-web
1388
	rm -f /etc/cron.monthly/freeradius-web
1414
	cat << EOF > /etc/cron.d/freeradius-web
1389
	cat << EOF > /etc/cron.d/freeradius-web
1415
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1390
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1416
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1391
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1417
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1392
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1418
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1393
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1419
EOF
1394
EOF
1420
	cat << EOF > /etc/cron.d/alcasar-watchdog
1395
	cat << EOF > /etc/cron.d/alcasar-watchdog
1421
# activation du "chien de garde" (watchdog) toutes les 3'
1396
# activation du "chien de garde" (watchdog) toutes les 3'
1422
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1397
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1423
EOF
1398
EOF
1424
# activation du "chien de garde des services" (watchdog) toutes les 18'
1399
# activation du "chien de garde des services" (watchdog) toutes les 18'
1425
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1400
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1426
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1401
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1427
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1402
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1428
EOF
1403
EOF
1429
# suppression des crons usagers
1404
# suppression des crons usagers
1430
	rm -f /var/spool/cron/*
1405
	rm -f /var/spool/cron/*
1431
} # End cron
1406
} # End cron
1432
 
1407
 
1433
##################################################################
1408
##################################################################
1434
## 			Fonction "Fail2Ban"			##
1409
## 			Fonction "Fail2Ban"			##
1435
##- Modification de la configuration de fail2ban		##
1410
##- Modification de la configuration de fail2ban		##
1436
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1411
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1437
##################################################################
1412
##################################################################
1438
fail2ban()
1413
fail2ban()
1439
{
1414
{
1440
	$DIR_CONF/fail2ban.sh
1415
	$DIR_CONF/fail2ban.sh
1441
#Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1416
#Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1442
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1417
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1443
	[ -e /var/Save/logs/security/watchdog.log ] || touch /var/Save/logs/security/watchdog.log
1418
	[ -e /var/Save/logs/security/watchdog.log ] || touch /var/Save/logs/security/watchdog.log
1444
	chmod 644 /var/log/fail2ban.log
1419
	chmod 644 /var/log/fail2ban.log
1445
	chmod 644 /var/Save/logs/security/watchdog.log
1420
	chmod 644 /var/Save/logs/security/watchdog.log
1446
} #Fin de fail2ban_install()
1421
} #Fin de fail2ban_install()
1447
 
