Subversion Repositories ALCASAR

Rev

Rev 1527 | Rev 1530 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1527 Rev 1529
1
#!/bin/bash
1
#!/bin/bash
2
#  $Id: alcasar.sh 1527 2014-12-21 11:00:21Z franck $ 
2
#  $Id: alcasar.sh 1529 2014-12-21 16:17:23Z richard $ 
3
 
3
 
4
# alcasar.sh
4
# alcasar.sh
5
 
5
 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
6
# ALCASAR Install script -  CopyLeft ALCASAR Team [Rexy + 3abtux + Steweb + Crox + ...] 
7
# Ce programme est un logiciel libre ; This software is free and open source
7
# Ce programme est un logiciel libre ; This software is free and open source
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
8
# elle que publiée par la Free Software Foundation ; soit la version 3 de la Licence. 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
9
# Ce programme est distribué dans l'espoir qu'il sera utile, mais SANS AUCUNE GARANTIE ; 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
10
# sans même une garantie implicite de COMMERCIABILITE ou DE CONFORMITE A UNE UTILISATION PARTICULIERE. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
11
# Voir la Licence Publique Générale GNU pour plus de détails. 
12
 
12
 
13
#  team@alcasar.net
13
#  team@alcasar.net
14
 
14
 
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
15
# by Franck BOUIJOUX, Pascal LEVANT and Richard REY
16
# This script is distributed under the Gnu General Public License (GPL)
16
# This script is distributed under the Gnu General Public License (GPL)
17
 
17
 
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
18
# Script d'installation d'ALCASAR (Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau)
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
19
# ALCASAR est architecturé autour d'une distribution Linux Mageia minimaliste et les logiciels libres suivants :
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
20
# Install script for ALCASAR (a secured and authenticated Internet access control captive portal)
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
21
# ALCASAR is based on a stripped Mageia (LSB) with the following open source softwares :
22
#
22
#
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
23
# Coovachilli, freeradius, mariaDB, apache, netfilter, dansguardian, ntpd, openssl, dnsmasq, havp, libclamav, Ulog, fail2ban, NFsen and NFdump
24
 
24
 
25
# Options :
25
# Options :
26
#       -i or --install
26
#       -i or --install
27
#       -u or --uninstall
27
#       -u or --uninstall
28
 
28
 
29
# Functions :
29
# Functions :
30
#	testing			: connectivity tests, free space test and mageia version test
30
#	testing			: connectivity tests, free space test and mageia version test
31
#	init			: Installation of RPM and scripts
31
#	init			: Installation of RPM and scripts
32
#	network			: Network parameters
32
#	network			: Network parameters
33
#	ACC			: ALCASAR Control Center installation
33
#	ACC			: ALCASAR Control Center installation
34
#	CA			: Certification Authority initialization
34
#	CA			: Certification Authority initialization
35
#	init_db			: Initilization of radius database managed with MariaDB
35
#	init_db			: Initilization of radius database managed with MariaDB
36
#	radius			: FreeRadius initialisation
36
#	radius			: FreeRadius initialisation
37
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
37
#	radius_web		: copy ans modifiy original "freeradius web" in ACC
38
#	chilli			: coovachilli initialisation (+authentication page)
38
#	chilli			: coovachilli initialisation (+authentication page)
39
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
39
#	dansguardian		: DansGuardian filtering HTTP proxy configuration
40
#	antivirus		: HAVP + libclamav configuration
40
#	antivirus		: HAVP + libclamav configuration
41
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
41
#	tinyproxy		: little proxy for user filtered with "WL + antivirus" and "antivirus"
42
#	ulogd			: log system in userland (match NFLOG target of iptables)
42
#	ulogd			: log system in userland (match NFLOG target of iptables)
43
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
43
#	nfsen		:	: Configuration du grapheur nfsen pour apache 
44
#	dnsmasq			: Name server configuration
44
#	dnsmasq			: Name server configuration
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
45
#	BL			: BlackList of Toulouse configuration : split into 3 BL (for Dnsmasq, for dansguardian and for Netfilter)
46
#	cron			: Logs export + watchdog + connexion statistics
46
#	cron			: Logs export + watchdog + connexion statistics
47
#	fail2ban		: Fail2ban IDS installation and configuration
47
#	fail2ban		: Fail2ban IDS installation and configuration
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
48
#	gammu_smsd		: Autoregister addon via SMS (gammu-smsd)
49
#	post_install		: Security, log rotation, etc.
49
#	post_install		: Security, log rotation, etc.
50
 
50
 
51
DATE=`date '+%d %B %Y - %Hh%M'`
51
DATE=`date '+%d %B %Y - %Hh%M'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
52
DATE_SHORT=`date '+%d/%m/%Y'`
53
Lang=`echo $LANG|cut -c 1-2`
53
Lang=`echo $LANG|cut -c 1-2`
54
mode="install"
54
mode="install"
55
# ******* Files parameters - paramètres fichiers *********
55
# ******* Files parameters - paramètres fichiers *********
56
DIR_INSTALL=`pwd`				# current directory 
56
DIR_INSTALL=`pwd`				# current directory 
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
57
DIR_CONF="$DIR_INSTALL/conf"			# install directory (with conf files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
58
DIR_SCRIPTS="$DIR_INSTALL/scripts"		# install directory (with script files)
59
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
59
DIR_SAVE="/var/Save"				# backup directory (system_backup, user_db_backup, logs)
60
DIR_WEB="/var/www/html"				# directory of APACHE
60
DIR_WEB="/var/www/html"				# directory of APACHE
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
61
DIR_DG="/etc/dansguardian"			# directory of DansGuardian
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
62
DIR_ACC="$DIR_WEB/acc"				# directory of the 'ALCASAR Control Center'
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
63
DIR_DEST_BIN="/usr/local/bin"			# directory of ALCASAR scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
64
DIR_DEST_SBIN="/usr/local/sbin"			# directory of ALCASAR admin scripts
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
65
DIR_DEST_ETC="/usr/local/etc"			# directory of ALCASAR conf files
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
66
DIR_DEST_SHARE="/usr/local/share"		# directory of share files used by ALCASAR (dnsmasq for instance)
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
67
CONF_FILE="$DIR_DEST_ETC/alcasar.conf"		# central ALCASAR conf file
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
68
PASSWD_FILE="/root/ALCASAR-passwords.txt"	# text file with the passwords and shared secrets
69
# ******* DBMS parameters - paramètres SGBD ********
69
# ******* DBMS parameters - paramètres SGBD ********
70
DB_RADIUS="radius"				# database name used by FreeRadius server
70
DB_RADIUS="radius"				# database name used by FreeRadius server
71
DB_USER="radius"				# user name allows to request the users database
71
DB_USER="radius"				# user name allows to request the users database
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
72
DB_GAMMU="gammu"				# database name used by Gammu-smsd
73
# ******* Network parameters - paramètres réseau *******
73
# ******* Network parameters - paramètres réseau *******
74
HOSTNAME="alcasar"				# default hostname
74
HOSTNAME="alcasar"				# default hostname
75
DOMAIN="localdomain"				# default local domain
75
DOMAIN="localdomain"				# default local domain
76
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
76
EXTIF=`/sbin/ip route|grep default|cut -d" " -f5`						# EXTIF is connected to the ISP broadband modem/router (In France : Box-FAI)
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
77
INTIF=`/sbin/ip	link|grep '^[[:digit:]]:'|grep -v "lo\|$EXTIF\|tun0"|cut -d" " -f2|tr -d ":"`	# INTIF is connected to the consultation network
78
MTU="1500"
78
MTU="1500"
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
79
DEFAULT_PRIVATE_IP_MASK="192.168.182.1/24"	# Default ALCASAR IP address
80
# ****** Paths - chemin des commandes *******
80
# ****** Paths - chemin des commandes *******
81
SED="/bin/sed -i"
81
SED="/bin/sed -i"
82
# ****************** End of global parameters *********************
82
# ****************** End of global parameters *********************
83
 
83
 
84
license ()
84
license ()
85
{
85
{
86
	if [ $Lang == "fr" ]
86
	if [ $Lang == "fr" ]
87
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
87
	then cat $DIR_INSTALL/gpl-3.0.fr.txt | more
88
	else cat $DIR_INSTALL/gpl-3.0.txt | more
88
	else cat $DIR_INSTALL/gpl-3.0.txt | more
89
	fi
89
	fi
90
	echo "Taper sur Entrée pour continuer !"
90
	echo "Taper sur Entrée pour continuer !"
91
	echo "Enter to continue."
91
	echo "Enter to continue."
92
	read a
92
	read a
93
}
93
}
94
 
94
 
95
header_install ()
95
header_install ()
96
{
96
{
97
	clear
97
	clear
98
	echo "-----------------------------------------------------------------------------"
98
	echo "-----------------------------------------------------------------------------"
99
	echo "                     ALCASAR V$VERSION Installation"
99
	echo "                     ALCASAR V$VERSION Installation"
100
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
100
	echo "Application Libre pour le Contrôle d'Accès Sécurisé et Authentifié au Réseau"
101
	echo "-----------------------------------------------------------------------------"
101
	echo "-----------------------------------------------------------------------------"
102
}
102
}
103
 
103
 
104
##################################################################
104
##################################################################
105
##			Function "testing"			##
105
##			Function "testing"			##
106
## - Test of Mageia version					##
106
## - Test of Mageia version					##
-
 
107
## - Test of ALCASAR version (if already installed)		##
107
## - Test of free space on /var  (>10G)				##
108
## - Test of free space on /var  (>10G)				##
108
## - Test of Internet access					##
109
## - Test of Internet access					##
109
##################################################################
110
##################################################################
110
testing ()
111
testing ()
111
{
112
{
-
 
113
# Test of Mageia version
-
 
114
# extract the current Mageia version and hardware architecture (i586 ou X64)
-
 
115
	fic=`cat /etc/product.id`
-
 
116
	unknown_os=0
-
 
117
	old="$IFS"
-
 
118
	IFS=","
-
 
119
	set $fic
-
 
120
	for i in $*
-
 
121
	do
-
 
122
		if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
-
 
123
			then 
-
 
124
			DISTRIBUTION=`echo $i|cut -d"=" -f2`
-
 
125
			unknown_os=`expr $unknown_os + 1`
-
 
126
		fi
-
 
127
		if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
-
 
128
			then 
-
 
129
			CURRENT_VERSION=`echo $i|cut -d"=" -f2`
-
 
130
			unknown_os=`expr $unknown_os + 1`
-
 
131
		fi
-
 
132
		if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
-
 
133
			then 
-
 
134
			ARCH=`echo $i|cut -d"=" -f2`
-
 
135
			unknown_os=`expr $unknown_os + 1`
-
 
136
		fi
-
 
137
	done
-
 
138
	IFS="$old"
112
# Test if ALCASAR is already installed
139
# Test if ALCASAR is already installed
113
	if [ -e $CONF_FILE ]
140
	if [ -e $CONF_FILE ]
114
	then
141
	then
115
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
142
		current_version=`cat $CONF_FILE | grep VERSION | cut -d"=" -f2`
116
		if [ $Lang == "fr" ]
143
		if [ $Lang == "fr" ]
117
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
144
			then echo -n "La version "; echo -n $current_version ; echo " d'ALCASAR est déjà installée";
118
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
145
			else echo -n "ALCASAR Version "; echo -n $current_version ; echo " is already installed";
119
		fi
146
		fi
120
		response=0
147
		response=0
121
		PTN='^[oOnNyY]$'
148
		PTN='^[oOnNyY]$'
122
		until [[ $(expr $response : $PTN) -gt 0 ]]
149
		until [[ $(expr $response : $PTN) -gt 0 ]]
123
		do
150
		do
124
			if [ $Lang == "fr" ]
151
			if [ $Lang == "fr" ]
125
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
152
				then echo -n "Voulez-vous effectuer une mise à jour (O/n)? ";
126
				else echo -n "Do you want to update (Y/n)?";
153
				else echo -n "Do you want to update (Y/n)?";
127
			 fi
154
			 fi
128
			read response
155
			read response
129
		done
156
		done
130
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
157
		if [ "$response" = "n" ] || [ "$response" = "N" ] 
131
		then
158
		then
132
			rm -f /tmp/alcasar-conf*
159
			rm -f /tmp/alcasar-conf*
133
		else
160
		else
134
# Create a backup of running importants files
161
# Create a backup of running importants files
135
			$DIR_SCRIPTS/alcasar-conf.sh --create
162
			$DIR_SCRIPTS/alcasar-conf.sh --create
136
			mode="update"
163
			mode="update"
137
		fi
164
		fi
138
	else
-
 
139
		if [ ! -d /var/log/netflow/porttracker ]
-
 
140
			then
-
 
141
# Test of free space on /var
-
 
142
			free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
-
 
143
			if [ $free_space -lt 10 ]
-
 
144
				then
-
 
145
				if [ $Lang == "fr" ]
-
 
146
					then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
-
 
147
					else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
-
 
148
				fi
-
 
149
			exit 0
-
 
150
			fi
-
 
151
		fi
165
	fi
152
# Test of Mageia version
-
 
153
# extract the current Mageia version and hardware architecture (i586 ou X64)
-
 
154
		fic=`cat /etc/product.id`
-
 
155
		unknown_os=0
-
 
156
		old="$IFS"
-
 
157
		IFS=","
-
 
158
		set $fic
-
 
159
		for i in $*
-
 
160
		do
-
 
161
			if [ "`echo $i|grep distribution|cut -d'=' -f1`" == "distribution" ]
166
	if [[ ( $unknown_os != 3 ) || ("$DISTRIBUTION" != "Mageia" ) || ( "$CURRENT_VERSION" != "4" ) ]]
162
				then 
-
 
163
				DISTRIBUTION=`echo $i|cut -d"=" -f2`
-
 
164
				unknown_os=`expr $unknown_os + 1`
-
 
165
			fi
-
 
166
			if [ "`echo $i|grep version|cut -d'=' -f1`" == "version" ]
-
 
167
				then 
167
		then
168
				CURRENT_VERSION=`echo $i|cut -d"=" -f2`
-
 
169
				unknown_os=`expr $unknown_os + 1`
-
 
170
			fi
-
 
171
			if [ "`echo $i|grep arch|cut -d'=' -f1`" == "arch" ]
168
		if [ -e /tmp/alcasar-conf.tar.gz ] # update
172
				then 
-
 
173
				ARCH=`echo $i|cut -d"=" -f2`
-
 
174
				unknown_os=`expr $unknown_os + 1`
-
 
175
			fi
-
 
176
		done
-
 
177
		IFS="$old"
-
 
178
		if [[ ( $unknown_os != 3 || "$DISTRIBUTION" != "Mageia" ) && ( "$CURRENT_VERSION" != "4" ) ]]
-
 
179
			then
169
			then
-
 
170
			echo
180
			if [ $Lang == "fr" ]
171
			if [ $Lang == "fr" ]
181
				then	
172
				then	
182
				echo "L'installation ou la mise @ jour d'ALCASAR ne peut pas être réalisée."
173
				echo "La mise à jour automatique d'ALCASAR ne peut pas être réalisée."
-
 
174
				echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
183
				echo "Le système d'exploitation doit être remplacé (Mageia4)"
175
				echo "2 - Installez Linux-Mageia4.1 (cf. doc d'installation)"
-
 
176
				echo "3 - recopiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
184
			else
177
			else
185
				echo "The automatic update of ALCASAR can't be performed."
178
				echo "The automatic update of ALCASAR can't be performed."
-
 
179
				echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
-
 
180
				echo "2 - Install Linux-Mageia4.1 (cf. installation doc)"
-
 
181
				echo "3 - Copy again the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
-
 
182
			fi
-
 
183
		else
-
 
184
			if [ $Lang == "fr" ]
-
 
185
				then	
-
 
186
				echo "L'installation d'ALCASAR ne peut pas être réalisée."
-
 
187
			else
186
				echo "The OS must be replaced (Mageia4)"
188
				echo "The installation of ALCASAR can't be performed."
187
			fi
189
			fi
188
			if [ -e /tmp/alcasar-conf.tar.gz ]
-
 
189
				then
190
		fi
190
				echo
191
		echo
191
				if [ $Lang == "fr" ]
192
		if [ $Lang == "fr" ]
192
					then	
193
			then	
193
					echo "1 - Récupérez le fichier de configuration actuel (/tmp/alcasar-conf.tar.gz)."
194
			echo "Le système d'exploitation doit être remplacé (Mageia4.1)"
-
 
195
		else
194
					echo "2 - Installez Linux-Mageia4 (cf. doc d'installation)"
196
			echo "The OS must be replaced (Mageia4.1)"
-
 
197
		fi
-
 
198
		exit 0
-
 
199
	fi
195
					echo "3 - copiez le fichier 'alcasar-conf.tar.gz' dans le répertoire '/tmp' avant de lancer l'installation d'ALCASAR"
200
	if [ ! -d /var/log/netflow/porttracker ]
196
				else
201
		then
197
					echo "1 - Retrieve the configuration file (/tmp/alcasar-conf.tar.gz)"
202
# Test of free space on /var
198
					echo "2 - Install Linux-Mageia4 (cf. installation doc)"
203
		free_space=`df -BG --output=avail /var|tail -1|tr -d [:space:]G`
199
					echo "3 - Copy the file 'alcasar-conf.tar.gz' in the folder '/tmp' before launching the installation of ALCASAR"
204
		if [ $free_space -lt 10 ]
200
				fi
205
			then
-
 
206
			if [ $Lang == "fr" ]
-
 
207
				then echo "place disponible sur /var insufisante ($free_space Go au lieu de 10 Go au minimum)"
-
 
208
				else echo "not enough free space on /var ($free_space GB instead of at least 10 GB)"
201
			fi
209
			fi
202
			exit 0
210
		exit 0
203
		fi
211
		fi
204
	fi
212
	fi
205
	if [ $Lang == "fr" ]
213
	if [ $Lang == "fr" ]
206
		then echo -n "Tests des paramètres réseau : "
214
		then echo -n "Tests des paramètres réseau : "
207
		else echo -n "Network parameters tests : "
215
		else echo -n "Network parameters tests : "
208
	fi
216
	fi
209
 
-
 
210
# Test of Ethernet links state
217
# Test of Ethernet links state
211
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
218
	DOWN_IF=`/sbin/ip link|grep "NO-CARRIER"|cut -d":" -f2|tr -d " "`
212
	for i in $DOWN_IF
219
	for i in $DOWN_IF
213
	do
220
	do
214
		if [ $Lang == "fr" ]
221
		if [ $Lang == "fr" ]
215
		then 
222
		then 
216
			echo "Échec"
223
			echo "Échec"
217
			echo "Le lien réseau de la carte $i n'est pas actif."
224
			echo "Le lien réseau de la carte $i n'est pas actif."
218
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
225
			echo "Assurez-vous que cette carte est bien connectée à un équipement (commutateur, A.P., etc.)"
219
		else
226
		else
220
			echo "Failed"
227
			echo "Failed"
221
			echo "The link state of $i interface is down."
228
			echo "The link state of $i interface is down."
222
			echo "Make sure that this network card is connected to a switch or an A.P."
229
			echo "Make sure that this network card is connected to a switch or an A.P."
223
		fi
230
		fi
224
		exit 0
231
		exit 0
225
	done
232
	done
226
	echo -n "."
233
	echo -n "."
227
 
234
 
228
# Test EXTIF config files
235
# Test EXTIF config files
229
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
236
	PUBLIC_IP_MASK=`ip addr show $EXTIF|grep "inet "|cut -d" " -f6`
230
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
237
	PUBLIC_IP=`echo $PUBLIC_IP_MASK | cut -d"/" -f1`
231
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
238
	PUBLIC_GATEWAY=`ip route list|grep ^default|cut -d" " -f3`
232
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
239
	if [ `echo $PUBLIC_IP|wc -c` -lt 7 ] || [ `echo $PUBLIC_GATEWAY|wc -c` -lt 7 ]
233
	then
240
	then
234
		if [ $Lang == "fr" ]
241
		if [ $Lang == "fr" ]
235
		then 
242
		then 
236
			echo "Échec"
243
			echo "Échec"
237
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
244
			echo "La carte réseau connectée à Internet ($EXTIF) n'est pas correctement configurée."
238
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
245
			echo "Renseignez les champs suivants dans le fichier '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
239
			echo "Appliquez les changements : 'systemctl restart network'"
246
			echo "Appliquez les changements : 'systemctl restart network'"
240
		else
247
		else
241
			echo "Failed"
248
			echo "Failed"
242
			echo "The Internet connected network card ($EXTIF) isn't well configured."
249
			echo "The Internet connected network card ($EXTIF) isn't well configured."
243
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
250
			echo "The folowing parametres must be set in the file '/etc/sysconfig/network-scripts/ifcfg-$EXTIF' :"
244
			echo "Apply the new configuration 'systemctl restart network'"
251
			echo "Apply the new configuration 'systemctl restart network'"
245
		fi
252
		fi
246
		echo "DEVICE=$EXTIF"
253
		echo "DEVICE=$EXTIF"
247
		echo "IPADDR="
254
		echo "IPADDR="
248
		echo "NETMASK="
255
		echo "NETMASK="
249
		echo "GATEWAY="
256
		echo "GATEWAY="
250
		echo "DNS1="
257
		echo "DNS1="
251
		echo "DNS2="
258
		echo "DNS2="
252
		echo "ONBOOT=yes"
259
		echo "ONBOOT=yes"
253
		exit 0
260
		exit 0
254
	fi
261
	fi
255
	echo -n "."
262
	echo -n "."
256
 
263
 
257
# Test if router is alive (Box FAI)
264
# Test if router is alive (Box FAI)
258
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
265
	if [ `ip route list|grep -c ^default` -ne "1" ] ; then
259
		if [ $Lang == "fr" ]
266
		if [ $Lang == "fr" ]
260
		then 
267
		then 
261
			echo "Échec"
268
			echo "Échec"
262
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
269
			echo "Vous n'avez pas configuré l'accès à Internet ou le câble réseau n'est pas sur la bonne carte."
263
			echo "Réglez ce problème puis relancez ce script."
270
			echo "Réglez ce problème puis relancez ce script."
264
		else
271
		else
265
			echo "Failed"
272
			echo "Failed"
266
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
273
			echo "You haven't configured Internet access or Internet link is on the wrong Ethernet card"
267
			echo "Resolv this problem, then restart this script."
274
			echo "Resolv this problem, then restart this script."
268
		fi
275
		fi
269
		exit 0
276
		exit 0
270
	fi
277
	fi
271
	echo -n "."
278
	echo -n "."
272
# On teste le lien vers le routeur par defaut
279
# On teste le lien vers le routeur par defaut
273
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
280
	arp_reply=`/usr/sbin/arping -b -I$EXTIF -c1 -w2 $PUBLIC_GATEWAY|grep response|cut -d" " -f2`
274
	if [ $(expr $arp_reply) -eq 0 ]
281
	if [ $(expr $arp_reply) -eq 0 ]
275
	       	then
282
	       	then
276
		if [ $Lang == "fr" ]
283
		if [ $Lang == "fr" ]
277
		then 
284
		then 
278
			echo "Échec"
285
			echo "Échec"
279
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
286
			echo "Le routeur de site ou la Box Internet ($PUBLIC_GATEWAY) ne répond pas."
280
			echo "Réglez ce problème puis relancez ce script."
287
			echo "Réglez ce problème puis relancez ce script."
281
		else
288
		else
282
			echo "Failed"
289
			echo "Failed"
283
			echo "The Internet gateway doesn't answered"
290
			echo "The Internet gateway doesn't answered"
284
			echo "Resolv this problem, then restart this script."
291
			echo "Resolv this problem, then restart this script."
285
		fi
292
		fi
286
		exit 0
293
		exit 0
287
	fi
294
	fi
288
	echo -n "."
295
	echo -n "."
289
# On teste la connectivité Internet
296
# On teste la connectivité Internet
290
	rm -rf /tmp/con_ok.html
297
	rm -rf /tmp/con_ok.html
291
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
298
	/usr/bin/curl www.google.fr -s -o /tmp/con_ok.html
292
	if [ ! -e /tmp/con_ok.html ]
299
	if [ ! -e /tmp/con_ok.html ]
293
	then
300
	then
294
		if [ $Lang == "fr" ]
301
		if [ $Lang == "fr" ]
295
		then 
302
		then 
296
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
303
			echo "La tentative de connexion vers Internet a échoué (google.fr)."
297
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
304
			echo "Vérifiez que la carte $EXTIF est bien connectée au routeur du FAI."
298
			echo "Vérifiez la validité des adresses IP des DNS."
305
			echo "Vérifiez la validité des adresses IP des DNS."
299
		else
306
		else
300
			echo "The Internet connection try failed (google.fr)."
307
			echo "The Internet connection try failed (google.fr)."
301
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
308
			echo "Please, verify that the $EXTIF card is connected with the Internet gateway."
302
			echo "Verify the DNS IP addresses"
309
			echo "Verify the DNS IP addresses"
303
		fi
310
		fi
304
		exit 0
311
		exit 0
305
	fi
312
	fi
306
	rm -rf /tmp/con_ok.html
313
	rm -rf /tmp/con_ok.html
307
	echo ". : ok"
314
	echo ". : ok"
308
} # end of testing ()
315
} # end of testing ()
309
 
316
 
310
##################################################################
317
##################################################################
311
##			Function "init"				##
318
##			Function "init"				##
312
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
319
## - Création du fichier "/root/ALCASAR_parametres.txt"		##
313
## - Installation et modification des scripts du portail	##
320
## - Installation et modification des scripts du portail	##
314
##################################################################
321
##################################################################
315
init ()
322
init ()
316
{
323
{
317
	if [ "$mode" != "update" ]
324
	if [ "$mode" != "update" ]
318
	then
325
	then
319
# On affecte le nom d'organisme
326
# On affecte le nom d'organisme
320
		header_install
327
		header_install
321
		ORGANISME=!
328
		ORGANISME=!
322
		PTN='^[a-zA-Z0-9-]*$'
329
		PTN='^[a-zA-Z0-9-]*$'
323
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
330
		until [[ $(expr $ORGANISME : $PTN) -gt 0 ]]
324
                do
331
                do
325
			if [ $Lang == "fr" ]
332
			if [ $Lang == "fr" ]
326
			       	then echo -n "Entrez le nom de votre organisme : "
333
			       	then echo -n "Entrez le nom de votre organisme : "
327
				else echo -n "Enter the name of your organism : "
334
				else echo -n "Enter the name of your organism : "
328
			fi
335
			fi
329
			read ORGANISME
336
			read ORGANISME
330
			if [ "$ORGANISME" == "" ]
337
			if [ "$ORGANISME" == "" ]
331
				then
338
				then
332
				ORGANISME=!
339
				ORGANISME=!
333
			fi
340
			fi
334
		done
341
		done
335
	fi
342
	fi
336
# On crée aléatoirement les mots de passe et les secrets partagés
343
# On crée aléatoirement les mots de passe et les secrets partagés
337
	rm -f $PASSWD_FILE
344
	rm -f $PASSWD_FILE
338
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
345
	grubpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
339
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
346
	echo -n "Password to protect the GRUB boot menu (!!!qwerty keyboard) : " > $PASSWD_FILE
340
	echo "$grubpwd" >> $PASSWD_FILE
347
	echo "$grubpwd" >> $PASSWD_FILE
341
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
348
	md5_grubpwd=`/usr/bin/openssl passwd -1 $grubpwd`
342
	$SED "/^password.*/d" /boot/grub/menu.lst
349
	$SED "/^password.*/d" /boot/grub/menu.lst
343
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
350
	$SED "1ipassword --md5 $md5_grubpwd" /boot/grub/menu.lst
344
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
351
	mysqlpwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
345
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
352
	echo -n "Name and password of Mysql/mariadb administrator : " >> $PASSWD_FILE
346
	echo "root / $mysqlpwd" >> $PASSWD_FILE
353
	echo "root / $mysqlpwd" >> $PASSWD_FILE
347
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
354
	radiuspwd=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
348
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
355
	echo -n "Name and password of Mysql/mariadb user : " >> $PASSWD_FILE
349
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
356
	echo "$DB_USER / $radiuspwd" >> $PASSWD_FILE
350
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
357
	secretuam=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
351
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
358
	echo -n "Shared secret between the script 'intercept.php' and coova-chilli : " >> $PASSWD_FILE
352
	echo "$secretuam" >> $PASSWD_FILE
359
	echo "$secretuam" >> $PASSWD_FILE
353
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
360
	secretradius=`cat /dev/urandom | tr -dc [:alnum:] | head -c8`
354
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
361
	echo -n "Shared secret between coova-chilli and FreeRadius : " >> $PASSWD_FILE
355
	echo "$secretradius" >> $PASSWD_FILE
362
	echo "$secretradius" >> $PASSWD_FILE
356
	chmod 640 $PASSWD_FILE
363
	chmod 640 $PASSWD_FILE
357
# Scripts and conf files copy 
364
# Scripts and conf files copy 
358
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
365
#  - in /usr/local/bin :  alcasar-{CA.sh,conf.sh,import-clean.sh,iptables-bypass.sh,iptables.sh,log.sh,watchdog.sh}
359
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
366
	cp -f $DIR_SCRIPTS/alcasar* $DIR_DEST_BIN/. ; chown root:root $DIR_DEST_BIN/alcasar* ; chmod 740 $DIR_DEST_BIN/alcasar*
360
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
367
#  - in /usr/local/sbin :  alcasar-{bl.sh,bypass.sh,dateLog.sh,havp.sh,logout.sh,mysql.sh,nf.sh,profil.sh,uninstall.sh,version-list.sh,load-balancing.sh}
361
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
368
	cp -f $DIR_SCRIPTS/sbin/alcasar* $DIR_DEST_SBIN/. ; chown root:root $DIR_DEST_SBIN/alcasar* ; chmod 740 $DIR_DEST_SBIN/alcasar*
362
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
369
#  - in /usr/local/etc : alcasar-{bl-categories-enabled,dns-name,iptables-local.sh,services}
363
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
370
	cp -f $DIR_CONF/etc/alcasar* $DIR_DEST_ETC/. ; chown root:apache $DIR_DEST_ETC/alcasar* ; chmod 660 $DIR_DEST_ETC/alcasar*
364
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
371
	$SED "s?^radiussecret.*?radiussecret=\"$secretradius\"?g" $DIR_DEST_SBIN/alcasar-logout.sh
365
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
372
	$SED "s?^DB_RADIUS=.*?DB_RADIUS=\"$DB_RADIUS\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh
366
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
373
	$SED "s?^DB_USER=.*?DB_USER=\"$DB_USER\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
367
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
374
	$SED "s?^radiuspwd=.*?radiuspwd=\"$radiuspwd\"?g" $DIR_DEST_SBIN/alcasar-mysql.sh $DIR_DEST_BIN/alcasar-conf.sh
368
# generate central conf file
375
# generate central conf file
369
	cat <<EOF > $CONF_FILE
376
	cat <<EOF > $CONF_FILE
370
##########################################
377
##########################################
371
##                                      ##
378
##                                      ##
372
##          ALCASAR Parameters          ##
379
##          ALCASAR Parameters          ##
373
##                                      ##
380
##                                      ##
374
##########################################
381
##########################################
375
 
382
 
376
INSTALL_DATE=$DATE
383
INSTALL_DATE=$DATE
377
VERSION=$VERSION
384
VERSION=$VERSION
378
ORGANISM=$ORGANISME
385
ORGANISM=$ORGANISME
379
DOMAIN=$DOMAIN
386
DOMAIN=$DOMAIN
380
EOF
387
EOF
381
	chmod o-rwx $CONF_FILE
388
	chmod o-rwx $CONF_FILE
382
} # End of init ()
389
} # End of init ()
383
 