1422
 
1448
##################################################################
1423
##################################################################
1449
##			Fonction "post_install"			##
1424
##			Fonction "post_install"			##
1450
## - Modification des bannières (locales et ssh) et des prompts ##
1425
## - Modification des bannières (locales et ssh) et des prompts ##
1451
## - Installation de la structure de chiffrement pour root	##
1426
## - Installation de la structure de chiffrement pour root	##
1452
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1427
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1453
## - Mise en place du la rotation des logs			##
1428
## - Mise en place du la rotation des logs			##
1454
## - Configuration dans le cas d'une mise à jour		##
1429
## - Configuration dans le cas d'une mise à jour		##
1455
##################################################################
1430
##################################################################
1456
post_install()
1431
post_install()
1457
{
1432
{
1458
# adaptation du script "chien de garde" (watchdog)
1433
# adaptation du script "chien de garde" (watchdog)
1459
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1434
	$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1460
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1435
	$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-watchdog.sh
1461
# création de la bannière locale
1436
# création de la bannière locale
1462
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1437
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1463
	cp -f $DIR_CONF/banner /etc/mageia-release
1438
	cp -f $DIR_CONF/banner /etc/mageia-release
1464
	echo " V$VERSION" >> /etc/mageia-release
1439
	echo " V$VERSION" >> /etc/mageia-release
1465
# création de la bannière SSH
1440
# création de la bannière SSH
1466
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1441
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1467
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1442
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1468
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1443
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1469
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1444
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1470
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1445
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1471
# postfix banner anonymisation
1446
# postfix banner anonymisation
1472
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1447
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1473
# sshd écoute côté LAN et WAN
1448
# sshd écoute côté LAN et WAN
1474
	$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
1449
	$SED "s?^#ListenAddress 0\.0\.0\.0?ListenAddress $PRIVATE_IP?g" /etc/ssh/sshd_config
1475
	$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config 
1450
	$SED "/^ListenAddress $PRIVATE_IP/a\ListenAddress $PUBLIC_IP" /etc/ssh/sshd_config 
1476
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1451
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1477
	echo "SSH=off" >> $CONF_FILE
1452
	echo "SSH=off" >> $CONF_FILE
1478
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1453
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1479
	echo "QOS=off" >> $CONF_FILE
1454
	echo "QOS=off" >> $CONF_FILE
1480
	echo "LDAP=off" >> $CONF_FILE
1455
	echo "LDAP=off" >> $CONF_FILE
1481
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1456
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1482
	echo "WEB_ANTIVIRUS=on" >> $CONF_FILE
1457
	echo "WEB_ANTIVIRUS=on" >> $CONF_FILE
1483
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
1458
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
1484
	echo "DNS_FILTERING=off" >> $CONF_FILE
1459
	echo "DNS_FILTERING=off" >> $CONF_FILE
1485
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1460
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1486
	echo "MULTIWAN=off" >> $CONF_FILE
1461
	echo "MULTIWAN=off" >> $CONF_FILE
1487
	echo "FAILOVER=30" >> $CONF_FILE
1462
	echo "FAILOVER=30" >> $CONF_FILE
1488
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1463
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1489
	echo "#WAN1=\"1,eth0:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1464
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1490
	echo "#WAN2=\"1,eth0:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1465
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1491
# Coloration des prompts
1466
# Coloration des prompts
1492
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1467
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1493
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1468
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1494
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1469
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1495
# Droits d'exécution pour utilisateur apache et sysadmin
1470
# Droits d'exécution pour utilisateur apache et sysadmin
1496
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1471
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1497
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1472
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1498
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1473
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1499
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, squid, radiusd, ulogd)
1474
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, squid, radiusd, ulogd)
1500
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1475
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1501
	chmod 644 /etc/logrotate.d/*
1476
	chmod 644 /etc/logrotate.d/*
1502
# rectification sur versions précédentes de la compression des logs
1477
# rectification sur versions précédentes de la compression des logs
1503
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1478
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1504
# actualisation des fichiers logs compressés
1479
# actualisation des fichiers logs compressés
1505
	for dir in firewall squid dansguardian httpd
1480
	for dir in firewall squid dansguardian httpd
1506
	do
1481
	do
1507
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1482
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1508
	done
1483
	done
1509
# create the alcasar-load_balancing unit
1484
# create the alcasar-load_balancing unit
1510
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1485
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1511
#  This file is part of systemd.
1486
#  This file is part of systemd.
1512
#
1487
#
1513
#  systemd is free software; you can redistribute it and/or modify it
1488
#  systemd is free software; you can redistribute it and/or modify it
1514
#  under the terms of the GNU General Public License as published by
1489
#  under the terms of the GNU General Public License as published by
1515
#  the Free Software Foundation; either version 2 of the License, or
1490
#  the Free Software Foundation; either version 2 of the License, or
1516
#  (at your option) any later version.
1491
#  (at your option) any later version.
1517
 
1492
 
1518
# This unit lauches alcasar-load-balancing.sh script.
1493
# This unit lauches alcasar-load-balancing.sh script.
1519
[Unit]
1494
[Unit]
1520
Description=alcasar-load_balancing.sh execution
1495
Description=alcasar-load_balancing.sh execution
1521
After=network.target iptables.service
1496
After=network.target iptables.service
1522
 
1497
 
1523
[Service]
1498
[Service]
1524
Type=oneshot
1499
Type=oneshot
1525
RemainAfterExit=yes
1500
RemainAfterExit=yes
1526
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1501
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1527
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1502
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1528
TimeoutSec=0
1503
TimeoutSec=0
1529
SysVStartPriority=99
1504
SysVStartPriority=99
1530
 