390
 
384
##################################################################
391
##################################################################
385
##			Function "network"			##
392
##			Function "network"			##
386
## - Définition du plan d'adressage du réseau de consultation	##
393
## - Définition du plan d'adressage du réseau de consultation	##
387
## - Nommage DNS du système 					##
394
## - Nommage DNS du système 					##
388
## - Configuration de l'interface INTIF (réseau de consultation)##
395
## - Configuration de l'interface INTIF (réseau de consultation)##
389
## - Modification du fichier /etc/hosts				##
396
## - Modification du fichier /etc/hosts				##
390
## - Configuration du serveur de temps (NTP)			##
397
## - Configuration du serveur de temps (NTP)			##
391
## - Renseignement des fichiers hosts.allow et hosts.deny	##
398
## - Renseignement des fichiers hosts.allow et hosts.deny	##
392
##################################################################
399
##################################################################
393
network ()
400
network ()
394
{
401
{
395
	header_install
402
	header_install
396
	if [ "$mode" != "update" ]
403
	if [ "$mode" != "update" ]
397
		then
404
		then
398
		if [ $Lang == "fr" ]
405
		if [ $Lang == "fr" ]
399
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
406
			then echo "Par défaut, l'adresse IP d'ALCASAR sur le réseau de consultation est : $DEFAULT_PRIVATE_IP_MASK"
400
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
407
			else echo "The default ALCASAR IP address on consultation network is : $DEFAULT_PRIVATE_IP_MASK"
401
		fi
408
		fi
402
		response=0
409
		response=0
403
		PTN='^[oOyYnN]$'
410
		PTN='^[oOyYnN]$'
404
		until [[ $(expr $response : $PTN) -gt 0 ]]
411
		until [[ $(expr $response : $PTN) -gt 0 ]]
405
		do
412
		do
406
			if [ $Lang == "fr" ]
413
			if [ $Lang == "fr" ]
407
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
414
				then echo -n "Voulez-vous utiliser cette adresse et ce plan d'adressage (recommandé) (O/n)? : "
408
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
415
				else echo -n "Do you want to use this IP address and this IP addressing plan (recommanded) (Y/n)? : "
409
			fi
416
			fi
410
			read response
417
			read response
411
		done
418
		done
412
		if [ "$response" = "n" ] || [ "$response" = "N" ]
419
		if [ "$response" = "n" ] || [ "$response" = "N" ]
413
		then
420
		then
414
			PRIVATE_IP_MASK="0"
421
			PRIVATE_IP_MASK="0"
415
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
422
			PTN='^\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\).\([01]\?[[:digit:]][[:digit:]]\?\|2[0-4][[:digit:]]\|25[0-5]\)/[012]\?[[:digit:]]$'
416
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
423
			until [[ $(expr $PRIVATE_IP_MASK : $PTN) -gt 0 ]]
417
			do
424
			do
418
				if [ $Lang == "fr" ]
425
				if [ $Lang == "fr" ]
419
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
426
					then echo -n "Entrez l'adresse IP d'ALCASAR au format CIDR (a.b.c.d/xx) : "
420
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
427
					else echo -n "Enter ALCASAR IP address in CIDR format (a.b.c.d/xx) : "
421
				fi
428
				fi
422
				read PRIVATE_IP_MASK
429
				read PRIVATE_IP_MASK
423
			done
430
			done
424
		else
431
		else
425
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
432
       			PRIVATE_IP_MASK=$DEFAULT_PRIVATE_IP_MASK
426
		fi
433
		fi
427
	else
434
	else
428
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
435
		PRIVATE_IP_MASK=`grep PRIVATE_IP conf/etc/alcasar.conf|cut -d"=" -f2` 
429
		rm -rf conf/etc/alcasar.conf
436
		rm -rf conf/etc/alcasar.conf
430
	fi
437
	fi
431
# Define LAN side global parameters
438
# Define LAN side global parameters
432
	hostname $HOSTNAME.$DOMAIN
439
	hostname $HOSTNAME.$DOMAIN
433
	echo $HOSTNAME.$DOMAIN > /etc/hostname
440
	echo $HOSTNAME.$DOMAIN > /etc/hostname
434
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
441
	PRIVATE_NETWORK=`/bin/ipcalc -n $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network address (ie.: 192.168.182.0)
435
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
442
	private_network_ending=`echo $PRIVATE_NETWORK | cut -d"." -f4`					# last octet of LAN address
436
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
443
	PRIVATE_NETMASK=`/bin/ipcalc -m $PRIVATE_IP_MASK | cut -d"=" -f2`				# private network mask (ie.: 255.255.255.0)
437
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
444
	PRIVATE_PREFIX=`/bin/ipcalc -p $PRIVATE_IP_MASK |cut -d"=" -f2`					# network prefix (ie. 24)
438
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
445
	PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`						# ALCASAR private ip address (consultation LAN side)
439
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
446
	if [ $PRIVATE_IP == $PRIVATE_NETWORK ]								# when entering network address instead of ip address
440
		then
447
		then
441
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
448
		PRIVATE_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	
442
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
449
		PRIVATE_IP_MASK=`echo $PRIVATE_IP/$PRIVATE_PREFIX`
443
	fi	
450
	fi	
444
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
451
	private_ip_ending=`echo $PRIVATE_IP | cut -d"." -f4`						# last octet of LAN address
445
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
452
	PRIVATE_SECOND_IP=`echo $PRIVATE_IP | cut -d"." -f1-3`"."`expr $private_ip_ending + 1`		# second network address (ex.: 192.168.182.2)
446
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
453
	PRIVATE_NETWORK_MASK=$PRIVATE_NETWORK/$PRIVATE_PREFIX						# ie.: 192.168.182.0/24
447
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
454
	classe=$((PRIVATE_PREFIX/8))									# ie.: 2=classe B, 3=classe C
448
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
455
	PRIVATE_NETWORK_SHORT=`echo $PRIVATE_NETWORK | cut -d"." -f1-$classe`.				# compatibility with hosts.allow et hosts.deny (ie.: 192.168.182.)
449
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
456
	PRIVATE_BROADCAST=`/bin/ipcalc -b $PRIVATE_NETWORK_MASK | cut -d"=" -f2`			# private network broadcast (ie.: 192.168.182.255)
450
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
457
	private_broadcast_ending=`echo $PRIVATE_BROADCAST | cut -d"." -f4`				# last octet of LAN broadcast
451
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
458
	PRIVATE_FIRST_IP=`echo $PRIVATE_NETWORK | cut -d"." -f1-3`"."`expr $private_network_ending + 1`	# First network address (ex.: 192.168.182.1)
452
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
459
	PRIVATE_LAST_IP=`echo $PRIVATE_BROADCAST | cut -d"." -f1-3`"."`expr $private_broadcast_ending - 1`	# last network address (ex.: 192.168.182.254)
453
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
460
	PRIVATE_MAC=`/sbin/ip link show $INTIF | grep ether | cut -d" " -f6`				# MAC address of INTIF
454
# Define Internet parameters
461
# Define Internet parameters
455
	DNS1=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|head -n 1`				# 1st DNS server
462
	DNS1=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|head -n 1`				# 1st DNS server
456
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
463
	nb_dns=`grep ^nameserver /etc/resolv.conf|wc -l`
457
	if [ $nb_dns == 2 ]
464
	if [ $nb_dns == 2 ]
458
		then
465
		then
459
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
466
		DNS2=`grep ^nameserver /etc/resolv.conf|cut -d" " -f2|tail -n 1`			# 2nd DNS server (if exist)
460
	fi
467
	fi
461
	DNS1=${DNS1:=208.67.220.220}
468
	DNS1=${DNS1:=208.67.220.220}
462
	DNS2=${DNS2:=208.67.222.222}
469
	DNS2=${DNS2:=208.67.222.222}
463
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
470
	PUBLIC_NETMASK=`/bin/ipcalc -m $PUBLIC_IP_MASK | cut -d"=" -f2`
464
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
471
	PUBLIC_PREFIX=`/bin/ipcalc -p $PUBLIC_IP $PUBLIC_NETMASK|cut -d"=" -f2`
465
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
472
	PUBLIC_NETWORK=`/bin/ipcalc -n $PUBLIC_IP/$PUBLIC_PREFIX|cut -d"=" -f2`
466
# Wrtie the conf file
473
# Wrtie the conf file
467
	echo "EXTIF=$EXTIF" >> $CONF_FILE
474
	echo "EXTIF=$EXTIF" >> $CONF_FILE
468
	echo "INTIF=$INTIF" >> $CONF_FILE
475
	echo "INTIF=$INTIF" >> $CONF_FILE
469
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
476
	IP_SETTING=`grep BOOTPROTO /etc/sysconfig/network-scripts/ifcfg-$EXTIF|cut -d"=" -f2`		# IP setting (static or dynamic)
470
	if [ $IP_SETTING == "dhcp" ]
477
	if [ $IP_SETTING == "dhcp" ]
471
		then
478
		then
472
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
479
		echo "PUBLIC_IP=dhcp" >> $CONF_FILE
473
		echo "GW=dhcp" >> $CONF_FILE 
480
		echo "GW=dhcp" >> $CONF_FILE 
474
	else
481
	else
475
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
482
		echo "PUBLIC_IP=$PUBLIC_IP/$PUBLIC_PREFIX" >> $CONF_FILE
476
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
483
		echo "GW=$PUBLIC_GATEWAY" >> $CONF_FILE 
477
	fi
484
	fi
478
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
485
	echo "PUBLIC_MTU=$MTU" >> $CONF_FILE
479
	echo "DNS1=$DNS1" >> $CONF_FILE
486
	echo "DNS1=$DNS1" >> $CONF_FILE
480
	echo "DNS2=$DNS2" >> $CONF_FILE
487
	echo "DNS2=$DNS2" >> $CONF_FILE
481
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
488
	echo "PRIVATE_IP=$PRIVATE_IP_MASK" >> $CONF_FILE
482
	echo "DHCP=on" >> $CONF_FILE
489
	echo "DHCP=on" >> $CONF_FILE
483
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
490
	echo "EXT_DHCP_IP=none" >> $CONF_FILE
484
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
491
	echo "RELAY_DHCP_IP=none" >> $CONF_FILE
485
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
492
	echo "RELAY_DHCP_PORT=none" >> $CONF_FILE
486
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
493
	echo "PROTOCOLS_FILTERING=off" >> $CONF_FILE
487
# network default
494
# network default
488
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
495
	[ -e /etc/sysconfig/network.default ] || cp /etc/sysconfig/network /etc/sysconfig/network.default
489
	cat <<EOF > /etc/sysconfig/network
496
	cat <<EOF > /etc/sysconfig/network
490
NETWORKING=yes
497
NETWORKING=yes
491
HOSTNAME="$HOSTNAME.$DOMAIN"
498
HOSTNAME="$HOSTNAME.$DOMAIN"
492
FORWARD_IPV4=true
499
FORWARD_IPV4=true
493
EOF
500
EOF
494
# /etc/hosts config
501
# /etc/hosts config
495
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
502
	[ -e /etc/hosts.default ] || cp /etc/hosts /etc/hosts.default
496
	cat <<EOF > /etc/hosts
503
	cat <<EOF > /etc/hosts
497
127.0.0.1	localhost
504
127.0.0.1	localhost
498
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
505
$PRIVATE_IP	$HOSTNAME.$DOMAIN $HOSTNAME $ORGANISME.$DOMAIN $ORGANISME
499
EOF
506
EOF
500
# EXTIF (Internet) config
507
# EXTIF (Internet) config
501
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
508
	[ -e /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF ] || cp /etc/sysconfig/network-scripts/ifcfg-$EXTIF /etc/sysconfig/network-scripts/default-ifcfg-$EXTIF
502
	if [ $IP_SETTING == "dhcp" ]
509
	if [ $IP_SETTING == "dhcp" ]
503
		then
510
		then
504
		$SED "s?^RESOLV_MODS=.*?RESOLV_MODS=yes?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
511
		$SED "s?^RESOLV_MODS=.*?RESOLV_MODS=yes?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
505
		$SED "s?^PEERDNS=.*?PEERDNS=no?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
512
		$SED "s?^PEERDNS=.*?PEERDNS=no?g" /etc/sysconfig/network-scripts/ifcfg-$EXTIF
506
		echo "DNS1=127.0.0.1" >> /etc/sysconfig/network-scripts/ifcfg-$EXTIF
513
		echo "DNS1=127.0.0.1" >> /etc/sysconfig/network-scripts/ifcfg-$EXTIF
507
	else	
514
	else	
508
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
515
		cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$EXTIF
509
DEVICE=$EXTIF
516
DEVICE=$EXTIF
510
BOOTPROTO=static
517
BOOTPROTO=static
511
IPADDR=$PUBLIC_IP
518
IPADDR=$PUBLIC_IP
512
NETMASK=$PUBLIC_NETMASK
519
NETMASK=$PUBLIC_NETMASK
513
GATEWAY=$PUBLIC_GATEWAY
520
GATEWAY=$PUBLIC_GATEWAY
514
DNS1=127.0.0.1
521
DNS1=127.0.0.1
515
RESOLV_MODS=yes
522
RESOLV_MODS=yes
516
ONBOOT=yes
523
ONBOOT=yes
517
METRIC=10
524
METRIC=10
518
MII_NOT_SUPPORTED=yes
525
MII_NOT_SUPPORTED=yes
519
IPV6INIT=no
526
IPV6INIT=no
520
IPV6TO4INIT=no
527
IPV6TO4INIT=no
521
ACCOUNTING=no
528
ACCOUNTING=no
522
USERCTL=no
529
USERCTL=no
523
MTU=$MTU
530
MTU=$MTU
524
EOF
531
EOF
525
	fi
532
	fi
526
# Config INTIF (consultation LAN) in normal mode
533
# Config INTIF (consultation LAN) in normal mode
527
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
534
	cat <<EOF > /etc/sysconfig/network-scripts/ifcfg-$INTIF
528
DEVICE=$INTIF
535
DEVICE=$INTIF
529
BOOTPROTO=static
536
BOOTPROTO=static
530
ONBOOT=yes
537
ONBOOT=yes
531
NOZEROCONF=yes
538
NOZEROCONF=yes
532
MII_NOT_SUPPORTED=yes
539
MII_NOT_SUPPORTED=yes
533
IPV6INIT=no
540
IPV6INIT=no
534
IPV6TO4INIT=no
541
IPV6TO4INIT=no
535
ACCOUNTING=no
542
ACCOUNTING=no
536
USERCTL=no
543
USERCTL=no
537
EOF
544
EOF
538
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
545
# Config of INTIF in bypass mode (see "alcasar-bypass.sh")
539
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
546
	cat <<EOF > /etc/sysconfig/network-scripts/default-ifcfg-$INTIF
540
DEVICE=$INTIF
547
DEVICE=$INTIF
541
BOOTPROTO=static
548
BOOTPROTO=static
542
IPADDR=$PRIVATE_IP
549
IPADDR=$PRIVATE_IP
543
NETMASK=$PRIVATE_NETMASK
550
NETMASK=$PRIVATE_NETMASK
544
ONBOOT=yes
551
ONBOOT=yes
545
METRIC=10
552
METRIC=10
546
NOZEROCONF=yes
553
NOZEROCONF=yes
547
MII_NOT_SUPPORTED=yes
554
MII_NOT_SUPPORTED=yes
548
IPV6INIT=no
555
IPV6INIT=no
549
IPV6TO4INIT=no
556
IPV6TO4INIT=no
550
ACCOUNTING=no
557
ACCOUNTING=no
551
USERCTL=no
558
USERCTL=no
552
EOF
559
EOF
553
# Mise à l'heure du serveur
560
# Mise à l'heure du serveur
554
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
561
	[ -e /etc/ntp/step-tickers.default ] || cp /etc/ntp/step-tickers /etc/ntp/step-tickers.default
555
	cat <<EOF > /etc/ntp/step-tickers
562
	cat <<EOF > /etc/ntp/step-tickers
556
0.fr.pool.ntp.org	# adapt to your country
563
0.fr.pool.ntp.org	# adapt to your country
557
1.fr.pool.ntp.org
564
1.fr.pool.ntp.org
558
2.fr.pool.ntp.org
565
2.fr.pool.ntp.org
559
EOF
566
EOF
560
# Configuration du serveur de temps (sur lui même)
567
# Configuration du serveur de temps (sur lui même)
561
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
568
	[ -e /etc/ntp.conf.default ] || cp /etc/ntp.conf /etc/ntp.conf.default
562
	cat <<EOF > /etc/ntp.conf
569
	cat <<EOF > /etc/ntp.conf
563
server 0.fr.pool.ntp.org	# adapt to your country
570
server 0.fr.pool.ntp.org	# adapt to your country
564
server 1.fr.pool.ntp.org
571
server 1.fr.pool.ntp.org
565
server 2.fr.pool.ntp.org
572
server 2.fr.pool.ntp.org
566
server 127.127.1.0   		# local clock si NTP internet indisponible ...
573
server 127.127.1.0   		# local clock si NTP internet indisponible ...
567
fudge 127.127.1.0 stratum 10
574
fudge 127.127.1.0 stratum 10
568
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
575
restrict $PRIVATE_NETWORK mask $PRIVATE_NETMASK nomodify notrap
569
restrict 127.0.0.1
576
restrict 127.0.0.1
570
driftfile /var/lib/ntp/drift
577
driftfile /var/lib/ntp/drift
571
logfile /var/log/ntp.log
578
logfile /var/log/ntp.log
572
EOF
579
EOF
573
 
580
 
574
	chown -R ntp:ntp /var/lib/ntp
581
	chown -R ntp:ntp /var/lib/ntp
575
# Renseignement des fichiers hosts.allow et hosts.deny
582
# Renseignement des fichiers hosts.allow et hosts.deny
576
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
583
	[ -e /etc/hosts.allow.default ]  || cp /etc/hosts.allow /etc/hosts.allow.default
577
	cat <<EOF > /etc/hosts.allow
584
	cat <<EOF > /etc/hosts.allow
578
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
585
ALL: LOCAL, 127.0.0.1, localhost, $PRIVATE_IP
579
sshd: ALL
586
sshd: ALL
580
ntpd: $PRIVATE_NETWORK_SHORT
587
ntpd: $PRIVATE_NETWORK_SHORT
581
EOF
588
EOF
582
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
589
	[ -e /etc/host.deny.default ]  || cp /etc/hosts.deny /etc/hosts.deny.default
583
	cat <<EOF > /etc/hosts.deny
590
	cat <<EOF > /etc/hosts.deny
584
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
591
ALL: ALL: spawn ( /bin/echo "service %d demandé par %c" | /bin/mail -s "Tentative d'accès au service %d par %c REFUSE !!!" security ) &
585
EOF
592
EOF
586
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
593
	chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau)
587
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
594
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW)
588
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
595
	echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked
589
# load conntrack ftp module
596
# load conntrack ftp module
590
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
597
	[ -e /etc/modprobe.preload.default ] || cp /etc/modprobe.preload /etc/modprobe.preload.default
591
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
598
	echo "ip_conntrack_ftp" >>  /etc/modprobe.preload
592
# load ipt_NETFLOW module
599
# load ipt_NETFLOW module
593
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
600
	echo "ipt_NETFLOW" >>  /etc/modprobe.preload
594
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
601
# modify iptables service files (start with "alcasar-iptables.sh" and stop with flush)
595
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
602
[ -e /lib/systemd/system/iptables.service.default ] || cp /lib/systemd/system/iptables.service /lib/systemd/system/iptables.service.default
596
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
603
$SED 's/ExecStart=\/usr\/libexec\/iptables.init start/ExecStart=\/usr\/local\/bin\/alcasar-iptables.sh/' /lib/systemd/system/iptables.service
597
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
604
[ -e /usr/libexec/iptables.init.default ] || cp /usr/libexec/iptables.init /usr/libexec/iptables.init.default
598
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
605
$SED "s?\[ -f \$IPTABLES_CONFIG \] .*?#&?" /usr/libexec/iptables.init # comment the test in order the stop function run (fluxh all rules & policies)
599
# 
606
# 
600
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
607
# the script "$DIR_DEST_BIN/alcasar-iptables.sh" is launched at the end in order to allow update via ssh
601
} # End of network ()
608
} # End of network ()
602
 
609
 
603
##################################################################
610
##################################################################
604
##			Function "ACC"				##
611
##			Function "ACC"				##
605
## - installation du centre de gestion (ALCASAR Control Center)	##
612
## - installation du centre de gestion (ALCASAR Control Center)	##
606
## - configuration du serveur web (Apache)			##
613
## - configuration du serveur web (Apache)			##
607
## - définition du 1er comptes de gestion 			##
614
## - définition du 1er comptes de gestion 			##
608
## - sécurisation des accès					##
615
## - sécurisation des accès					##
609
##################################################################
616
##################################################################
610
ACC ()
617
ACC ()
611
{
618
{
612
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
619
	[ -d $DIR_WEB ] && rm -rf $DIR_WEB
613
	mkdir $DIR_WEB
620
	mkdir $DIR_WEB
614
# Copie et configuration des fichiers du centre de gestion
621
# Copie et configuration des fichiers du centre de gestion
615
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
622
	cp -rf $DIR_INSTALL/web/* $DIR_WEB/
616
	echo "$VERSION" > $DIR_WEB/VERSION
623
	echo "$VERSION" > $DIR_WEB/VERSION
617
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
624
	$SED "s?99/99/9999?$DATE_SHORT?g" $DIR_ACC/menu.php
618
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
625
	$SED "s?\$DB_RADIUS = .*?\$DB_RADIUS = \"$DB_RADIUS\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
619
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
626
	$SED "s?\$DB_USER = .*?\$DB_USER = \"$DB_USER\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
620
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
627
	$SED "s?\$radiuspwd = .*?\$radiuspwd = \"$radiuspwd\"\;?g" $DIR_ACC/phpsysinfo/includes/xml/portail.php
621
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
628
	chmod 640 $DIR_ACC/phpsysinfo/includes/xml/portail.php
622
	chown -R apache:apache $DIR_WEB/*
629
	chown -R apache:apache $DIR_WEB/*
623
# create the backup structure :
630
# create the backup structure :
624
# - base = users database
631
# - base = users database
625
# - system_backup = alcasar conf file + users database
632
# - system_backup = alcasar conf file + users database
626
# - archive = tarball of "base + http firewall + netflow"
633
# - archive = tarball of "base + http firewall + netflow"
627
# - security = watchdog disconnection)
634
# - security = watchdog disconnection)
628
	for i in system_backup base archive security;
635
	for i in system_backup base archive security;
629
	do
636
	do
630
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
637
		[ -d $DIR_SAVE/$i ] || mkdir -p $DIR_SAVE/$i
631
	done
638
	done
632
	chown -R root:apache $DIR_SAVE
639
	chown -R root:apache $DIR_SAVE
633
# Configuration et sécurisation php
640
# Configuration et sécurisation php
634
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
641
	[ -e /etc/php.ini.default ] || cp /etc/php.ini /etc/php.ini.default
635
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
642
	timezone=`cat /etc/sysconfig/clock|grep ZONE|cut -d"=" -f2`
636
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
643
	$SED "s?^;date.timezone =.*?date.timezone = $timezone?g" /etc/php.ini
637
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
644
	$SED "s?^upload_max_filesize.*?upload_max_filesize = 100M?g" /etc/php.ini
638
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
645
	$SED "s?^post_max_size.*?post_max_size = 100M?g" /etc/php.ini
639
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
646
	$SED "s?^html_errors.*?html_errors = Off?g" /etc/php.ini
640
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
647
	$SED "s?^expose_php.*?expose_php = Off?g" /etc/php.ini
641
# Configuration et sécurisation Apache
648
# Configuration et sécurisation Apache
642
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
649
	rm -rf /var/www/cgi-bin/* /var/www/perl/* /var/www/icons/README* /var/www/error/README*
643
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
650
	[ -e /etc/httpd/conf/httpd.conf.default ] || cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/httpd.conf.default
644
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
651
	$SED "s?^#ServerName.*?ServerName $HOSTNAME.$DOMAIN?g" /etc/httpd/conf/httpd.conf
645
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
652
	$SED "s?^Listen.*?Listen $PRIVATE_IP:80?g" /etc/httpd/conf/httpd.conf
646
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
653
	$SED "s?^ServerTokens.*?ServerTokens Prod?g" /etc/httpd/conf/httpd.conf
647
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
654
	$SED "s?^ServerSignature.*?ServerSignature Off?g" /etc/httpd/conf/httpd.conf
648
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
655
	$SED "s?^#ErrorDocument 404 /missing.html.*?ErrorDocument 404 /index.html?g" /etc/httpd/conf/httpd.conf
649
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
656
	$SED "s?^LoadModule authn_anon_module.*?#LoadModule authn_anon_module modules/mod_authn_anon.so?g" /etc/httpd/conf/httpd.conf
650
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
657
	$SED "s?^LoadModule status_module.*?#LoadModule status_module modules/mod_status.so?g" /etc/httpd/conf/httpd.conf
651
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
658
	$SED "s?^LoadModule autoindex_module.*?#LoadModule autoindex_module modules/mod_autoindex.so?g" /etc/httpd/conf/httpd.conf
652
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
659
	$SED "s?^LoadModule info_module.*?#LoadModule info_module modules/mod_info.so?g" /etc/httpd/conf/httpd.conf
653
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
660
	$SED "s?^LoadModule imagemap_module.*?#LoadModule imagemap_module modules/mod_imagemap.so?g" /etc/httpd/conf/httpd.conf
654
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
661
	$SED "s?^LoadModule rewrite_module.*?#LoadModule rewrite_module modules/mod_rewrite.so?g" /etc/httpd/conf/httpd.conf
655
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
662
	$SED "s?LoadModule speling_module.*?LoadModule speling_module modules/mod_speling.so?g" /etc/httpd/conf/httpd.conf
656
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
663
	[ -e /etc/httpd/conf/conf.d/ssl.conf.default ] || cp /etc/httpd/conf/conf.d/ssl.conf /etc/httpd/conf/conf.d/ssl.conf.default
657
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
664
	$SED "s?^Listen.*?Listen $PRIVATE_IP:443?g" /etc/httpd/conf/conf.d/ssl.conf # Listen only on INTIF
658
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
665
	[ -e /usr/share/httpd/error/include/top.html.default ] || cp /usr/share/httpd/error/include/top.html /usr/share/httpd/error/include/top.html.default
659
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
666
	$SED "s?background-color.*?background-color: #EFEFEF; }?g" /usr/share/httpd/error/include/top.html
660
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
667
	[ -e /usr/share/httpd/error/include/bottom.html.default ] || cp /usr/share/httpd/error/include/bottom.html /usr/share/httpd/error/include/bottom.html.default
661
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
668
	cat <<EOF > /usr/share/httpd/error/include/bottom.html
662
</body>
669
</body>
663
</html>
670
</html>
664
EOF
671
EOF
665
# Définition du premier compte lié au profil 'admin'
672
# Définition du premier compte lié au profil 'admin'
666
	header_install
673
	header_install
667
	if [ "$mode" = "install" ]
674
	if [ "$mode" = "install" ]
668
	then
675
	then
669
		admin_portal=!
676
		admin_portal=!
670
		PTN='^[a-zA-Z0-9-]*$'
677
		PTN='^[a-zA-Z0-9-]*$'
671
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
678
		until [[ $(expr $admin_portal : $PTN) -gt 0 ]]
672
                	do
679
                	do
673
			header_install
680
			header_install
674
			if [ $Lang == "fr" ]
681
			if [ $Lang == "fr" ]
675
			then 
682
			then 
676
				echo ""
683
				echo ""
677
				echo "Définissez un premier compte d'administration du portail :"
684
				echo "Définissez un premier compte d'administration du portail :"
678
				echo
685
				echo
679
				echo -n "Nom : "
686
				echo -n "Nom : "
680
			else
687
			else
681
				echo ""
688
				echo ""
682
				echo "Define the first account allow to administrate the portal :"
689
				echo "Define the first account allow to administrate the portal :"
683
				echo
690
				echo
684
				echo -n "Account : "
691
				echo -n "Account : "
685
			fi
692
			fi
686
			read admin_portal
693
			read admin_portal
687
			if [ "$admin_portal" == "" ]
694
			if [ "$admin_portal" == "" ]
688
				then
695
				then
689
				admin_portal=!
696
				admin_portal=!
690
			fi
697
			fi
691
			done
698
			done
692
# Creation of keys file for the admin account ("admin")
699
# Creation of keys file for the admin account ("admin")
693
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
700
		[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
694
		mkdir -p $DIR_DEST_ETC/digest
701
		mkdir -p $DIR_DEST_ETC/digest
695
		chmod 755 $DIR_DEST_ETC/digest
702
		chmod 755 $DIR_DEST_ETC/digest
696
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
703
		until [ -s $DIR_DEST_ETC/digest/key_admin ]
697
			do
704
			do
698
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
705
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
699
			done
706
			done
700
		$DIR_DEST_SBIN/alcasar-profil.sh --list
707
		$DIR_DEST_SBIN/alcasar-profil.sh --list
701
	fi
708
	fi
702
# synchronisation horaire
709
# synchronisation horaire
703
	ntpd -q -g &
710
	ntpd -q -g &
704
# Sécurisation du centre
711
# Sécurisation du centre
705
	rm -f /etc/httpd/conf/webapps.d/alcasar*
712
	rm -f /etc/httpd/conf/webapps.d/alcasar*
706
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
713
	cat <<EOF > /etc/httpd/conf/webapps.d/alcasar.conf
707
<Directory $DIR_ACC>
714
<Directory $DIR_ACC>
708
	SSLRequireSSL
715
	SSLRequireSSL
709
	AllowOverride None
716
	AllowOverride None
710
	Order deny,allow
717
	Order deny,allow
711
	Deny from all
718
	Deny from all
712
	Allow from 127.0.0.1
719
	Allow from 127.0.0.1
713
	Allow from $PRIVATE_NETWORK_MASK
720
	Allow from $PRIVATE_NETWORK_MASK
714
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
721
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
715
	require valid-user
722
	require valid-user
716
	AuthType digest
723
	AuthType digest
717
	AuthName $HOSTNAME.$DOMAIN
724
	AuthName $HOSTNAME.$DOMAIN
718
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
725
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
719
	AuthUserFile $DIR_DEST_ETC/digest/key_all
726
	AuthUserFile $DIR_DEST_ETC/digest/key_all
720
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
727
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
721
</Directory>
728
</Directory>
722
<Directory $DIR_ACC/admin>
729
<Directory $DIR_ACC/admin>
723
	SSLRequireSSL
730
	SSLRequireSSL
724
	AllowOverride None
731
	AllowOverride None
725
	Order deny,allow
732
	Order deny,allow
726
	Deny from all
733
	Deny from all
727
	Allow from 127.0.0.1
734
	Allow from 127.0.0.1
728
	Allow from $PRIVATE_NETWORK_MASK
735
	Allow from $PRIVATE_NETWORK_MASK
729
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
736
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
730
	require valid-user
737
	require valid-user
731
	AuthType digest
738
	AuthType digest
732
	AuthName $HOSTNAME.$DOMAIN
739
	AuthName $HOSTNAME.$DOMAIN
733
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
740
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
734
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
741
	AuthUserFile $DIR_DEST_ETC/digest/key_admin
735
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
742
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
736
</Directory>
743
</Directory>
737
<Directory $DIR_ACC/manager>
744
<Directory $DIR_ACC/manager>
738
	SSLRequireSSL
745
	SSLRequireSSL
739
	AllowOverride None
746
	AllowOverride None
740
	Order deny,allow
747
	Order deny,allow
741
	Deny from all
748
	Deny from all
742
	Allow from 127.0.0.1
749
	Allow from 127.0.0.1
743
	Allow from $PRIVATE_NETWORK_MASK
750
	Allow from $PRIVATE_NETWORK_MASK
744
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
751
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
745
	require valid-user
752
	require valid-user
746
	AuthType digest
753
	AuthType digest
747
	AuthName $HOSTNAME.$DOMAIN
754
	AuthName $HOSTNAME.$DOMAIN
748
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
755
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
749
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
756
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
750
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
757
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
751
</Directory>
758
</Directory>
752
<Directory $DIR_ACC/backup>
759
<Directory $DIR_ACC/backup>
753
	SSLRequireSSL
760
	SSLRequireSSL
754
	AllowOverride None
761
	AllowOverride None
755
	Order deny,allow
762
	Order deny,allow
756
	Deny from all
763
	Deny from all
757
	Allow from 127.0.0.1
764
	Allow from 127.0.0.1
758
	Allow from $PRIVATE_NETWORK_MASK
765
	Allow from $PRIVATE_NETWORK_MASK
759
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
766
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
760
	require valid-user
767
	require valid-user
761
	AuthType digest
768
	AuthType digest
762
	AuthName $HOSTNAME.$DOMAIN
769
	AuthName $HOSTNAME.$DOMAIN
763
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
770
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
764
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
771
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
765
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
772
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
766
</Directory>
773
</Directory>
767
Alias /save/ "$DIR_SAVE/"
774
Alias /save/ "$DIR_SAVE/"
768
<Directory $DIR_SAVE>
775
<Directory $DIR_SAVE>
769
	SSLRequireSSL
776
	SSLRequireSSL
770
	Options Indexes
777
	Options Indexes
771
	Order deny,allow
778
	Order deny,allow
772
	Deny from all
779
	Deny from all
773
	Allow from 127.0.0.1
780
	Allow from 127.0.0.1
774
	Allow from $PRIVATE_NETWORK_MASK
781
	Allow from $PRIVATE_NETWORK_MASK
775
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
782
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
776
	require valid-user
783
	require valid-user
777
	AuthType digest
784
	AuthType digest
778
	AuthName $HOSTNAME.$DOMAIN
785
	AuthName $HOSTNAME.$DOMAIN
779
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
786
	AuthUserFile $DIR_DEST_ETC/digest/key_backup
780
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
787
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
781
</Directory>
788
</Directory>
782
<Directory $DIR_ACC/stats>
789
<Directory $DIR_ACC/stats>
783
	SSLRequireSSL
790
	SSLRequireSSL
784
	AllowOverride None
791
	AllowOverride None
785
	Order deny,allow
792
	Order deny,allow
786
	Deny from all
793
	Deny from all
787
	Allow from 127.0.0.1
794
	Allow from 127.0.0.1
788
	Allow from $PRIVATE_NETWORK_MASK
795
	Allow from $PRIVATE_NETWORK_MASK
789
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
796
#	Allow from AA.BB.CC.DD/32	# Allow from specific @IP
790
	require valid-user
797
	require valid-user
791
	AuthType digest
798
	AuthType digest
792
	AuthName $HOSTNAME.$DOMAIN
799
	AuthName $HOSTNAME.$DOMAIN
793
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
800
	BrowserMatch "MSIE" AuthDigestEnableQueryStringHack=On
794
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
801
	AuthUserFile $DIR_DEST_ETC/digest/key_manager
795
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
802
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN/
796
</Directory>
803
</Directory>
797
EOF
804
EOF
798
# Launch after coova
805
# Launch after coova
799
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
806
$SED "s?^After=.*?After=network.target remote-fs.target nss-lookup.target chilli.service?g" /lib/systemd/system/httpd.service
800
# Error page management
807
# Error page management
801
FIC_ERROR_DOC=`find /etc/httpd/conf -type f -name multilang-errordoc.conf`
808
FIC_ERROR_DOC=`find /etc/httpd/conf -type f -name multilang-errordoc.conf`
802
[ -e $FIC_ERROR_DOC ]  || cp $FIC_ERROR_DOC $FIC_ERROR_DOC.default
809
[ -e $FIC_ERROR_DOC ]  || cp $FIC_ERROR_DOC $FIC_ERROR_DOC.default
803
 
810
 
804
cat <<EOF > $FIC_ERROR_DOC
811
cat <<EOF > $FIC_ERROR_DOC
805
Alias /error/ "/var/www/html/"
812
Alias /error/ "/var/www/html/"
806
 
813
 
807
<Directory "/usr/share/httpd/error">
814
<Directory "/usr/share/httpd/error">
808
    AllowOverride None
815
    AllowOverride None
809
    Options IncludesNoExec
816
    Options IncludesNoExec
810
    AddOutputFilter Includes html
817
    AddOutputFilter Includes html
811
    AddHandler type-map var
818
    AddHandler type-map var
812
    Require all granted
819
    Require all granted
813
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
820
    LanguagePriority en cs de es fr it ja ko nl pl pt-br ro sv tr
814
    ForceLanguagePriority Prefer Fallback
821
    ForceLanguagePriority Prefer Fallback
815
</Directory>
822
</Directory>
816
 
823
 
817
ErrorDocument 400 /error/error.php?error=400
824
ErrorDocument 400 /error/error.php?error=400
818
ErrorDocument 401 /error/error.php?error=401
825
ErrorDocument 401 /error/error.php?error=401
819
ErrorDocument 403 /error/error.php?error=403
826
ErrorDocument 403 /error/error.php?error=403
820
ErrorDocument 404 /error/error.php?error=404
827
ErrorDocument 404 /error/error.php?error=404
821
ErrorDocument 405 /error/error.php?error=405
828
ErrorDocument 405 /error/error.php?error=405
822
ErrorDocument 408 /error/error.php?error=408
829
ErrorDocument 408 /error/error.php?error=408
823
ErrorDocument 410 /error/error.php?error=410
830
ErrorDocument 410 /error/error.php?error=410
824
ErrorDocument 411 /error/error.php?error=411
831
ErrorDocument 411 /error/error.php?error=411
825
ErrorDocument 412 /error/error.php?error=412
832
ErrorDocument 412 /error/error.php?error=412
826
ErrorDocument 413 /error/error.php?error=413
833
ErrorDocument 413 /error/error.php?error=413
827
ErrorDocument 414 /error/error.php?error=414
834
ErrorDocument 414 /error/error.php?error=414
828
ErrorDocument 415 /error/error.php?error=415
835
ErrorDocument 415 /error/error.php?error=415
829
ErrorDocument 500 /error/error.php?error=500
836
ErrorDocument 500 /error/error.php?error=500
830
ErrorDocument 501 /error/error.php?error=501
837
ErrorDocument 501 /error/error.php?error=501
831
ErrorDocument 502 /error/error.php?error=502
838
ErrorDocument 502 /error/error.php?error=502
832
ErrorDocument 503 /error/error.php?error=503
839
ErrorDocument 503 /error/error.php?error=503
833
ErrorDocument 506 /error/error.php?error=506
840
ErrorDocument 506 /error/error.php?error=506
834
EOF
841
EOF
835
 
842
 
836
# Initialization of Vnstat
843
# Initialization of Vnstat
837
	 [ -e /etc/vnstat.conf.default ]  || cp $FIC_VIRTUAL_SSL /etc/vnstat.conf.default
844
	 [ -e /etc/vnstat.conf.default ]  || cp $FIC_VIRTUAL_SSL /etc/vnstat.conf.default
838
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
845
	 $SED "s?Interface.*?Interface \"$EXTIF\"?g" /etc/vnstat.conf
839
	/usr/bin/vnstat -u -i $EXTIF
846
	/usr/bin/vnstat -u -i $EXTIF
840
 
847
 
841
} # End of ACC ()
848
} # End of ACC ()
842
 
849
 
843
##########################################################################################
850
##########################################################################################
844
##				Fonction "CA"						##
851
##				Fonction "CA"						##
845
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
852
## - Création d'une Autorité de Certification et du certificat serveur pour apache 	##
846
##########################################################################################
853
##########################################################################################
847
CA ()
854
CA ()
848
{
855
{
849
	$DIR_DEST_BIN/alcasar-CA.sh
856
	$DIR_DEST_BIN/alcasar-CA.sh
850
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
857
	FIC_VIRTUAL_SSL=`find /etc/httpd/conf -type f -name *default_ssl_vhost.conf`
851
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
858
	[ -e /etc/httpd/conf/vhosts-ssl.default ]  || cp $FIC_VIRTUAL_SSL /etc/httpd/conf/vhosts-ssl.default
852
	
859
	
853
	#$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
860
	#$SED "s?localhost.crt?alcasar.crt?g" $FIC_VIRTUAL_SSL
854
	#$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
861
	#$SED "s?localhost.key?alcasar.key?g" $FIC_VIRTUAL_SSL
855
	#$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
862
	#$SED "s?^#SSLCertificateChainFile.*?SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt?" $FIC_VIRTUAL_SSL
856
	
863
	
857
	cat <<EOF > $FIC_VIRTUAL_SSL
864
	cat <<EOF > $FIC_VIRTUAL_SSL
858
# default SSL virtual host, used for all HTTPS requests that do not
865
# default SSL virtual host, used for all HTTPS requests that do not
859
# match a ServerName or ServerAlias in any <VirtualHost> block.
866
# match a ServerName or ServerAlias in any <VirtualHost> block.
860
 
867
 
861
<VirtualHost _default_:443>
868
<VirtualHost _default_:443>
862
# general configuration
869
# general configuration
863
    ServerAdmin root@localhost
870
    ServerAdmin root@localhost
864
    ServerName localhost
871
    ServerName localhost
865
 
872
 
866
# SSL configuration
873
# SSL configuration
867
    SSLEngine on
874
    SSLEngine on
868
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
875
    SSLCertificateFile /etc/pki/tls/certs/alcasar.crt
869
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
876
    SSLCertificateKeyFile /etc/pki/tls/private/alcasar.key
870
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
877
    SSLCertificateChainFile /etc/pki/tls/certs/server-chain.crt
871
    CustomLog logs/ssl_request_log \
878
    CustomLog logs/ssl_request_log \
872
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
879
	"%t %{SSL_PROTOCOL}x %{SSL_CIPHER}x [%h] \"%r\" %b"
873
    ErrorLog logs/ssl_error_log
880
    ErrorLog logs/ssl_error_log
874
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
881
    ErrorLogFormat "[%t] [%m:%l] [client %a] %M"
875
</VirtualHost>
882
</VirtualHost>
876
EOF
883
EOF
877
 
884
 
878
	chown -R root:apache /etc/pki
885
	chown -R root:apache /etc/pki
879
	chmod -R 750 /etc/pki
886
	chmod -R 750 /etc/pki
880
} # End of CA ()
887
} # End of CA ()
881
 
888
 
882
##########################################################################################
889
##########################################################################################
883
##			Fonction "init_db"						##
890
##			Fonction "init_db"						##
884
## - Initialisation de la base Mysql							##
891
## - Initialisation de la base Mysql							##
885
## - Affectation du mot de passe de l'administrateur (root)				##
892
## - Affectation du mot de passe de l'administrateur (root)				##
886
## - Suppression des bases et des utilisateurs superflus				##
893
## - Suppression des bases et des utilisateurs superflus				##
887
## - Création de la base 'radius'							##
894
## - Création de la base 'radius'							##
888
## - Installation du schéma de cette base						##
895
## - Installation du schéma de cette base						##
889
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
896
## - Import des tables de comptabilité (mtotacct, totacct) et info_usagers (userinfo)	##
890
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
897
##       ces table proviennent de 'dialupadmin' (paquetage freeradius-web)		##
891
##########################################################################################
898
##########################################################################################
892
init_db ()
899
init_db ()
893
{
900
{
894
	rm -rf /var/lib/mysql # to be sure that there is no former installation
901
	rm -rf /var/lib/mysql # to be sure that there is no former installation
895
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
902
	[ -e /etc/my.cnf.default ] || cp /etc/my.cnf /etc/my.cnf.default
896
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
903
	$SED "s?^#bind-address.*?bind-address=127.0.0.1?g" /etc/my.cnf
897
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
904
	$SED "s?^tmpdir.*?tmpdir=/tmp?g" /etc/my.cnf
898
	systemctl start mysqld.service
905
	systemctl start mysqld.service
899
	sleep 4
906
	sleep 4
900
	mysqladmin -u root password $mysqlpwd
907
	mysqladmin -u root password $mysqlpwd
901
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
908
	MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
902
# Secure the server
909
# Secure the server
903
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
910
	$MYSQL="DROP DATABASE IF EXISTS test;DROP DATABASE IF EXISTS tmp;"
904
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
911
	$MYSQL="CONNECT mysql;DELETE from user where User='';DELETE FROM user WHERE User='root' AND Host NOT IN ('localhost','127.0.0.1','::1');FLUSH PRIVILEGES;" 
905
# Create 'radius' database
912
# Create 'radius' database
906
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
913
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_RADIUS;GRANT ALL ON $DB_RADIUS.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES;"
907
# Add an empty radius database structure
914
# Add an empty radius database structure
908
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
915
	mysql -u$DB_USER -p$radiuspwd $DB_RADIUS < $DIR_CONF/radiusd-db-vierge.sql
909
# modify the start script in order to close accounting connexion when the system is comming down or up
916
# modify the start script in order to close accounting connexion when the system is comming down or up
910
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
917
	[ -e /lib/systemd/system/mysqld.service.default ] || cp /lib/systemd/system/mysqld.service /lib/systemd/system/mysqld.service.default
911
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
918
	$SED "/ExecStartPost=/a ExecStop=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /usr/lib/systemd/system/mysqld.service
912
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
919
	$SED "/ExecStartPost=/a ExecStartPost=/usr/local/sbin/alcasar-mysql.sh -acct_stop" /lib/systemd/system/mysqld.service
913
	systemctl daemon-reload
920
	systemctl daemon-reload
914
} # End of init_db ()
921
} # End of init_db ()
915
 