1505
 
1531
[Install]
1506
[Install]
1532
WantedBy=multi-user.target
1507
WantedBy=multi-user.target
1533
EOF
1508
EOF
1534
# processes launched at boot time (SYSV)
1509
# processes launched at boot time (SYSV)
1535
	for i in ntpd iptables ulogd dnsmasq squid chilli httpd radiusd netfs mysqld dansguardian havp freshclam
1510
	for i in ntpd iptables ulogd dnsmasq squid chilli httpd radiusd netfs mysqld dansguardian havp freshclam
1536
	do
1511
	do
1537
		/sbin/chkconfig --add $i
1512
		/sbin/chkconfig --add $i
1538
	done
1513
	done
1539
# processes launched at boot time (Systemctl)
1514
# processes launched at boot time (Systemctl)
1540
	for i in alcasar-load_balancing.service nfsen.service
1515
	for i in alcasar-load_balancing.service nfsen.service
1541
 
1516
 
1542
	do
1517
	do
1543
		systemctl enable $i
1518
		systemctl enable $i
1544
	done
1519
	done
1545
# Apply French Security Agency (ANSSI) rules
1520
# Apply French Security Agency (ANSSI) rules
1546
# ignorer les broadcast ICMP. (attaque smurf) 
1521
# ignorer les broadcast ICMP. (attaque smurf) 
1547
	sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1
1522
	sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1
1548
# ignorer les erreurs ICMP bogus
1523
# ignorer les erreurs ICMP bogus
1549
	sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1
1524
	sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1
1550
# désactiver l'envoi et la réponse aux ICMP redirects
1525
# désactiver l'envoi et la réponse aux ICMP redirects
1551
	sysctl -w net.ipv4.conf.all.accept_redirects=0
1526
	sysctl -w net.ipv4.conf.all.accept_redirects=0
1552
	accept_redirect=`grep accept_redirect /etc/sysctl.conf|wc -l`
1527
	accept_redirect=`grep accept_redirect /etc/sysctl.conf|wc -l`
1553
	if [ "$accept_redirect" == "0" ]
1528
	if [ "$accept_redirect" == "0" ]
1554
	then
1529
	then
1555
		echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.conf
1530
		echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.conf
1556
	else
1531
	else
1557
		$SED "s?accept_redirects.*?accept_redirects = 0?g" /etc/sysctl.conf
1532
		$SED "s?accept_redirects.*?accept_redirects = 0?g" /etc/sysctl.conf
1558
	fi
1533
	fi
1559
	sysctl -w net.ipv4.conf.all.send_redirects=0
1534
	sysctl -w net.ipv4.conf.all.send_redirects=0
1560
	send_redirect=`grep send_redirect /etc/sysctl.conf|wc -l`
1535
	send_redirect=`grep send_redirect /etc/sysctl.conf|wc -l`
1561
	if [ "$send_redirect" == "0" ]
1536
	if [ "$send_redirect" == "0" ]
1562
	then
1537
	then
1563
		echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.conf
1538
		echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.conf
1564
	else
1539
	else
1565
		$SED "s?send_redirects.*?send_redirects = 0?g" /etc/sysctl.conf
1540
		$SED "s?send_redirects.*?send_redirects = 0?g" /etc/sysctl.conf
1566
	fi
1541
	fi
1567
# activer les SYN Cookies (attaque syn flood)
1542
# activer les SYN Cookies (attaque syn flood)
1568
	sysctl -w net.ipv4.tcp_syncookies=1
1543
	sysctl -w net.ipv4.tcp_syncookies=1
1569
	tcp_syncookies=`grep tcp_syncookies /etc/sysctl.conf|wc -l`
1544
	tcp_syncookies=`grep tcp_syncookies /etc/sysctl.conf|wc -l`
1570
	if [ "$tcp_syncookies" == "0" ]
1545
	if [ "$tcp_syncookies" == "0" ]
1571
	then
1546
	then
1572
		echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.conf
1547
		echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.conf
1573
	else
1548
	else
1574
		$SED "s?tcp_syncookies.*?tcp_syncookies = 1?g" /etc/sysctl.conf
1549
		$SED "s?tcp_syncookies.*?tcp_syncookies = 1?g" /etc/sysctl.conf
1575
	fi
1550
	fi
1576
# activer l'antispoofing niveau Noyau
1551
# activer l'antispoofing niveau Noyau
1577
	sysctl -w net.ipv4.conf.all.rp_filter=1
1552
	sysctl -w net.ipv4.conf.all.rp_filter=1
1578