922
 
916
##########################################################################
923
##########################################################################
917
##			Fonction "radius"				##
924
##			Fonction "radius"				##
918
## - Paramètrage des fichiers de configuration FreeRadius		##
925
## - Paramètrage des fichiers de configuration FreeRadius		##
919
## - Affectation du secret partagé entre coova-chilli et freeradius	##
926
## - Affectation du secret partagé entre coova-chilli et freeradius	##
920
## - Modification de fichier de conf pour l'accès à Mysql		##
927
## - Modification de fichier de conf pour l'accès à Mysql		##
921
##########################################################################
928
##########################################################################
922
radius ()
929
radius ()
923
{
930
{
924
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
931
	cp -f $DIR_CONF/radiusd-db-vierge.sql /etc/raddb/
925
	chown -R radius:radius /etc/raddb
932
	chown -R radius:radius /etc/raddb
926
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
933
	[ -e /etc/raddb/radiusd.conf.default ] || cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.default
927
# Set radius.conf parameters
934
# Set radius.conf parameters
928
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
935
	$SED "s?^[\t ]*#[\t ]*user =.*?user = radius?g" /etc/raddb/radiusd.conf
929
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
936
	$SED "s?^[\t ]*#[\t ]*group =.*?group = radius?g" /etc/raddb/radiusd.conf
930
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
937
	$SED "s?^[\t ]*status_server =.*?status_server = no?g" /etc/raddb/radiusd.conf
931
# remove the proxy function
938
# remove the proxy function
932
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
939
	$SED "s?^[\t ]*proxy_requests.*?proxy_requests = no?g" /etc/raddb/radiusd.conf
933
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
940
	$SED "s?^[\t ]*\$INCLUDE proxy.conf.*?#\$INCLUDE proxy.conf?g" /etc/raddb/radiusd.conf
934
# remove EAP module
941
# remove EAP module
935
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
942
	$SED "s?^[\t ]*\$INCLUDE eap.conf.*?#\$INCLUDE eap.conf?g" /etc/raddb/radiusd.conf
936
# listen on loopback (should be modified later if EAP enabled)
943
# listen on loopback (should be modified later if EAP enabled)
937
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
944
	$SED "s?^[\t ]*ipaddr =.*?ipaddr = 127.0.0.1?g" /etc/raddb/radiusd.conf
938
# enable the  SQL module (and SQL counter)
945
# enable the  SQL module (and SQL counter)
939
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
946
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql.conf.*?\$INCLUDE sql.conf?g" /etc/raddb/radiusd.conf
940
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
947
	$SED "s?^[\t ]*#[\t ]*\$INCLUDE sql/mysql/counter.conf?\$INCLUDE sql/mysql/counter.conf?g" /etc/raddb/radiusd.conf
941
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
948
	$SED "s?^[\t ]*\$INCLUDE policy.conf?#\$INCLUDE policy.conf?g" /etc/raddb/radiusd.conf
942
# only include modules for ALCASAR needs
949
# only include modules for ALCASAR needs
943
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
950
	$SED "s?^[\t ]*\$INCLUDE \${confdir}/modules/.*?\t#\$INCLUDE \${confdir}/modules/\n\t# we only include modules for ALCASAR needs\n\t\$INCLUDE \${confdir}/modules/attr_filter\n\t\$INCLUDE \${confdir}/modules/expiration\n\t\$INCLUDE \${confdir}/modules/logintime\n\t\$INCLUDE \${confdir}/modules/ldap\n\t\$INCLUDE \${confdir}/modules/pap?g" /etc/raddb/radiusd.conf
944
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
951
	$SED "s/^[\t ]exec$/\#\texec/g" /etc/raddb/radiusd.conf
945
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
952
	$SED "s?^[\t ]*expr.*?\#\texpr?g" /etc/raddb/radiusd.conf
946
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
953
	$SED "s?^[\t ]*\#	daily.*?\#\tdaily\n\tsql?g" /etc/raddb/radiusd.conf
947
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
954
	$SED "s?^[\t ]*logintime.*?\tlogintime\n\tnoresetcounter\n\tdailycounter\n\tmonthlycounter\n\tattr_filter.access_reject\n\tattr_filter.accounting_response\n\tpap?g" /etc/raddb/radiusd.conf
948
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
955
	$SED "s?^[\t ]*\$INCLUDE sites-enabled/.*?\#\$INCLUDE sites-enabled/\n\#\tenable only alcasar virtual server\n\$INCLUDE sites-enabled/alcasar?g" /etc/raddb/radiusd.conf
949
# remvove virtual server and copy our conf file
956
# remvove virtual server and copy our conf file
950
	rm -f /etc/raddb/sites-enabled/*
957
	rm -f /etc/raddb/sites-enabled/*
951
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
958
       	cp $DIR_CONF/radius/alcasar-radius /etc/raddb/sites-available/alcasar
952
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
959
	chown radius:apache /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap # droits rw pour apache (module ldap)
953
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
960
	chmod 660 /etc/raddb/sites-available/alcasar /etc/raddb/modules/ldap
954
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
961
	chgrp apache /etc/raddb /etc/raddb/sites-available /etc/raddb/modules
955
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
962
	ln -s /etc/raddb/sites-available/alcasar /etc/raddb/sites-enabled/alcasar
956
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
963
# Inutile dans notre fonctionnement mais les liens sont recréés par un update de radius ... donc forcé en tant que fichier à 'vide'
957
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
964
	touch /etc/raddb/sites-enabled/{inner-tunnel,control-socket,default}
958
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
965
# client.conf configuration (127.0.0.1 suffit mais on laisse le deuxième client pour la future gestion de l'EAP)
959
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
966
	[ -e /etc/raddb/clients.conf.default ] || cp -f /etc/raddb/clients.conf /etc/raddb/clients.conf.default
960
	cat << EOF > /etc/raddb/clients.conf
967
	cat << EOF > /etc/raddb/clients.conf
961
client 127.0.0.1 {
968
client 127.0.0.1 {
962
	secret = $secretradius
969
	secret = $secretradius
963
	shortname = localhost
970
	shortname = localhost
964
}
971
}
965
EOF
972
EOF
966
# sql.conf modification
973
# sql.conf modification
967
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
974
	[ -e /etc/raddb/sql.conf.default ] || cp /etc/raddb/sql.conf /etc/raddb/sql.conf.default
968
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
975
	$SED "s?^[\t ]*login =.*?login = \"$DB_USER\"?g" /etc/raddb/sql.conf
969
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
976
	$SED "s?^[\t ]*password =.*?password = \"$radiuspwd\"?g" /etc/raddb/sql.conf
970
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
977
	$SED "s?^[\t ]*radius_db =.*?radius_db = \"$DB_RADIUS\"?g" /etc/raddb/sql.conf
971
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
978
	$SED "s?^[\t ]*sqltrace =.*?sqltrace = no?g" /etc/raddb/sql.conf
972
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
979
# dialup.conf modification (case sensitive for username, check simultaneous use, patch on 'postauth' table, etc.) 
973
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
980
	[ -e /etc/raddb/sql/mysql/dialup.conf.default ] || cp /etc/raddb/sql/mysql/dialup.conf /etc/raddb/sql/mysql/dialup.conf.default
974
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
981
	cp -f $DIR_CONF/radius/dialup.conf /etc/raddb/sql/mysql/dialup.conf
975
# counter.conf modification (change the Max-All-Session-Time counter)
982
# counter.conf modification (change the Max-All-Session-Time counter)
976
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
983
	[ -e /etc/raddb/sql/mysql/counter.conf.default ] || cp /etc/raddb/sql/mysql/counter.conf /etc/raddb/sql/mysql/counter.conf.default
977
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
984
	cp -f $DIR_CONF/radius/counter.conf /etc/raddb/sql/mysql/counter.conf
978
	chown -R radius:radius /etc/raddb/sql/mysql/*
985
	chown -R radius:radius /etc/raddb/sql/mysql/*
979
# make certain that mysql is up before radius start
986
# make certain that mysql is up before radius start
980
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
987
	[ -e /lib/systemd/system/radiusd.service.default ] || cp /lib/systemd/system/radiusd.service /lib/systemd/system/radiusd.service.default
981
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
988
	$SED "s?^After=.*?After=syslog.target network.target mysqld.service?g" /lib/systemd/system/radiusd.service
982
	systemctl daemon-reload
989
	systemctl daemon-reload
983
} # End radius ()
990
} # End radius ()
984
 
991
 
985
##########################################################################
992
##########################################################################
986
##			Function "radius_web"				##
993
##			Function "radius_web"				##
987
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
994
## - Import, modification et paramètrage de l'interface "dialupadmin"	##
988
## - Création du lien vers la page de changement de mot de passe        ##
995
## - Création du lien vers la page de changement de mot de passe        ##
989
##########################################################################
996
##########################################################################
990
radius_web ()
997
radius_web ()
991
{
998
{
992
# copie de l'interface d'origine dans la structure Alcasar
999
# copie de l'interface d'origine dans la structure Alcasar
993
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
1000
	[ -d /usr/share/freeradius-web ] && cp -rf /usr/share/freeradius-web/* $DIR_ACC/manager/
994
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
1001
	rm -f $DIR_ACC/manager/index.html $DIR_ACC/manager/readme 
995
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
1002
	rm -f $DIR_ACC/manager/htdocs/about.html $DIR_ACC/manager/htdocs/index.html $DIR_ACC/manager/htdocs/content.html
996
# copie des fichiers modifiés
1003
# copie des fichiers modifiés
997
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
1004
	cp -rf $DIR_INSTALL/web/acc/manager/* $DIR_ACC/manager/
998
	chown -R apache:apache $DIR_ACC/manager/
1005
	chown -R apache:apache $DIR_ACC/manager/
999
# Modification des fichiers de configuration
1006
# Modification des fichiers de configuration
1000
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1007
	[ -e /etc/freeradius-web/admin.conf.default ] || cp /etc/freeradius-web/admin.conf /etc/freeradius-web/admin.conf.default
1001
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1008
	$SED "s?^general_domain:.*?general_domain: $DOMAIN?g" /etc/freeradius-web/admin.conf
1002
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1009
	$SED "s?^sql_username:.*?sql_username: $DB_USER?g" /etc/freeradius-web/admin.conf
1003
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1010
	$SED "s?^sql_password:.*?sql_password: $radiuspwd?g" /etc/freeradius-web/admin.conf
1004
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1011
	$SED "s?^sql_debug:.*?sql_debug: false?g" /etc/freeradius-web/admin.conf
1005
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1012
	$SED "s?^sql_usergroup_table: .*?sql_usergroup_table: radusergroup?g" /etc/freeradius-web/admin.conf
1006
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1013
	$SED "s?^sql_password_attribute:.*?sql_password_attribute: Crypt-Password?g" /etc/freeradius-web/admin.conf
1007
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1014
	$SED "s?^general_finger_type.*?# general_finger_type: snmp?g" /etc/freeradius-web/admin.conf
1008
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1015
	$SED "s?^general_stats_use_totacct.*?general_stats_use_totacct: yes?g" /etc/freeradius-web/admin.conf
1009
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1016
	$SED "s?^general_charset.*?general_charset: utf-8?g" /etc/freeradius-web/admin.conf
1010
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1017
	[ -e /etc/freeradius-web/config.php.default ] || cp /etc/freeradius-web/config.php /etc/freeradius-web/config.php.default
1011
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1018
	cp -f $DIR_CONF/radius/freeradiusweb-config.php /etc/freeradius-web/config.php
1012
	cat <<EOF > /etc/freeradius-web/naslist.conf
1019
	cat <<EOF > /etc/freeradius-web/naslist.conf
1013
nas1_name: alcasar-$ORGANISME
1020
nas1_name: alcasar-$ORGANISME
1014
nas1_model: Portail captif
1021
nas1_model: Portail captif
1015
nas1_ip: $PRIVATE_IP
1022
nas1_ip: $PRIVATE_IP
1016
nas1_port_num: 0
1023
nas1_port_num: 0
1017
nas1_community: public
1024
nas1_community: public
1018
EOF
1025
EOF
1019
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1026
# Modification des attributs visibles lors de la création d'un usager ou d'un groupe
1020
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1027
	[ -e /etc/freeradius-web/user_edit.attrs.default ] || mv /etc/freeradius-web/user_edit.attrs /etc/freeradius-web/user_edit.attrs.default
1021
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1028
	cp -f $DIR_CONF/radius/user_edit.attrs /etc/freeradius-web/user_edit.attrs
1022
# Ajout du mappage des attributs chillispot
1029
# Ajout du mappage des attributs chillispot
1023
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1030
	[ -e /etc/freeradius-web/sql.attrmap.default ] || mv /etc/freeradius-web/sql.attrmap /etc/freeradius-web/sql.attrmap.default
1024
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1031
	cp -f $DIR_CONF/radius/sql.attrmap /etc/freeradius-web/sql.attrmap
1025
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1032
# Modification des attributs visibles sur les pages des statistiques (suppression NAS_IP et NAS_port)
1026
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1033
	[ -e /etc/freeradius-web/sql.attrs.default ] || cp /etc/freeradius-web/sql.attrs /etc/freeradius-web/sql.attrs.default
1027
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1034
	$SED "s?^NASIPAddress.*?NASIPAddress\tNas IP Address\tno?g" /etc/freeradius-web/sql.attrs
1028
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1035
	$SED "s?^NASPortId.*?NASPortId\tNas Port\tno?g" /etc/freeradius-web/sql.attrs
1029
	chown -R apache:apache /etc/freeradius-web
1036
	chown -R apache:apache /etc/freeradius-web
1030
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1037
# Ajout de l'alias vers la page de "changement de mot de passe usager"
1031
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1038
	cat <<EOF >> /etc/httpd/conf/webapps.d/alcasar.conf
1032
<Directory $DIR_WEB/pass>
1039
<Directory $DIR_WEB/pass>
1033
	SSLRequireSSL
1040
	SSLRequireSSL
1034
	AllowOverride None
1041
	AllowOverride None
1035
	Order deny,allow
1042
	Order deny,allow
1036
	Deny from all
1043
	Deny from all
1037
	Allow from 127.0.0.1
1044
	Allow from 127.0.0.1
1038
	Allow from $PRIVATE_NETWORK_MASK
1045
	Allow from $PRIVATE_NETWORK_MASK
1039
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1046
	ErrorDocument 404 https://$HOSTNAME.$DOMAIN
1040
</Directory>
1047
</Directory>
1041
EOF
1048
EOF
1042
} # End of radius_web ()
1049
} # End of radius_web ()
1043
 
1050
 
1044
##################################################################################
1051
##################################################################################
1045
##			Fonction "chilli"					##
1052
##			Fonction "chilli"					##
1046
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1053
## - Création du fichier d'initialisation et de configuration de coova-chilli	##
1047
## - Paramètrage de la page d'authentification (intercept.php)			##
1054
## - Paramètrage de la page d'authentification (intercept.php)			##
1048
##################################################################################
1055
##################################################################################
1049
chilli ()
1056
chilli ()
1050
{
1057
{
1051
# chilli unit for systemd
1058
# chilli unit for systemd
1052
cat << EOF > /lib/systemd/system/chilli.service
1059
cat << EOF > /lib/systemd/system/chilli.service
1053
#  This file is part of systemd.
1060
#  This file is part of systemd.
1054
#
1061
#
1055
#  systemd is free software; you can redistribute it and/or modify it
1062
#  systemd is free software; you can redistribute it and/or modify it
1056
#  under the terms of the GNU General Public License as published by
1063
#  under the terms of the GNU General Public License as published by
1057
#  the Free Software Foundation; either version 2 of the License, or
1064
#  the Free Software Foundation; either version 2 of the License, or
1058
#  (at your option) any later version.
1065
#  (at your option) any later version.
1059
[Unit]
1066
[Unit]
1060
Description=chilli is a captive portal daemon
1067
Description=chilli is a captive portal daemon
1061
After=network.target
1068
After=network.target
1062
 
1069
 
1063
[Service]
1070
[Service]
1064
Type=forking
1071
Type=forking
1065
ExecStart=/usr/libexec/chilli start
1072
ExecStart=/usr/libexec/chilli start
1066
ExecStop=/usr/libexec/chilli stop
1073
ExecStop=/usr/libexec/chilli stop
1067
ExecReload=/usr/libexec/chilli reload
1074
ExecReload=/usr/libexec/chilli reload
1068
PIDFile=/var/run/chilli.pid
1075
PIDFile=/var/run/chilli.pid
1069
 
1076
 
1070
[Install]
1077
[Install]
1071
WantedBy=multi-user.target
1078
WantedBy=multi-user.target
1072
EOF
1079
EOF
1073
# init file creation
1080
# init file creation
1074
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1081
	[ -e /etc/init.d/chilli.default ] || mv /etc/init.d/chilli /etc/init.d/chilli.default
1075
	cat <<EOF > /usr/libexec/chilli
1082
	cat <<EOF > /usr/libexec/chilli
1076
#!/bin/sh
1083
#!/bin/sh
1077
#
1084
#
1078
# chilli CoovaChilli init
1085
# chilli CoovaChilli init
1079
#
1086
#
1080
# chkconfig: 2345 65 35
1087
# chkconfig: 2345 65 35
1081
# description: CoovaChilli
1088
# description: CoovaChilli
1082
### BEGIN INIT INFO
1089
### BEGIN INIT INFO
1083
# Provides:       chilli
1090
# Provides:       chilli
1084
# Required-Start: network 
1091
# Required-Start: network 
1085
# Should-Start: 
1092
# Should-Start: 
1086
# Required-Stop:  network
1093
# Required-Stop:  network
1087
# Should-Stop: 
1094
# Should-Stop: 
1088
# Default-Start:  2 3 5
1095
# Default-Start:  2 3 5
1089
# Default-Stop:
1096
# Default-Stop:
1090
# Description:    CoovaChilli access controller
1097
# Description:    CoovaChilli access controller
1091
### END INIT INFO
1098
### END INIT INFO
1092
 
1099
 
1093
[ -f /usr/sbin/chilli ] || exit 0
1100
[ -f /usr/sbin/chilli ] || exit 0
1094
. /etc/init.d/functions
1101
. /etc/init.d/functions
1095
CONFIG=/etc/chilli.conf
1102
CONFIG=/etc/chilli.conf
1096
pidfile=/var/run/chilli.pid
1103
pidfile=/var/run/chilli.pid
1097
[ -f \$CONFIG ] || {
1104
[ -f \$CONFIG ] || {
1098
    echo "\$CONFIG Not found"
1105
    echo "\$CONFIG Not found"
1099
    exit 0
1106
    exit 0
1100
}
1107
}
1101
RETVAL=0
1108
RETVAL=0
1102
prog="chilli"
1109
prog="chilli"
1103
case \$1 in
1110
case \$1 in
1104
    start)
1111
    start)
1105
	if [ -f \$pidfile ] ; then 
1112
	if [ -f \$pidfile ] ; then 
1106
		gprintf "chilli is already running"
1113
		gprintf "chilli is already running"
1107
	else
1114
	else
1108
        	gprintf "Starting \$prog: "
1115
        	gprintf "Starting \$prog: "
1109
		rm -f /var/run/chilli* # cleaning
1116
		rm -f /var/run/chilli* # cleaning
1110
        	/sbin/modprobe tun >/dev/null 2>&1
1117
        	/sbin/modprobe tun >/dev/null 2>&1
1111
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1118
        	echo 1 > /proc/sys/net/ipv4/ip_forward
1112
		[ -e /dev/net/tun ] || {
1119
		[ -e /dev/net/tun ] || {
1113
	    	(cd /dev; 
1120
	    	(cd /dev; 
1114
			mkdir net; 
1121
			mkdir net; 
1115
			cd net; 
1122
			cd net; 
1116
			mknod tun c 10 200)
1123
			mknod tun c 10 200)
1117
		}
1124
		}
1118
		ifconfig $INTIF 0.0.0.0
1125
		ifconfig $INTIF 0.0.0.0
1119
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1126
		daemon /usr/sbin/chilli -c \$CONFIG --pidfile=\$pidfile &
1120
        	RETVAL=$?
1127
        	RETVAL=$?
1121
	fi
1128
	fi
1122
	;;
1129
	;;
1123
 
1130
 
1124
    reload)
1131
    reload)
1125
	killall -HUP chilli
1132
	killall -HUP chilli
1126
	;;
1133
	;;
1127
 
1134
 
1128
    restart)
1135
    restart)
1129
	\$0 stop
1136
	\$0 stop
1130
        sleep 2
1137
        sleep 2
1131
	\$0 start
1138
	\$0 start
1132
	;;
1139
	;;
1133
    
1140
    
1134
    status)
1141
    status)
1135
        status chilli
1142
        status chilli
1136
        RETVAL=0
1143
        RETVAL=0
1137
        ;;
1144
        ;;
1138
 
1145
 
1139
    stop)
1146
    stop)
1140
	if [ -f \$pidfile ] ; then  
1147
	if [ -f \$pidfile ] ; then  
1141
        	gprintf "Shutting down \$prog: "
1148
        	gprintf "Shutting down \$prog: "
1142
		killproc /usr/sbin/chilli
1149
		killproc /usr/sbin/chilli
1143
		RETVAL=\$?
1150
		RETVAL=\$?
1144
		[ \$RETVAL = 0 ] && rm -f $pidfile
1151
		[ \$RETVAL = 0 ] && rm -f $pidfile
1145
	else	
1152
	else	
1146
        	gprintf "chilli is not running"
1153
        	gprintf "chilli is not running"
1147
	fi
1154
	fi
1148
	;;
1155
	;;
1149
    
1156
    
1150
    *)
1157
    *)
1151
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1158
        echo "Usage: \$0 {start|stop|restart|reload|status}"
1152
        exit 1
1159
        exit 1
1153
esac
1160
esac
1154
echo
1161
echo
1155
EOF
1162
EOF
1156
chmod a+x /usr/libexec/chilli
1163
chmod a+x /usr/libexec/chilli
1157
# conf file creation
1164
# conf file creation
1158
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1165
	[ -e /etc/chilli.conf.default ] || cp /etc/chilli.conf /etc/chilli.conf.default
1159
	cat <<EOF > /etc/chilli.conf
1166
	cat <<EOF > /etc/chilli.conf
1160
# coova config for ALCASAR
1167
# coova config for ALCASAR
1161
cmdsocket	/var/run/chilli.sock
1168
cmdsocket	/var/run/chilli.sock
1162
unixipc		chilli.$INTIF.ipc
1169
unixipc		chilli.$INTIF.ipc
1163
pidfile		/var/run/chilli.$INTIF.pid
1170
pidfile		/var/run/chilli.$INTIF.pid
1164
net		$PRIVATE_NETWORK_MASK
1171
net		$PRIVATE_NETWORK_MASK
1165
dhcpif		$INTIF
1172
dhcpif		$INTIF
1166
ethers		$DIR_DEST_ETC/alcasar-ethers
1173
ethers		$DIR_DEST_ETC/alcasar-ethers
1167
#nodynip
1174
#nodynip
1168
#statip
1175
#statip
1169
dynip		$PRIVATE_NETWORK_MASK
1176
dynip		$PRIVATE_NETWORK_MASK
1170
domain		$DOMAIN
1177
domain		$DOMAIN
1171
dns1		$PRIVATE_IP
1178
dns1		$PRIVATE_IP
1172
dns2		$PRIVATE_IP
1179
dns2		$PRIVATE_IP
1173
uamlisten	$PRIVATE_IP
1180
uamlisten	$PRIVATE_IP
1174
uamport		3990
1181
uamport		3990
1175
macauth
1182
macauth
1176
macpasswd	password
1183
macpasswd	password
1177
locationname	$HOSTNAME.$DOMAIN
1184
locationname	$HOSTNAME.$DOMAIN
1178
radiusserver1	127.0.0.1
1185
radiusserver1	127.0.0.1
1179
radiusserver2	127.0.0.1
1186
radiusserver2	127.0.0.1
1180
radiussecret	$secretradius
1187
radiussecret	$secretradius
1181
radiusauthport	1812
1188
radiusauthport	1812
1182
radiusacctport	1813
1189
radiusacctport	1813
1183
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1190
uamserver	https://$HOSTNAME.$DOMAIN/intercept.php
1184
radiusnasid	$HOSTNAME.$DOMAIN
1191
radiusnasid	$HOSTNAME.$DOMAIN
1185
uamsecret	$secretuam
1192
uamsecret	$secretuam
1186
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1193
uamallowed	$HOSTNAME,$HOSTNAME.$DOMAIN
1187
coaport		3799
1194
coaport		3799
1188
conup		$DIR_DEST_BIN/alcasar-conup.sh
1195
conup		$DIR_DEST_BIN/alcasar-conup.sh
1189
condown		$DIR_DEST_BIN/alcasar-condown.sh
1196
condown		$DIR_DEST_BIN/alcasar-condown.sh
1190
include		$DIR_DEST_ETC/alcasar-uamallowed
1197
include		$DIR_DEST_ETC/alcasar-uamallowed
1191
include		$DIR_DEST_ETC/alcasar-uamdomain
1198
include		$DIR_DEST_ETC/alcasar-uamdomain
1192
#dhcpgateway
1199
#dhcpgateway
1193
#dhcprelayagent
1200
#dhcprelayagent
1194
#dhcpgatewayport
1201
#dhcpgatewayport
1195
EOF
1202
EOF
1196
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1203
# create file for DHCP static ip. Reserve the second IP address for INTIF (the first one is for tun0)
1197
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1204
	echo "$PRIVATE_MAC $PRIVATE_SECOND_IP" > $DIR_DEST_ETC/alcasar-ethers
1198
# create files for trusted domains and urls
1205
# create files for trusted domains and urls
1199
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1206
	touch $DIR_DEST_ETC/alcasar-uamallowed $DIR_DEST_ETC/alcasar-uamdomain
1200
	chown root:apache $DIR_DEST_ETC/alcasar-*
1207
	chown root:apache $DIR_DEST_ETC/alcasar-*
1201
	chmod 660 $DIR_DEST_ETC/alcasar-*
1208
	chmod 660 $DIR_DEST_ETC/alcasar-*
1202
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1209
# Configuration des fichier WEB d'interception (secret partagé avec coova-chilli)
1203
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1210
	$SED "s?^\$uamsecret =.*?\$uamsecret = \"$secretuam\";?g" $DIR_WEB/intercept.php
1204
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1211
	$SED "s?^\$userpassword=1.*?\$userpassword=1;?g" $DIR_WEB/intercept.php
1205
# user 'chilli' creation (in order to run conup/off and up/down scripts
1212
# user 'chilli' creation (in order to run conup/off and up/down scripts
1206
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1213
	chilli_exist=`grep chilli /etc/passwd|wc -l`
1207
	if [ "$chilli_exist" == "1" ]
1214
	if [ "$chilli_exist" == "1" ]
1208
	then
1215
	then
1209
	      userdel -r chilli 2>/dev/null
1216
	      userdel -r chilli 2>/dev/null
1210
	fi
1217
	fi
1211
	groupadd -f chilli
1218
	groupadd -f chilli
1212
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1219
	useradd -r -g chilli -s /bin/false -c "system user for coova-chilli" chilli
1213
}  # End of chilli ()
1220
}  # End of chilli ()
1214
 
1221
 
1215
##################################################################
1222
##################################################################
1216
##		Fonction "dansguardian"				##
1223
##		Fonction "dansguardian"				##
1217
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1224
## - Paramètrage du gestionnaire de contenu Dansguardian	##
1218
##################################################################
1225
##################################################################
1219
dansguardian ()
1226
dansguardian ()
1220
{
1227
{
1221
	mkdir /var/dansguardian
1228
	mkdir /var/dansguardian
1222
	chown dansguardian /var/dansguardian
1229
	chown dansguardian /var/dansguardian
1223
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1230
	$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dansguardian -c /etc/dansguardian/dansguardian.conf?g" /lib/systemd/system/dansguardian.service
1224
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1231
	$SED "s?^After=.*?After=network.target chilli.service?g" /lib/systemd/system/dansguardian.service
1225
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1232
	[ -e $DIR_DG/dansguardian.conf.default ] || cp $DIR_DG/dansguardian.conf $DIR_DG/dansguardian.conf.default
1226
# By default the filter is off 
1233
# By default the filter is off 
1227
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1234
	$SED "s/^reportinglevel =.*/reportinglevel = -1/g" $DIR_DG/dansguardian.conf
1228
# French deny HTML page
1235
# French deny HTML page
1229
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1236
	$SED "s?^language =.*?language = french?g" $DIR_DG/dansguardian.conf
1230
# Listen only on LAN side
1237
# Listen only on LAN side
1231
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1238
	$SED "s?^filterip.*?filterip = $PRIVATE_IP?g" $DIR_DG/dansguardian.conf
1232
# DG send its flow to HAVP
1239
# DG send its flow to HAVP
1233
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1240
	$SED "s?^proxyport.*?proxyport = 8090?g" $DIR_DG/dansguardian.conf
1234
# replace the default deny HTML page
1241
# replace the default deny HTML page
1235
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1242
	cp -f $DIR_CONF/template.html /usr/share/dansguardian/languages/ukenglish/
1236
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1243
	cp -f $DIR_CONF/template-fr.html /usr/share/dansguardian/languages/french/template.html
1237
# Don't log
1244
# Don't log
1238
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1245
	$SED "s?^loglevel =.*?loglevel = 0?g" $DIR_DG/dansguardian.conf
1239
# Run 10 daemons (20 in largest server)
1246
# Run 10 daemons (20 in largest server)
1240
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1247
	$SED "s?^minchildren =.*?minchildren = 10?g" $DIR_DG/dansguardian.conf
1241
# on désactive par défaut le controle de contenu des pages html
1248
# on désactive par défaut le controle de contenu des pages html
1242
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1249
	$SED "s?^weightedphrasemode =.*?weightedphrasemode = 0?g" $DIR_DG/dansguardian.conf
1243
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1250
	cp $DIR_DG/lists/bannedphraselist $DIR_DG/lists/bannedphraselist.default
1244
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1251
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedphraselist # (on commente ce qui ne l'est pas)
1245
# on désactive par défaut le contrôle d'URL par expressions régulières
1252
# on désactive par défaut le contrôle d'URL par expressions régulières
1246
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1253
	cp $DIR_DG/lists/bannedregexpurllist $DIR_DG/lists/bannedregexpurllist.default
1247
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1254
	$SED "s?^[^#]?#&?g" $DIR_DG/lists/bannedregexpurllist # (on commente ce qui ne l'est pas)
1248
# on désactive par défaut le contrôle de téléchargement de fichiers
1255
# on désactive par défaut le contrôle de téléchargement de fichiers
1249
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1256
	[ -e $DIR_DG/dansguardianf1.conf.default ] || cp $DIR_DG/dansguardianf1.conf $DIR_DG/dansguardianf1.conf.default
1250
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1257
	$SED "s?^blockdownloads =.*?blockdownloads = off?g" $DIR_DG/dansguardianf1.conf
1251
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1258
	[ -e $DIR_DG/lists/bannedextensionlist.default ] || mv $DIR_DG/lists/bannedextensionlist $DIR_DG/lists/bannedextensionlist.default
1252
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1259
	[ -e $DIR_DG/lists/bannedmimetypelist.default ] || mv $DIR_DG/lists/bannedmimetypelist $DIR_DG/lists/bannedmimetypelist.default
1253
	touch $DIR_DG/lists/bannedextensionlist
1260
	touch $DIR_DG/lists/bannedextensionlist
1254
	touch $DIR_DG/lists/bannedmimetypelist
1261
	touch $DIR_DG/lists/bannedmimetypelist
1255
# 'Safesearch' regex actualisation
1262
# 'Safesearch' regex actualisation
1256
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1263
	$SED "s?images?search?g" $DIR_DG/lists/urlregexplist
1257
# empty LAN IP list that won't be WEB filtered
1264
# empty LAN IP list that won't be WEB filtered
1258
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1265
	[ -e $DIR_DG/lists/exceptioniplist.default ] || mv $DIR_DG/lists/exceptioniplist $DIR_DG/lists/exceptioniplist.default
1259
	touch $DIR_DG/lists/exceptioniplist
1266
	touch $DIR_DG/lists/exceptioniplist
1260
# Keep a copy of URL & domain filter configuration files
1267
# Keep a copy of URL & domain filter configuration files
1261
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1268
	[ -e $DIR_DG/lists/bannedsitelist.default ] || mv $DIR_DG/lists/bannedsitelist $DIR_DG/lists/bannedsitelist.default
1262
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1269
	[ -e $DIR_DG/lists/bannedurllist.default ] || mv $DIR_DG/lists/bannedurllist $DIR_DG/lists/bannedurllist.default
1263
} # End of dansguardian ()
1270
} # End of dansguardian ()
1264
 
1271
 
1265
##################################################################
1272
##################################################################
1266
##			Fonction "antivirus"			##
1273
##			Fonction "antivirus"			##
1267
## - configuration of havp, libclamav and freshclam		##
1274
## - configuration of havp, libclamav and freshclam		##
1268
##################################################################
1275
##################################################################
1269
antivirus ()		
1276
antivirus ()		
1270
{
1277
{
1271
# create 'havp' user
1278
# create 'havp' user
1272
	havp_exist=`grep havp /etc/passwd|wc -l`
1279
	havp_exist=`grep havp /etc/passwd|wc -l`
1273
	if [ "$havp_exist" == "1" ]
1280
	if [ "$havp_exist" == "1" ]
1274
	then
1281
	then
1275
	      userdel -r havp 2>/dev/null
1282
	      userdel -r havp 2>/dev/null
1276
	      groupdel havp 2>/dev/null
1283
	      groupdel havp 2>/dev/null
1277
	fi
1284
	fi
1278
	groupadd -f havp
1285
	groupadd -f havp
1279
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1286
	useradd -r -g havp -s /bin/false -c "system user for havp (antivirus proxy)" havp
1280
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1287
	mkdir -p /var/tmp/havp /var/log/havp /var/run/havp
1281
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1288
	chown -R havp:havp /var/tmp/havp /var/log/havp /var/run/havp
1282
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1289
	[ -e /etc/havp/havp.config.default ] || cp /etc/havp/havp.config /etc/havp/havp.config.default
1283
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1290
	$SED "/^REMOVETHISLINE/d" /etc/havp/havp.config
1284
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1291
	$SED "s?^# PIDFILE.*?PIDFILE /var/run/havp/havp.pid?g" /etc/havp/havp.config	# pidfile
1285
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1292
	$SED "s?^# TRANSPARENT.*?TRANSPARENT false?g" /etc/havp/havp.config		# transparent mode
1286
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1293
	$SED "s?^# BIND_ADDRESS.*?BIND_ADDRESS 127.0.0.1?g" /etc/havp/havp.config	# we listen only on loopback
1287
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1294
	$SED "s?^# PORT.*?PORT 8090?g" /etc/havp/havp.config				# datas come on port 8090 (on loopback)
1288
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1295
	$SED "s?^# TIMEFORMAT.*?TIMEFORMAT %Y %b %d %H:%M:%S?g" /etc/havp/havp.config	# Log format
1289
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1296
	$SED "s?^ENABLECLAMLIB.*?ENABLECLAMLIB true?g" /etc/havp/havp.config		# active libclamav AV
1290
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1297
	$SED "s?^# LOG_OKS.*?LOG_OKS false?g" /etc/havp/havp.config			# log only when malware matches
1291
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1298
	$SED "s?^# SERVERNUMBER.*?SERVERNUMBER 10?g" /etc/havp/havp.config		# 10 daemons are started simultaneously
1292
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1299
	$SED "s?^# SCANIMAGES.*?SCANIMAGES false?g" /etc/havp/havp.config		# doesn't scan image files
1293
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1300
	$SED "s?^# SKIPMIME.*?SKIPMIME image\/\* video\/\* audio\/\*?g" /etc/havp/havp.config # doesn't scan some multimedia files
1294
# skip checking of youtube flow (too heavy load / risk too low)
1301
# skip checking of youtube flow (too heavy load / risk too low)
1295
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1302
	[ -e /etc/havp/whitelist.default ] || cp /etc/havp/whitelist /etc/havp/whitelist.default
1296
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1303
	echo "# Whitelist youtube flow" >> /etc/havp/whitelist
1297
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1304
	echo "*.youtube.com/*" >> /etc/havp/whitelist
1298
# replacement of init script
1305
# replacement of init script
1299
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1306
	[ -e /etc/init.d/havp.default ] || cp /etc/init.d/havp /etc/init.d/havp.default
1300
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1307
	cp -f $DIR_CONF/havp-init /etc/init.d/havp
1301
# replace of the intercept page (template)
1308
# replace of the intercept page (template)
1302
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1309
	cp -f $DIR_CONF/virus-fr.html /etc/havp/templates/fr/virus.html
1303
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1310
	cp -f $DIR_CONF/virus-en.html /etc/havp/templates/en/virus.html
1304
# update virus database every 4 hours (24h/6)
1311
# update virus database every 4 hours (24h/6)
1305
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1312
	[ -e /etc/freshclam.conf.default ] || cp /etc/freshclam.conf /etc/freshclam.conf.default
1306
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1313
	$SED "s?^Checks.*?Checks 6?g" /etc/freshclam.conf
1307
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1314
	$SED "s?^NotifyClamd.*?# NotifyClamd /etc/clamd.conf?g" /etc/freshclam.conf
1308
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1315
	$SED "/^DatabaseMirror/i DatabaseMirror db.fr.clamav.net" /etc/freshclam.conf
1309
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1316
	$SED "/^DatabaseMirror db.fr.clamav.net/i DatabaseMirror switch.clamav.net" /etc/freshclam.conf
1310
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1317
	$SED "s?MaxAttempts.*?MaxAttempts 3?g" /etc/freshclam.conf
1311
# update now
1318
# update now
1312
	/usr/bin/freshclam --no-warnings
1319
	/usr/bin/freshclam --no-warnings
1313
} # End of antivirus ()
1320
} # End of antivirus ()
1314
 
1321
 
1315
##########################################################################
1322
##########################################################################
1316
##			Fonction "tinyproxy"				##
1323
##			Fonction "tinyproxy"				##
1317
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1324
## - configuration of tinyproxy (proxy between filterde users and havp)	##
1318
##########################################################################
1325
##########################################################################
1319
tinyproxy ()		
1326
tinyproxy ()		
1320
{
1327
{
1321
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1328
	tinyproxy_exist=`grep tinyproxy /etc/passwd|wc -l`
1322
	if [ "$tinyproxy_exist" == "1" ]
1329
	if [ "$tinyproxy_exist" == "1" ]
1323
	then
1330
	then
1324
	      userdel -r tinyproxy 2>/dev/null
1331
	      userdel -r tinyproxy 2>/dev/null
1325
	      groupdel tinyproxy 2>/dev/null
1332
	      groupdel tinyproxy 2>/dev/null
1326
	fi
1333
	fi
1327
	groupadd -f tinyproxy
1334
	groupadd -f tinyproxy
1328
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1335
	useradd -r -g tinyproxy -s /bin/false -c "system user for tinyproxy" tinyproxy
1329
	mkdir -p var/run/tinyproxy /var/log/tinyproxy
1336
	mkdir -p var/run/tinyproxy /var/log/tinyproxy
1330
	chown -R tinyproxy.tinyproxy /run/tinyproxy /var/log/tinyproxy
1337
	chown -R tinyproxy.tinyproxy /run/tinyproxy /var/log/tinyproxy
1331
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1338
	[ -e /etc/tinyproxy/tinyproxy.conf.default ] || cp /etc/tinyproxy/tinyproxy.conf /etc/tinyproxy/tinyproxy.conf.default
1332
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1339
	$SED "s?^User.*?User tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1333
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1340
	$SED "s?^Group.*?Group tinyproxy?g" /etc/tinyproxy/tinyproxy.conf
1334
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1341
	$SED "s?^Port.*?Port 8090?g" /etc/tinyproxy/tinyproxy.conf			# Listen Port
1335
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1342
	$SED "s?^#Listen.*?Listen $PRIVATE_IP?g" /etc/tinyproxy/tinyproxy.conf		# Listen NIC (only intif)
1336
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1343
	$SED "s?^#LogFile.*?LogFile \"/var/log/tinyproxy/tinyproxy.log\"?g" /etc/tinyproxy/tinyproxy.conf
1337
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1344
	$SED "s?^#PidFile.*?PidFile \"/var/run/tinyproxy/tinyproxy.pid\"?g" /etc/tinyproxy/tinyproxy.conf
1338
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1345
	$SED "s?^LogLevel.*?LogLevel Error?g" /etc/tinyproxy/tinyproxy.conf		# Only errors are logged
1339
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1346
	$SED "s?^#Upstream.*?Upstream 127.0.0.1:8090?g" /etc/tinyproxy/tinyproxy.conf	# forward to HAVP
1340
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1347
	$SED "s?^#DisableViaHeader.*?DisableViaHeader Yes?g" /etc/tinyproxy/tinyproxy.conf	# Stealth mode
1341
# Create the systemd unit
1348
# Create the systemd unit
1342
cat << EOF > /lib/systemd/system/tinyproxy.service
1349
cat << EOF > /lib/systemd/system/tinyproxy.service
1343
#  This file is part of systemd.
1350
#  This file is part of systemd.
1344
#
1351
#
1345
#  systemd is free software; you can redistribute it and/or modify it
1352
#  systemd is free software; you can redistribute it and/or modify it
1346
#  under the terms of the GNU General Public License as published by
1353
#  under the terms of the GNU General Public License as published by
1347
#  the Free Software Foundation; either version 2 of the License, or
1354
#  the Free Software Foundation; either version 2 of the License, or
1348
#  (at your option) any later version.
1355
#  (at your option) any later version.
1349
 