# ignorer le source routing
1553
# ignorer le source routing
1579
	sysctl -w net.ipv4.conf.all.accept_source_route=0
1554
	sysctl -w net.ipv4.conf.all.accept_source_route=0
1580
	 accept_source_route=`grep accept_source_route /etc/sysctl.conf|wc -l`
1555
	 accept_source_route=`grep accept_source_route /etc/sysctl.conf|wc -l`
1581
	if [ "$accept_source_route" == "0" ]
1556
	if [ "$accept_source_route" == "0" ]
1582
	then
1557
	then
1583
		echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.conf
1558
		echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.conf
1584
	else
1559
	else
1585
		$SED "s?accept_source_route.*?accept_source_route = 0?g" /etc/sysctl.conf
1560
		$SED "s?accept_source_route.*?accept_source_route = 0?g" /etc/sysctl.conf
1586
	fi
1561
	fi
1587
# réglage du timer de maintien de suivi de session à 1h (3600s) au lieu de 5 semaines
1562
# réglage du timer de maintien de suivi de session à 1h (3600s) au lieu de 5 semaines
1588
	sysctl -w net.netfilter.nf_conntrack_tcp_timeout_established=3600
1563
	sysctl -w net.netfilter.nf_conntrack_tcp_timeout_established=3600
1589
	timeout_established=`grep timeout_established /etc/sysctl.conf|wc -l`
1564
	timeout_established=`grep timeout_established /etc/sysctl.conf|wc -l`
1590
	if [ "$timeout_established" == "0" ]
1565
	if [ "$timeout_established" == "0" ]
1591
	then
1566
	then
1592
		echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.conf
1567
		echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.conf
1593
	else
1568
	else
1594
		$SED "s?timeout_established.*?timeout_established = 3600?g" /etc/sysctl.conf
1569
		$SED "s?timeout_established.*?timeout_established = 3600?g" /etc/sysctl.conf
1595
	fi
1570
	fi
1596
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1571
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1597
	sysctl -w net.ipv4.conf.all.log_martians=0
1572
	sysctl -w net.ipv4.conf.all.log_martians=0
1598
# On supprime la gestion du <CTRL>+<ALT>+<SUPPR> et des Magic SysReq Keys
1573
# On supprime la gestion du <CTRL>+<ALT>+<SUPPR> et des Magic SysReq Keys
1599
# ???	$SED "s?^ALLOW_REBOOT=.*?ALLOW_REBOOT=no?g" /etc/security/msec/level.fileserver
1574
# ???	$SED "s?^ALLOW_REBOOT=.*?ALLOW_REBOOT=no?g" /etc/security/msec/level.fileserver
1600
# switch to multi-users runlevel (instead of x11)
1575
# switch to multi-users runlevel (instead of x11)
1601
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1576
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1602
#	GRUB modifications
1577
#	GRUB modifications
1603
# limit wait time to 3s
1578
# limit wait time to 3s
1604
# create an alcasar entry instead of linux-nonfb
1579
# create an alcasar entry instead of linux-nonfb
1605
# change display to 1024*768 (vga791)
1580
# change display to 1024*768 (vga791)
1606
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1581
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1607
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1582
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1608
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1583
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1609
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1584
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1610
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1585
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1611
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1586
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1612
# Remove unused services and users
1587
# Remove unused services and users
1613
	for old_svc in alsa sound dm
1588
	for old_svc in alsa sound dm
1614
	do
1589
	do
1615
		/sbin/chkconfig --del $old_svc
1590
		/sbin/chkconfig --del $old_svc
1616
	done
1591
	done
1617
	for svc in snmpd.service sshd.service
1592
	for svc in snmpd.service sshd.service
1618
	do
1593
	do
1619
		/bin/systemctl disable $svc
1594
		/bin/systemctl disable $svc
1620
	done
1595
	done
1621
	for rm_users in avahi-autoipd avahi icapd
1596
	for rm_users in avahi-autoipd avahi icapd
1622
	do
1597
	do
1623
		user=`cat /etc/passwd|grep $rm_users|cut -d":" -f1`
1598
		user=`cat /etc/passwd|grep $rm_users|cut -d":" -f1`
1624
		if [ "$user" == "$rm_users" ]
1599
		if [ "$user" == "$rm_users" ]
1625
		then
1600
		then
1626
			/usr/sbin/userdel -f $rm_users
1601
			/usr/sbin/userdel -f $rm_users
1627
		fi
1602
		fi
1628
	done
1603
	done
1629
# Load and apply the previous conf file
1604
# Load and apply the previous conf file
1630
	if [ "$mode" = "update" ]
1605
	if [ "$mode" = "update" ]
1631
	then
1606
	then
1632
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1607
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1633
		$DIR_DEST_BIN/alcasar-conf.sh --load
1608
		$DIR_DEST_BIN/alcasar-conf.sh --load
1634
		PARENT_SCRIPT=`basename $0`
1609
		PARENT_SCRIPT=`basename $0`
1635
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1610
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1636
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1611
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1637
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1612
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1638
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1613
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1639
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1614
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1640
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1615
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1641
		then
1616
		then
1642
			header_install
1617
			header_install
1643
			if [ $Lang == "fr" ]
1618
			if [ $Lang == "fr" ]
1644
			then 
1619
			then 
1645
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1620
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1646
				echo
1621
				echo
1647
				echo -n "Nom : "
1622
				echo -n "Nom : "
1648
			else
1623
			else
1649
				echo "This update need to redefine the first admin account"
1624
				echo "This update need to redefine the first admin account"
1650
				echo
1625
				echo
1651
				echo -n "Account : "
1626
				echo -n "Account : "
1652
			fi
1627
			fi
1653
			read admin_portal
1628
			read admin_portal
1654
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1629
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1655
			mkdir -p $DIR_DEST_ETC/digest
1630
			mkdir -p $DIR_DEST_ETC/digest
1656
			chmod 755 $DIR_DEST_ETC/digest
1631
			chmod 755 $DIR_DEST_ETC/digest
1657
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1632
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1658
			do
1633
			do
1659
				/usr/sbin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1634
				/usr/sbin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1660
			done
1635
			done
1661
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1636
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1662
		fi
1637
		fi
1663
	fi
1638
	fi
1664
	rm -f /tmp/alcasar-conf*
1639
	rm -f /tmp/alcasar-conf*
1665
	chown -R root:apache $DIR_DEST_ETC/*
1640
	chown -R root:apache $DIR_DEST_ETC/*
1666
	chmod -R 660 $DIR_DEST_ETC/*
1641
	chmod -R 660 $DIR_DEST_ETC/*
1667
	chmod ug+x $DIR_DEST_ETC/digest
1642
	chmod ug+x $DIR_DEST_ETC/digest
1668
# Apply and save the firewall rules
1643
# Apply and save the firewall rules
1669
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1644
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1670
	sleep 2
1645
	sleep 2
1671
	cd $DIR_INSTALL