1356
 
1350
# This unit launches tinyproxy (a very light proxy).
1357
# This unit launches tinyproxy (a very light proxy).
1351
# The "sleep 2" is needed because the pid file isn't ready for systemd
1358
# The "sleep 2" is needed because the pid file isn't ready for systemd
1352
[Unit]
1359
[Unit]
1353
Description=Tinyproxy Web Proxy Server
1360
Description=Tinyproxy Web Proxy Server
1354
After=network.target iptables.service
1361
After=network.target iptables.service
1355
 
1362
 
1356
[Service]
1363
[Service]
1357
Type=forking
1364
Type=forking
1358
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1365
ExecStartPre=/bin/chown -R tinyproxy.tinyproxy /var/run/tinyproxy /var/log/tinyproxy
1359
ExecStartPre=/bin/sleep 2
1366
ExecStartPre=/bin/sleep 2
1360
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1367
PIDFile=/var/run/tinyproxy/tinyproxy.pid
1361
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1368
ExecStart=/usr/sbin/tinyproxy -c /etc/tinyproxy/tinyproxy.conf
1362
 
1369
 
1363
[Install]
1370
[Install]
1364
WantedBy=multi-user.target
1371
WantedBy=multi-user.target
1365
EOF
1372
EOF
1366
 
1373
 
1367
} # end of tinyproxy
1374
} # end of tinyproxy
1368
##################################################################################
1375
##################################################################################
1369
##			function "ulogd"					##
1376
##			function "ulogd"					##
1370
## - Ulog config for multi-log files 						##
1377
## - Ulog config for multi-log files 						##
1371
##################################################################################
1378
##################################################################################
1372
ulogd ()
1379
ulogd ()
1373
{
1380
{
1374
# Three instances of ulogd (three different logfiles)
1381
# Three instances of ulogd (three different logfiles)
1375
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1382
	[ -d /var/log/firewall ] || mkdir -p /var/log/firewall
1376
	nl=1
1383
	nl=1
1377
	for log_type in traceability ssh ext-access
1384
	for log_type in traceability ssh ext-access
1378
	do
1385
	do
1379
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1386
		[ -e /lib/systemd/system/ulogd-$log_type.service ] || cp -f /lib/systemd/system/ulogd.service /lib/systemd/system/ulogd-$log_type.service
1380
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1387
		[ -e /var/log/firewall/$log_type.log ] || echo "" > /var/log/firewall/$log_type.log
1381
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1388
		cp -f $DIR_CONF/ulogd-sample.conf /etc/ulogd-$log_type.conf
1382
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1389
		$SED "s?^nlgroup=.*?nlgroup=$nl?g" /etc/ulogd-$log_type.conf 
1383
		cat << EOF >> /etc/ulogd-$log_type.conf
1390
		cat << EOF >> /etc/ulogd-$log_type.conf
1384
[emu1]
1391
[emu1]
1385
file="/var/log/firewall/$log_type.log"
1392
file="/var/log/firewall/$log_type.log"
1386
sync=1
1393
sync=1
1387
EOF
1394
EOF
1388
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1395
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/ulogd -u ulogd -c /etc/ulogd-$log_type.conf $ULOGD_OPTIONS?g" /lib/systemd/system/ulogd-$log_type.service
1389
		nl=`expr $nl + 1`
1396
		nl=`expr $nl + 1`
1390
	done
1397
	done
1391
	chown -R root:apache /var/log/firewall
1398
	chown -R root:apache /var/log/firewall
1392
	chmod 750 /var/log/firewall
1399
	chmod 750 /var/log/firewall
1393
	chmod 640 /var/log/firewall/*
1400
	chmod 640 /var/log/firewall/*
1394
}  # End of ulogd ()
1401
}  # End of ulogd ()
1395
 
1402
 
1396
 
1403
 
1397
##########################################################
1404
##########################################################
1398
##              Function "nfsen"			##
1405
##              Function "nfsen"			##
1399
##########################################################
1406
##########################################################
1400
nfsen()
1407
nfsen()
1401
{
1408
{
1402
	tar xzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1409
	tar xzf ./conf/nfsen/nfsen-1.3.6p1.tar.gz -C /tmp/
1403
# Add PortTracker plugin
1410
# Add PortTracker plugin
1404
	for i in /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1411
	for i in /var/www/nfsen/plugins /var/log/netflow/porttracker /usr/share/nfsen/plugins
1405
	do
1412
	do
1406
	[ ! -d $i ] && mkdir $i && chown -R apache:apache $i
1413
	[ ! -d $i ] && mkdir $i && chown -R apache:apache $i
1407
	done
1414
	done
1408
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm
1415
	$SED "s?^my \$PORTSDBDIR =.*?my \$PORTSDBDIR = \"/var/log/netflow/porttracker\";?g" /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm
1409
# use of our conf file and init unit
1416
# use of our conf file and init unit
1410
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1417
	cp $DIR_CONF/nfsen/nfsen.conf /tmp/nfsen-1.3.6p1/etc/
1411
# Installation of nfsen
1418
# Installation of nfsen
1412
	DirTmp=$(pwd)
1419
	DirTmp=$(pwd)
1413
	cd /tmp/nfsen-1.3.6p1/
1420
	cd /tmp/nfsen-1.3.6p1/
1414
	/usr/bin/perl5 install.pl etc/nfsen.conf
1421
	/usr/bin/perl5 install.pl etc/nfsen.conf
1415
	/usr/bin/perl5 install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1422
	/usr/bin/perl5 install.pl etc/nfsen.conf # to avoid a Perl mistake "Semaphore introuvable"
1416
# Create RRD DB for porttracker (only in it still doesn't exist)
1423
# Create RRD DB for porttracker (only in it still doesn't exist)
1417
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1424
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.pm /usr/share/nfsen/plugins/
1418
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1425
	cp /tmp/nfsen-1.3.6p1/contrib/PortTracker/PortTracker.php /var/www/nfsen/plugins/
1419
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1426
	if [ "$(ls -A "/var/log/netflow/porttracker" 2>&1)" = "" ]; then sudo -u apache nftrack -I -d /var/log/netflow/porttracker; else echo "RRD DB already exists"; fi
1420
	chmod -R 770 /var/log/netflow/porttracker
1427
	chmod -R 770 /var/log/netflow/porttracker
1421
# Apache conf file
1428
# Apache conf file
1422
	cat << EOF > /etc/httpd/conf/conf.d/nfsen.conf
1429
	cat << EOF > /etc/httpd/conf/conf.d/nfsen.conf
1423
Alias /nfsen /var/www/nfsen 
1430
Alias /nfsen /var/www/nfsen 
1424
<Directory /var/www/nfsen/> 
1431
<Directory /var/www/nfsen/> 
1425
DirectoryIndex nfsen.php 
1432
DirectoryIndex nfsen.php 
1426
Options -Indexes 
1433
Options -Indexes 
1427
AllowOverride all 
1434
AllowOverride all 
1428
order allow,deny 
1435
order allow,deny 
1429
allow from all 
1436
allow from all 
1430
AddType application/x-httpd-php .php 
1437
AddType application/x-httpd-php .php 
1431
php_flag magic_quotes_gpc on 
1438
php_flag magic_quotes_gpc on 
1432
php_flag track_vars on 
1439
php_flag track_vars on 
1433
</Directory>
1440
</Directory>
1434
EOF
1441
EOF
1435
# nfsen unit for systemd
1442
# nfsen unit for systemd
1436
cat << EOF > /lib/systemd/system/nfsen.service
1443
cat << EOF > /lib/systemd/system/nfsen.service
1437
#  This file is part of systemd.
1444
#  This file is part of systemd.
1438
#
1445
#
1439
#  systemd is free software; you can redistribute it and/or modify it
1446
#  systemd is free software; you can redistribute it and/or modify it
1440
#  under the terms of the GNU General Public License as published by
1447
#  under the terms of the GNU General Public License as published by
1441
#  the Free Software Foundation; either version 2 of the License, or
1448
#  the Free Software Foundation; either version 2 of the License, or
1442
#  (at your option) any later version.
1449
#  (at your option) any later version.
1443
 
1450
 
1444
# This unit launches nfsen (a Netflow grapher).
1451
# This unit launches nfsen (a Netflow grapher).
1445
[Unit]
1452
[Unit]
1446
Description= NfSen init script
1453
Description= NfSen init script
1447
After=network.target iptables.service
1454
After=network.target iptables.service
1448
 
1455
 
1449
[Service]
1456
[Service]
1450
Type=oneshot
1457
Type=oneshot
1451
RemainAfterExit=yes
1458
RemainAfterExit=yes
1452
PIDFile=/var/run/nfsen/nfsen.pid
1459
PIDFile=/var/run/nfsen/nfsen.pid
1453
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1460
ExecStartPre=/bin/mkdir -p /var/run/nfsen
1454
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1461
ExecStartPre=/bin/chown apache:apache /var/run/nfsen
1455
ExecStart=/usr/bin/nfsen start 
1462
ExecStart=/usr/bin/nfsen start 
1456
ExecStop=/usr/bin/nfsen stop
1463
ExecStop=/usr/bin/nfsen stop
1457
ExecReload=/usr/bin/nfsen restart
1464
ExecReload=/usr/bin/nfsen restart
1458
TimeoutSec=0
1465
TimeoutSec=0
1459
 
1466
 
1460
[Install]
1467
[Install]
1461
WantedBy=multi-user.target
1468
WantedBy=multi-user.target
1462
EOF
1469
EOF
1463
# Add the listen port to collect netflow packet (nfcapd)
1470
# Add the listen port to collect netflow packet (nfcapd)
1464
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1471
$SED "s?'\$ziparg $extensions.*?\$ziparg $extensions -b 127.0.0.1;'?g" /usr/libexec/NfSenRC.pm 
1465
# expire delay for the profile "live"
1472
# expire delay for the profile "live"
1466
	systemctl start nfsen
1473
	systemctl start nfsen
1467
	/bin/nfsen -m live -e 62d 2>/dev/null
1474
	/bin/nfsen -m live -e 62d 2>/dev/null
1468
# add SURFmap plugin
1475
# add SURFmap plugin
1469
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1476
	cp $DIR_CONF/nfsen/SURFmap_v3.3.1.tar.gz /tmp/
1470
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1477
	cp $DIR_CONF/nfsen/GeoLiteCity* /tmp/
1471
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1478
	tar xzf /tmp/SURFmap_v3.3.1.tar.gz -C /tmp/
1472
	cd /tmp/
1479
	cd /tmp/
1473
	/usr/bin/sh SURFmap/install.sh
1480
	/usr/bin/sh SURFmap/install.sh
1474
# clear the installation
1481
# clear the installation
1475
	cd $DirTmp
1482
	cd $DirTmp
1476
	rm -rf /tmp/nfsen*
1483
	rm -rf /tmp/nfsen*
1477
	rm -rf /tmp/SURFmap*
1484
	rm -rf /tmp/SURFmap*
1478
} # End of nfsen ()
1485
} # End of nfsen ()
1479
 
1486
 
1480
##################################################
1487
##################################################
1481
##		Function "dnsmasq"		##
1488
##		Function "dnsmasq"		##
1482
##################################################
1489
##################################################
1483
dnsmasq ()
1490
dnsmasq ()
1484
{
1491
{
1485
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1492
	[ -d /var/log/dnsmasq ] || mkdir /var/log/dnsmasq
1486
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1493
	[ -e /etc/sysconfig/dnsmasq.default ] || cp /etc/sysconfig/dnsmasq /etc/sysconfig/dnsmasq.default
1487
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1494
	$SED "s?^OPTION=.*?OPTION=-C /etc/dnsmasq.conf?g" /etc/sysconfig/dnsmasq # default conf file for the first dnsmasq instance
1488
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1495
	[ -e /etc/dnsmasq.conf.default ] || cp /etc/dnsmasq.conf /etc/dnsmasq.conf.default
1489
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1496
# 1st dnsmasq listen on udp 53 ("dnsmasq - forward"). It's used as dhcp server only if "alcasar-bypass" is on.
1490
	cat << EOF > /etc/dnsmasq.conf 
1497
	cat << EOF > /etc/dnsmasq.conf 
1491
# Configuration file for "dnsmasq in forward mode"
1498
# Configuration file for "dnsmasq in forward mode"
1492
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1499
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1493
listen-address=$PRIVATE_IP
1500
listen-address=$PRIVATE_IP
1494
pid-file=/var/run/dnsmasq.pid
1501
pid-file=/var/run/dnsmasq.pid
1495
listen-address=127.0.0.1
1502
listen-address=127.0.0.1
1496
no-dhcp-interface=$INTIF
1503
no-dhcp-interface=$INTIF
1497
no-dhcp-interface=tun0
1504
no-dhcp-interface=tun0
1498
no-dhcp-interface=lo
1505
no-dhcp-interface=lo
1499
bind-interfaces
1506
bind-interfaces
1500
cache-size=256
1507
cache-size=256
1501
domain=$DOMAIN
1508
domain=$DOMAIN
1502
domain-needed
1509
domain-needed
1503
expand-hosts
1510
expand-hosts
1504
bogus-priv
1511
bogus-priv
1505
filterwin2k
1512
filterwin2k
1506
server=$DNS1
1513
server=$DNS1
1507
server=$DNS2
1514
server=$DNS2
1508
# DHCP service is configured. It will be enabled in "bypass" mode
1515
# DHCP service is configured. It will be enabled in "bypass" mode
1509
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1516
dhcp-range=$PRIVATE_FIRST_IP,$PRIVATE_LAST_IP,$PRIVATE_NETMASK,12h
1510
dhcp-option=option:router,$PRIVATE_IP
1517
dhcp-option=option:router,$PRIVATE_IP
1511
dhcp-option=option:ntp-server,$PRIVATE_IP
1518
dhcp-option=option:ntp-server,$PRIVATE_IP
1512
 
1519
 
1513
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1520
# Exemple of static dhcp assignation : <@MAC>,<name>,<@IP>,<MASK>,<ttl bail>
1514
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1521
#dhcp-host=11:22:33:44:55:66,ssic-test,192.168.182.20,255.255.255.0,45m
1515
EOF
1522
EOF
1516
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1523
# 2nd dnsmasq listen on udp 54 ("dnsmasq with blacklist")
1517
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1524
	cat << EOF > /etc/dnsmasq-blacklist.conf 
1518
# Configuration file for "dnsmasq with blacklist"
1525
# Configuration file for "dnsmasq with blacklist"
1519
# Add Toulouse blacklist domains
1526
# Add Toulouse blacklist domains
1520
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1527
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1521
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1528
conf-dir=$DIR_DEST_SHARE/dnsmasq-bl-enabled
1522
pid-file=/var/run/dnsmasq-blacklist.pid
1529
pid-file=/var/run/dnsmasq-blacklist.pid
1523
listen-address=$PRIVATE_IP
1530
listen-address=$PRIVATE_IP
1524
port=54
1531
port=54
1525
no-dhcp-interface=$INTIF
1532
no-dhcp-interface=$INTIF
1526
no-dhcp-interface=tun0
1533
no-dhcp-interface=tun0
1527
no-dhcp-interface=lo
1534
no-dhcp-interface=lo
1528
bind-interfaces
1535
bind-interfaces
1529
cache-size=256
1536
cache-size=256
1530
domain=$DOMAIN
1537
domain=$DOMAIN
1531
domain-needed
1538
domain-needed
1532
expand-hosts
1539
expand-hosts
1533
bogus-priv
1540
bogus-priv
1534
filterwin2k
1541
filterwin2k
1535
server=$DNS1
1542
server=$DNS1
1536
server=$DNS2
1543
server=$DNS2
1537
EOF
1544
EOF
1538
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1545
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist")
1539
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1546
	cat << EOF > /etc/dnsmasq-whitelist.conf 
1540
# Configuration file for "dnsmasq with whitelist"
1547
# Configuration file for "dnsmasq with whitelist"
1541
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1548
# Inclusion de la whitelist <domains> de Toulouse dans la configuration
1542
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1549
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1543
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1550
conf-dir=$DIR_DEST_SHARE/dnsmasq-wl-enabled
1544
pid-file=/var/run/dnsmasq-whitelist.pid
1551
pid-file=/var/run/dnsmasq-whitelist.pid
1545
listen-address=$PRIVATE_IP
1552
listen-address=$PRIVATE_IP
1546
port=55
1553
port=55
1547
no-dhcp-interface=$INTIF
1554
no-dhcp-interface=$INTIF
1548
no-dhcp-interface=tun0
1555
no-dhcp-interface=tun0
1549
no-dhcp-interface=lo
1556
no-dhcp-interface=lo
1550
bind-interfaces
1557
bind-interfaces
1551
cache-size=256
1558
cache-size=256
1552
domain=$DOMAIN
1559
domain=$DOMAIN
1553
domain-needed
1560
domain-needed
1554
expand-hosts
1561
expand-hosts
1555
bogus-priv
1562
bogus-priv
1556
filterwin2k
1563
filterwin2k
1557
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1564
address=/#/$PRIVATE_IP				# for Domain name without local resolution (WL)  
1558
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1565
ipset=/#/whitelist_ip_allowed			# dynamicly add the resolv IP address in the Firewall rules
1559
EOF
1566
EOF
1560
# 4th dnsmasq listen on udp 56 ("blackhole")
1567
# 4th dnsmasq listen on udp 56 ("blackhole")
1561
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1568
	cat << EOF > /etc/dnsmasq-blackhole.conf 
1562
# Configuration file for "dnsmasq as a blackhole"
1569
# Configuration file for "dnsmasq as a blackhole"
1563
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1570
conf-file=$DIR_DEST_ETC/alcasar-dns-name	# local DNS resolutions
1564
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1571
address=/#/$PRIVATE_IP				# redirect all on ALCASAR IP address
1565
pid-file=/var/run/dnsmasq-blackhole.pid
1572
pid-file=/var/run/dnsmasq-blackhole.pid
1566
listen-address=$PRIVATE_IP
1573
listen-address=$PRIVATE_IP
1567
port=56
1574
port=56
1568
no-dhcp-interface=$INTIF
1575
no-dhcp-interface=$INTIF
1569
no-dhcp-interface=tun0
1576
no-dhcp-interface=tun0
1570
no-dhcp-interface=lo
1577
no-dhcp-interface=lo
1571
bind-interfaces
1578
bind-interfaces
1572
cache-size=256
1579
cache-size=256
1573
domain=$DOMAIN
1580
domain=$DOMAIN
1574
domain-needed
1581
domain-needed
1575
expand-hosts
1582
expand-hosts
1576
bogus-priv
1583
bogus-priv
1577
filterwin2k
1584
filterwin2k
1578
EOF
1585
EOF
1579
 
1586
 
1580
# the main instance should start after network and chilli (which create tun0)
1587
# the main instance should start after network and chilli (which create tun0)
1581
	[ -e /lib/systemd/system/dnsmasq.service.old ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.old
1588
	[ -e /lib/systemd/system/dnsmasq.service.old ] || cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq.service.old
1582
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1589
	$SED "s?^After=.*?After=syslog.target network-online.target chilli.service?g" /lib/systemd/system/dnsmasq.service
1583
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1590
# Create dnsmasq-blacklist, dnsmasq-whitelist and dnsmasq-blackhole unit
1584
	for list in blacklist whitelist blackhole
1591
	for list in blacklist whitelist blackhole
1585
	do
1592
	do
1586
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1593
		cp -f /lib/systemd/system/dnsmasq.service /lib/systemd/system/dnsmasq-$list.service
1587
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1594
		$SED "s?^ExecStart=.*?ExecStart=/usr/sbin/dnsmasq -C /etc/dnsmasq-$list.conf?g" /lib/systemd/system/dnsmasq-$list.service
1588
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1595
		$SED "s?^PIDFile=.*?PIDFile=/var/run/dnsmasq-$list.pid?g" /lib/systemd/system/dnsmasq-$list.service
1589
	done
1596
	done
1590
} # End dnsmasq
1597
} # End dnsmasq
1591
 