1646
	cd $DIR_INSTALL
1672
	echo ""
1647
	echo ""
1673
	echo "#############################################################################"
1648
	echo "#############################################################################"
1674
	if [ $Lang == "fr" ]
1649
	if [ $Lang == "fr" ]
1675
		then
1650
		then
1676
		echo "#                        Fin d'installation d'ALCASAR                       #"
1651
		echo "#                        Fin d'installation d'ALCASAR                       #"
1677
		echo "#                                                                           #"
1652
		echo "#                                                                           #"
1678
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1653
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1679
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1654
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1680
		echo "#                                                                           #"
1655
		echo "#                                                                           #"
1681
		echo "#############################################################################"
1656
		echo "#############################################################################"
1682
		echo
1657
		echo
1683
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1658
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1684
		echo
1659
		echo
1685
		echo "- Lisez attentivement la documentation d'exploitation"
1660
		echo "- Lisez attentivement la documentation d'exploitation"
1686
		echo
1661
		echo
1687
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1662
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1688
		echo
1663
		echo
1689
		echo "                   Appuyez sur 'Entrée' pour continuer"
1664
		echo "                   Appuyez sur 'Entrée' pour continuer"
1690
	else	
1665
	else	
1691
		echo "#                        Enf of ALCASAR install process                     #"
1666
		echo "#                        Enf of ALCASAR install process                     #"
1692
		echo "#                                                                           #"
1667
		echo "#                                                                           #"
1693
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1668
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1694
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1669
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1695
		echo "#                                                                           #"
1670
		echo "#                                                                           #"
1696
		echo "#############################################################################"
1671
		echo "#############################################################################"
1697
		echo
1672
		echo
1698
		echo "- The system will be rebooted in order to operate ALCASAR"
1673
		echo "- The system will be rebooted in order to operate ALCASAR"
1699
		echo
1674
		echo
1700
		echo "- Read the exploitation documentation"
1675
		echo "- Read the exploitation documentation"
1701
		echo
1676
		echo
1702
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1677
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
1703
		echo
1678
		echo
1704
		echo "                   Hit 'Enter' to continue"
1679
		echo "                   Hit 'Enter' to continue"
1705
	fi
1680
	fi
1706
	sleep 2
1681
	sleep 2
1707
	if [ "$mode" != "update" ]
1682
	if [ "$mode" != "update" ]
1708
	then
1683
	then
1709
		read a
1684
		read a
1710
	fi
1685
	fi
1711
	clear
1686
	clear
1712
	reboot
1687
	reboot
1713
} # End post_install ()
1688
} # End post_install ()
1714
 
1689
 
1715
#################################
1690
#################################
1716
#  	Main Install loop  	#
1691
#  	Main Install loop  	#
1717
#################################
1692
#################################
1718
dir_exec=`dirname "$0"`
1693
dir_exec=`dirname "$0"`
1719
if [ $dir_exec != "." ]
1694
if [ $dir_exec != "." ]
1720
then
1695
then
1721
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
1696
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
1722
	echo "Launch this program from the ALCASAR archive directory"
1697
	echo "Launch this program from the ALCASAR archive directory"
1723
	exit 0
1698
	exit 0
1724
fi
1699
fi
1725
VERSION=`cat $DIR_INSTALL/VERSION`
1700
VERSION=`cat $DIR_INSTALL/VERSION`
1726
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1701
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
1727
nb_args=$#
1702
nb_args=$#
1728
args=$1
1703
args=$1
1729
if [ $nb_args -eq 0 ]
1704
if [ $nb_args -eq 0 ]
1730
then
1705
then
1731
	nb_args=1
1706
	nb_args=1
1732
	args="-h"
1707
	args="-h"
1733
fi
1708
fi
1734
chmod -R u+x $DIR_SCRIPTS/*
1709
chmod -R u+x $DIR_SCRIPTS/*
1735
case $args in
1710
case $args in
1736
	-\? | -h* | --h*)
1711
	-\? | -h* | --h*)
1737
		echo "$usage"
1712
		echo "$usage"
1738
		exit 0
1713
		exit 0
1739
		;;
1714
		;;
1740
	-i | --install)
1715
	-i | --install)
1741
		license
1716
		license
1742
		header_install
1717
		header_install
1743
		testing
1718
		testing
1744
# Test if ALCASAR is already installed (before v2.2, the conf file doesn't exist --> can't update)
1719
# Test if ALCASAR is already installed
1745
		if [ -e $CONF_FILE ]
1720
		if [ -e $CONF_FILE ]
1746
		then
1721
		then
1747
			current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
1722
			current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
1748
			if [ $Lang == "fr" ]
1723
			if [ $Lang == "fr" ]
1749
				then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
1724
				then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
1750
				else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
1725
				else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
1751
			fi
1726
			fi
1752
			response=0
1727
			response=0
1753
			PTN='^[oOnNyY]$'
1728
			PTN='^[oOnNyY]$'
1754
			until [[ $(expr $response : $PTN) -gt 0 ]]
1729
			until [[ $(expr $response : $PTN) -gt 0 ]]
1755
			do
1730
			do
1756
				if [ $Lang == "fr" ]
1731
				if [ $Lang == "fr" ]
1757
					then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
1732
					then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
1758
					else echo -n "Do you want to update (Y/n)?";
1733
					else echo -n "Do you want to update (Y/n)?";
1759
				 fi
1734
				 fi
1760
				read response
1735
				read response
1761
			done
1736
			done
1762
			if [ "$response" = "n" ] || [ "$response" = "N" ] 
1737
			if [ "$response" = "n" ] || [ "$response" = "N" ] 
1763
			then
1738
			then
1764
				rm -f /tmp/alcasar-conf*
1739
				rm -f /tmp/alcasar-conf*
1765
			else
1740
			else
1766
# Create a backup of running version importants files
1741
# Create a backup of running version importants files
1767
				$DIR_SCRIPTS/alcasar-conf.sh --create
1742
				$DIR_SCRIPTS/alcasar-conf.sh --create
1768
				mode="update"
1743
				mode="update"
1769
			fi
1744
			fi
1770
		fi
1745
		fi
1771
# RPMs install
1746
# RPMs install
-
 
1747
echo "STOP" ; read a
1772
		$DIR_SCRIPTS/alcasar-urpmi.sh
1748
		$DIR_SCRIPTS/alcasar-urpmi.sh
1773
		if [ "$?" != "0" ]
1749
		if [ "$?" != "0" ]
1774
		then
1750
		then
1775
			exit 0
1751
			exit 0
1776
		fi
1752
		fi
1777
		if [ -e $CONF_FILE ]
1753
		if [ -e $CONF_FILE ]
1778
		then
1754
		then
1779
# Uninstall the running version
1755
# Uninstall the running version
1780
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1756
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1781
		fi
1757
		fi
1782
# Test if manual update	
1758
# Test if manual update	
1783
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" != "update" ]
1759
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" != "update" ]
1784
		then
1760
		then
1785
			header_install
1761
			header_install
1786
			if [ $Lang == "fr" ]
1762
			if [ $Lang == "fr" ]
1787
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
1763
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
1788
				else echo "The configuration file of an old version has been found";
1764
				else echo "The configuration file of an old version has been found";
1789
			fi
1765
			fi
1790
			response=0
1766
			response=0
1791
			PTN='^[oOnNyY]$'
1767
			PTN='^[oOnNyY]$'
1792
			until [[ $(expr $response : $PTN) -gt 0 ]]
1768
			until [[ $(expr $response : $PTN) -gt 0 ]]
1793
			do
1769
			do
1794
				if [ $Lang == "fr" ]
1770
				if [ $Lang == "fr" ]
1795
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
1771
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
1796
					else echo -n "Do you want to use it (Y/n)?";
1772
					else echo -n "Do you want to use it (Y/n)?";
1797
				 fi
1773
				 fi
1798
				read response
1774
				read response
1799
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
1775
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
1800
				then rm -f /tmp/alcasar-conf*
1776
				then rm -f /tmp/alcasar-conf*
1801
				fi
1777
				fi
1802
			done
1778
			done
1803
		fi
1779
		fi
1804
# Test if update
1780
# Test if update
1805
		if [ -e /tmp/alcasar-conf* ] 
1781
		if [ -e /tmp/alcasar-conf* ] 
1806
		then
1782
		then
1807
			if [ $Lang == "fr" ]
1783
			if [ $Lang == "fr" ]
1808
				then echo "#### Installation avec mise à jour ####";
1784
				then echo "#### Installation avec mise à jour ####";
1809
				else echo "#### Installation with update     ####";
1785
				else echo "#### Installation with update     ####";
1810
			fi
1786
			fi
1811
# Extract the central configuration file
1787
# Extract the central configuration file
1812
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
1788
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
1813
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
1789
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
1814
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
1790
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
1815
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
1791
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
1816
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
1792
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
1817
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
1793
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
1818
			mode="update"
1794
			mode="update"
1819
		else
1795
		else
1820
			mode="install"
1796
			mode="install"
1821
		fi
1797
		fi
1822
		for func in init network ACC CA init_db param_radius param_web_radius param_chilli param_squid param_dansguardian antivirus param_ulogd param_nfsen param_dnsmasq BL cron fail2ban post_install
1798
		for func in init network ACC CA init_db param_radius param_web_radius param_chilli param_squid param_dansguardian antivirus param_ulogd param_nfsen param_dnsmasq BL cron fail2ban post_install
1823
		do
1799
		do
1824
			$func
1800
			$func
1825
# echo "*** 'debug' : end of function $func ***"; read a
1801
# echo "*** 'debug' : end of function $func ***"; read a
1826
		done
1802
		done
1827
		;;
1803
		;;
1828
	-u | --uninstall)
1804
	-u | --uninstall)
1829
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
1805
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
1830
		then
1806
		then
1831
			if [ $Lang == "fr" ]
1807
			if [ $Lang == "fr" ]
1832
				then echo "ALCASAR n'est pas installé!";
1808
				then echo "ALCASAR n'est pas installé!";
1833
				else echo "ALCASAR isn't installed!";
1809
				else echo "ALCASAR isn't installed!";
1834
			fi
1810
			fi
1835
			exit 0
1811
			exit 0
1836
		fi
1812
		fi
1837
		response=0
1813
		response=0
1838
		PTN='^[oOnN]$'
1814
		PTN='^[oOnN]$'
1839
		until [[ $(expr $response : $PTN) -gt 0 ]]
1815
		until [[ $(expr $response : $PTN) -gt 0 ]]
1840
		do
1816
		do
1841
			if [ $Lang == "fr" ]
1817
			if [ $Lang == "fr" ]
1842
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
1818
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
1843
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
1819
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
1844
			fi
1820
			fi
1845
			read response
1821
			read response
1846
		done
1822
		done
1847
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
1823
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
1848
		then
1824
		then
1849
			$DIR_SCRIPTS/alcasar-conf.sh --create
1825
			$DIR_SCRIPTS/alcasar-conf.sh --create
1850
		else	
1826
		else	
1851
			rm -f /tmp/alcasar-conf*
1827
			rm -f /tmp/alcasar-conf*
1852
		fi
1828
		fi
1853
# Uninstall the running version
1829
# Uninstall the running version
1854
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1830
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
1855
		;;
1831
		;;
1856
	*)
1832
	*)
1857
		echo "Argument inconnu :$1";
1833
		echo "Argument inconnu :$1";
1858
		echo "Unknown argument :$1";
1834
		echo "Unknown argument :$1";
1859
		echo "$usage"
1835
		echo "$usage"
1860
		exit 1
1836
		exit 1
1861
		;;
1837
		;;
1862
esac
1838
esac
1863
# end of script
1839
# end of script
1864
 
1840
 
1865
 
1841