1598
 
1592
##########################################################
1599
##########################################################
1593
##		Fonction "BL"				##
1600
##		Fonction "BL"				##
1594
##########################################################
1601
##########################################################
1595
BL ()
1602
BL ()
1596
{
1603
{
1597
# copy and extract toulouse BL
1604
# copy and extract toulouse BL
1598
	rm -rf $DIR_DG/lists/blacklists
1605
	rm -rf $DIR_DG/lists/blacklists
1599
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1606
	tar zxf $DIR_CONF/blacklists.tar.gz --directory=$DIR_DG/lists/ > /dev/null 2>&1
1600
# creation of the OSSI BL and WL categories (domain name and url)
1607
# creation of the OSSI BL and WL categories (domain name and url)
1601
	mkdir $DIR_DG/lists/blacklists/ossi
1608
	mkdir $DIR_DG/lists/blacklists/ossi
1602
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1609
	touch $DIR_DG/lists/blacklists/ossi/domains $DIR_DG/lists/blacklists/ossi/domains_wl
1603
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1610
	touch $DIR_DG/lists/blacklists/ossi/urls $DIR_DG/lists/blacklists/ossi/urls_wl
1604
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1611
	chown -R dansguardian:apache $DIR_DG $DIR_DEST_SHARE
1605
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1612
	chmod -R g+rw $DIR_DG $DIR_DEST_SHARE
1606
# creation of file for the rehabilited domains and urls
1613
# creation of file for the rehabilited domains and urls
1607
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1614
	[ -e $DIR_DG/lists/exceptionsitelist.default ] || mv $DIR_DG/lists/exceptionsitelist $DIR_DG/lists/exceptionsitelist.default
1608
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1615
	[ -e $DIR_DG/lists/exceptionurllist.default ] || mv $DIR_DG/lists/exceptionurllist $DIR_DG/lists/exceptionurllist.default
1609
	touch $DIR_DG/lists/exceptionsitelist
1616
	touch $DIR_DG/lists/exceptionsitelist
1610
	touch $DIR_DG/lists/exceptionurllist
1617
	touch $DIR_DG/lists/exceptionurllist
1611
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1618
# On crée la configuration de base du filtrage de domaine et d'URL pour Dansguardian
1612
	cat <<EOF > $DIR_DG/lists/bannedurllist
1619
	cat <<EOF > $DIR_DG/lists/bannedurllist
1613
# Dansguardian filter config for ALCASAR
1620
# Dansguardian filter config for ALCASAR
1614
EOF
1621
EOF
1615
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1622
	cat <<EOF > $DIR_DG/lists/bannedsitelist
1616
# Dansguardian domain filter config for ALCASAR
1623
# Dansguardian domain filter config for ALCASAR
1617
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1624
# block all sites except those in the exceptionsitelist --> liste blanche (désactivée)
1618
#**
1625
#**
1619
# block all SSL and CONNECT tunnels
1626
# block all SSL and CONNECT tunnels
1620
**s
1627
**s
1621
# block all SSL and CONNECT tunnels specified only as an IP
1628
# block all SSL and CONNECT tunnels specified only as an IP
1622
*ips
1629
*ips
1623
# block all sites specified only by an IP
1630
# block all sites specified only by an IP
1624
*ip
1631
*ip
1625
EOF
1632
EOF
1626
# Add Bing and Youtube to the safesearch url regext list (parental control)
1633
# Add Bing and Youtube to the safesearch url regext list (parental control)
1627
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1634
	cat <<EOF >> $DIR_DG/lists/urlregexplist
1628
# Bing - add 'adlt=strict'
1635
# Bing - add 'adlt=strict'
1629
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1636
#"(^http://[0-9a-z]+\.bing\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&adlt=strict"
1630
# Youtube - add 'edufilter=your_ID' 
1637
# Youtube - add 'edufilter=your_ID' 
1631
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1638
#"(^http://[0-9a-z]+\.youtube\.[a-z]+[-/%.0-9a-z]*\?)(.*)"->"\1\2&edufilter=ABCD1234567890abcdef"
1632
EOF
1639
EOF
1633
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1640
# change the the google safesearch ("safe=strict" instead of "safe=vss")
1634
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1641
	$SED "s?safe=vss?safe=strict?g" $DIR_DG/lists/urlregexplist
1635
# adapt the BL to ALCASAR architecture. Enable the default categories
1642
# adapt the BL to ALCASAR architecture. Enable the default categories
1636
	if [ "$mode" != "update" ]; then
1643
	if [ "$mode" != "update" ]; then
1637
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1644
		$DIR_DEST_SBIN/alcasar-bl.sh --adapt
1638
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1645
		$DIR_DEST_SBIN/alcasar-bl.sh --cat_choice
1639
	fi
1646
	fi
1640
}
1647
}
1641
 
1648
 
1642
##########################################################
1649
##########################################################
1643
##		Fonction "cron"				##
1650
##		Fonction "cron"				##
1644
## - Mise en place des différents fichiers de cron	##
1651
## - Mise en place des différents fichiers de cron	##
1645
##########################################################
1652
##########################################################
1646
cron ()
1653
cron ()
1647
{
1654
{
1648
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1655
# Modif du fichier 'crontab' pour passer les cron à minuit au lieu de 04h00
1649
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1656
	[ -e /etc/crontab.default ] || cp /etc/crontab /etc/crontab.default
1650
	cat <<EOF > /etc/crontab
1657
	cat <<EOF > /etc/crontab
1651
SHELL=/bin/bash
1658
SHELL=/bin/bash
1652
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1659
PATH=/sbin:/bin:/usr/sbin:/usr/bin
1653
MAILTO=root
1660
MAILTO=root
1654
HOME=/
1661
HOME=/
1655
 
1662
 
1656
# run-parts
1663
# run-parts
1657
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1664
01 * * * * root nice -n 19 run-parts --report /etc/cron.hourly
1658
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1665
02 0 * * * root nice -n 19 run-parts --report /etc/cron.daily
1659
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1666
22 0 * * 0 root nice -n 19 run-parts --report /etc/cron.weekly
1660
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1667
42 0 1 * * root nice -n 19 run-parts --report /etc/cron.monthly
1661
EOF
1668
EOF
1662
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1669
	[ -e /etc/anacrontab.default ] || cp /etc/anacrontab /etc/anacrontab.default
1663
	cat <<EOF >> /etc/anacrontab
1670
	cat <<EOF >> /etc/anacrontab
1664
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1671
7       8       cron.MysqlDump          nice /etc/cron.d/alcasar-mysql
1665
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1672
7       10      cron.logExport          nice /etc/cron.d/alcasar-archive
1666
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1673
7	20	cron.importClean	nice /etc/cron.d/alcasar-clean_import
1667
EOF
1674
EOF
1668
 
1675
 
1669
	cat <<EOF > /etc/cron.d/alcasar-mysql
1676
	cat <<EOF > /etc/cron.d/alcasar-mysql
1670
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1677
# Contrôle, réparation et export de la base des usagers (tous les lundi à 4h45)
1671
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1678
45 4 * * 1 root $DIR_DEST_SBIN/alcasar-mysql.sh --dump
1672
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1679
# Nettoyage des utilisateurs dont la date d'expiration du compte est supérieure à 7 jours
1673
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1680
40 4 * * * root /usr/local/sbin/alcasar-mysql.sh --expire_user 2>&1 >/dev/null
1674
EOF
1681
EOF
1675
	cat <<EOF > /etc/cron.d/alcasar-archive
1682
	cat <<EOF > /etc/cron.d/alcasar-archive
1676
# Archive des logs et de la base de données (tous les lundi à 5h35)
1683
# Archive des logs et de la base de données (tous les lundi à 5h35)
1677
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1684
35 5 * * 1 root $DIR_DEST_BIN/alcasar-archive.sh --now
1678
EOF
1685
EOF
1679
	cat << EOF > /etc/cron.d/alcasar-clean_import
1686
	cat << EOF > /etc/cron.d/alcasar-clean_import
1680
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1687
# suppression des fichiers de mots de passe lors d'imports massifs par fichier de plus de 24h
1681
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1688
30 * * * *  root $DIR_DEST_BIN/alcasar-import-clean.sh
1682
EOF
1689
EOF
1683
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1690
	cat << EOF > /etc/cron.d/alcasar-distrib-updates
1684
# mise à jour automatique de la distribution tous les jours 3h30
1691
# mise à jour automatique de la distribution tous les jours 3h30
1685
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1692
30 3 * * *  root /usr/sbin/urpmi --auto-update --auto 2>&1
1686
EOF
1693
EOF
1687
	#cat << EOF > /etc/cron.d/alcasar-netflow
1694
	#cat << EOF > /etc/cron.d/alcasar-netflow
1688
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1695
# mise à jour automatique du délais d'expiration des log Nertflow (tous les vendredi à 0h05)
1689
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1696
#15 0 * * 1  root $DIR_DEST_BIN/alcasar-netflow.sh
1690
#EOF
1697
#EOF
1691
 
1698
 
1692
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1699
# mise à jour des stats de connexion (accounting). Scripts provenant de "dialupadmin" (rpm freeradius-web) (cf. wiki.freeradius.org/Dialup_admin).
1693
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1700
# on écrase le crontab d'origine installé par le RPM "freeradius-web" (bug remonté à qa.mandriva.com : 46739).
1694
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1701
# 'tot_stats' (tout les jours à 01h01) : aggrégat des connexions journalières par usager (renseigne la table 'totacct') 
1695
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1702
# 'monthly_tot_stat' (tous les jours à 01h05) : aggrégat des connexions mensuelles par usager (renseigne la table 'mtotacct')
1696
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1703
# 'truncate_raddact' (tous les 1er du mois à 01h10) : supprime les entrées journalisées plus vieilles que '$back_days' jours (défini ci-après)
1697
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1704
# 'clean_radacct' (tous les 1er du mois à 01h15) : ferme les session ouvertes de plus de '$back_days' jours (défini ci-après)
1698
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1705
	$SED "s?^\$back_days.*?\$back_days = 365;?g" /usr/bin/truncate_radacct
1699
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1706
	$SED "s?^\$back_days.*?\$back_days = 30;?g" /usr/bin/clean_radacct
1700
	rm -f /etc/cron.daily/freeradius-web
1707
	rm -f /etc/cron.daily/freeradius-web
1701
	rm -f /etc/cron.monthly/freeradius-web
1708
	rm -f /etc/cron.monthly/freeradius-web
1702
	cat << EOF > /etc/cron.d/freeradius-web
1709
	cat << EOF > /etc/cron.d/freeradius-web
1703
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1710
1 1 * * * root /usr/bin/tot_stats > /dev/null 2>&1
1704
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1711
5 1 * * * root /usr/bin/monthly_tot_stats > /dev/null 2>&1
1705
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1712
10 1 1 * * root /usr/bin/truncate_radacct > /dev/null 2>&1
1706
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1713
15 1 1 * * root /usr/bin/clean_radacct > /dev/null 2>&1
1707
EOF
1714
EOF
1708
	cat << EOF > /etc/cron.d/alcasar-watchdog
1715
	cat << EOF > /etc/cron.d/alcasar-watchdog
1709
# activation du "chien de garde" (watchdog) toutes les 3'
1716
# activation du "chien de garde" (watchdog) toutes les 3'
1710
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1717
*/3 * * * * root $DIR_DEST_BIN/alcasar-watchdog.sh > /dev/null 2>&1
1711
EOF
1718
EOF
1712
# activation du "chien de garde des services" (watchdog) toutes les 18'
1719
# activation du "chien de garde des services" (watchdog) toutes les 18'
1713
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1720
	cat << EOF > /etc/cron.d/alcasar-daemon-watchdog
1714
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1721
# activation du "chien de garde" (daemon-watchdog) toutes les 18'
1715
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1722
*/18 * * * * root $DIR_DEST_BIN/alcasar-daemon.sh > /dev/null 2>&1
1716
EOF
1723
EOF
1717
# suppression des crons usagers
1724
# suppression des crons usagers
1718
	rm -f /var/spool/cron/*
1725
	rm -f /var/spool/cron/*
1719
} # End cron
1726
} # End cron
1720
 
1727
 
1721
##################################################################
1728
##################################################################
1722
## 			Fonction "Fail2Ban"			##
1729
## 			Fonction "Fail2Ban"			##
1723
##- Modification de la configuration de fail2ban		##
1730
##- Modification de la configuration de fail2ban		##
1724
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1731
##- Sécurisation DDOS, SSH-Brute-Force, Intercept.php ...	##
1725
##################################################################
1732
##################################################################
1726
fail2ban()
1733
fail2ban()
1727
{
1734
{
1728
	$DIR_CONF/fail2ban.sh
1735
	$DIR_CONF/fail2ban.sh
1729
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1736
# Autorise la lecture seule 2 des 3 fichiers de log concernés, havp est traité dans le script d'init de havp
1730
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1737
	[ -e /var/log/fail2ban.log ] || touch /var/log/fail2ban.log
1731
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1738
	[ -e /var/Save/security/watchdog.log ] || touch /var/Save/security/watchdog.log
1732
	chmod 644 /var/log/fail2ban.log
1739
	chmod 644 /var/log/fail2ban.log
1733
	chmod 644 /var/Save/security/watchdog.log
1740
	chmod 644 /var/Save/security/watchdog.log
1734
	/usr/bin/touch /var/log/auth.log
1741
	/usr/bin/touch /var/log/auth.log
1735
# fail2ban unit
1742
# fail2ban unit
1736
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1743
[ -e /lib/systemd/system/fail2ban.service.default ] || cp /lib/systemd/system/fail2ban.service /lib/systemd/system/fail2ban.service.default
1737
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1744
$SED '/ExecStart=/a\ExecStop=/usr/bin/fail2ban-client stop' /usr/lib/systemd/system/fail2ban.service
1738
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1745
$SED '/Type=/a\PIDFile=/var/run/fail2ban/fail2ban.pid' /usr/lib/systemd/system/fail2ban.service
1739
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1746
$SED '/After=*/c After=syslog.target network.target httpd.service' /usr/lib/systemd/system/fail2ban.service
1740
} #Fin de fail2ban_install()
1747
} #Fin de fail2ban_install()
1741
 
1748
 
1742
##################################################################
1749
##################################################################
1743
## 			Fonction "gammu_smsd"			##
1750
## 			Fonction "gammu_smsd"			##
1744
## - Creation de la base de donnée Gammu			##
1751
## - Creation de la base de donnée Gammu			##
1745
## - Creation du fichier de config: gammu_smsd_conf		##
1752
## - Creation du fichier de config: gammu_smsd_conf		##
1746
##								##
1753
##								##
1747
##################################################################
1754
##################################################################
1748
gammu_smsd()
1755
gammu_smsd()
1749
{
1756
{
1750
# Create 'gammu' databse
1757
# Create 'gammu' databse
1751
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1758
MYSQL="/usr/bin/mysql -uroot -p$mysqlpwd --exec"
1752
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1759
	$MYSQL="CREATE DATABASE IF NOT EXISTS $DB_GAMMU;GRANT ALL ON $DB_GAMMU.* TO $DB_USER@localhost IDENTIFIED BY '$radiuspwd';FLUSH PRIVILEGES"
1753
# Add a gammu database structure
1760
# Add a gammu database structure
1754
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1761
	mysql -u$DB_USER -p$radiuspwd $DB_GAMMU < $DIR_CONF/gammu-smsd-db-vierge.sql
1755
 
1762
 
1756
# config file for the daemon
1763
# config file for the daemon
1757
cat << EOF > /etc/gammu_smsd_conf
1764
cat << EOF > /etc/gammu_smsd_conf
1758
[gammu]
1765
[gammu]
1759
port = /dev/ttyUSB0
1766
port = /dev/ttyUSB0
1760
connection = at115200
1767
connection = at115200
1761
 
1768
 
1762
;########################################################
1769
;########################################################
1763
 
1770
 
1764
[smsd]
1771
[smsd]
1765
 
1772
 
1766
PIN = 1234
1773
PIN = 1234
1767
 
1774
 
1768
logfile = /var/log/gammu-smsd/gammu-smsd.log
1775
logfile = /var/log/gammu-smsd/gammu-smsd.log
1769
logformat = textall
1776
logformat = textall
1770
debuglevel = 0
1777
debuglevel = 0
1771
 
1778
 
1772
service = sql
1779
service = sql
1773
driver = native_mysql
1780
driver = native_mysql
1774
user = $DB_USER
1781
user = $DB_USER
1775
password = $radiuspwd
1782
password = $radiuspwd
1776
pc = localhost
1783
pc = localhost
1777
database = $DB_GAMMU
1784
database = $DB_GAMMU
1778
 
1785
 
1779
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1786
RunOnReceive = /usr/local/bin/alcasar-sms.sh --new_sms
1780
 
1787
 
1781
StatusFrequency = 30
1788
StatusFrequency = 30
1782
;LoopSleep = 2
1789
;LoopSleep = 2
1783
 
1790
 
1784
;ResetFrequency = 300
1791
;ResetFrequency = 300
1785
;HardResetFrequency = 120
1792
;HardResetFrequency = 120
1786
 
1793
 
1787
CheckSecurity = 1 
1794
CheckSecurity = 1 
1788
CheckSignal = 1
1795
CheckSignal = 1
1789
CheckBattery = 0
1796
CheckBattery = 0
1790
EOF
1797
EOF
1791
 
1798
 
1792
chmod 755 /etc/gammu_smsd_conf
1799
chmod 755 /etc/gammu_smsd_conf
1793
 
1800
 
1794
#Creation dossier de log Gammu-smsd
1801
#Creation dossier de log Gammu-smsd
1795
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1802
[ -e /var/log/gammu-smsd ] || mkdir /var/log/gammu-smsd
1796
chmod 755 /var/log/gammu-smsd
1803
chmod 755 /var/log/gammu-smsd
1797
 
1804
 
1798
#Edition du script sql gammu <-> radius
1805
#Edition du script sql gammu <-> radius
1799
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1806
$SED "s/^u_db=\".*/u_db=\"$DB_USER\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1800
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1807
$SED "s/^p_db=\".*/p_db=\"$radiuspwd\"/g" $DIR_DEST_BIN/alcasar-sms.sh
1801
 
1808
 
1802
#Création de la règle udev pour les Huawei // idVendor: 12d1
1809
#Création de la règle udev pour les Huawei // idVendor: 12d1
1803
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1810
cat << EOF > /etc/udev/rules.d/66-huawei.rules
1804
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1811
KERNEL=="ttyUSB0",ATTRS{idVendor}=="12d1",RUN+="/usr/local/bin/alcasar-sms.sh --mode"
1805
EOF
1812
EOF
1806
 
1813
 
1807
} # END gammu_smsd()
1814
} # END gammu_smsd()
1808
 
1815
 
1809
##################################################################
1816
##################################################################
1810
##			Fonction "post_install"			##
1817
##			Fonction "post_install"			##
1811
## - Modification des bannières (locales et ssh) et des prompts ##
1818
## - Modification des bannières (locales et ssh) et des prompts ##
1812
## - Installation de la structure de chiffrement pour root	##
1819
## - Installation de la structure de chiffrement pour root	##
1813
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1820
## - Mise en place du sudoers et de la sécurité sur les fichiers##
1814
## - Mise en place du la rotation des logs			##
1821
## - Mise en place du la rotation des logs			##
1815
## - Configuration dans le cas d'une mise à jour		##
1822
## - Configuration dans le cas d'une mise à jour		##
1816
##################################################################
1823
##################################################################
1817
post_install()
1824
post_install()
1818
{
1825
{
1819
# création de la bannière locale
1826
# création de la bannière locale
1820
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1827
	[ -e /etc/mageia-release.default ]  || cp /etc/mageia-release /etc/mageia-release.default
1821
	cp -f $DIR_CONF/banner /etc/mageia-release
1828
	cp -f $DIR_CONF/banner /etc/mageia-release
1822
	echo " V$VERSION" >> /etc/mageia-release
1829
	echo " V$VERSION" >> /etc/mageia-release
1823
# création de la bannière SSH
1830
# création de la bannière SSH
1824
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1831
	cp /etc/mageia-release /etc/ssh/alcasar-banner-ssh
1825
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1832
	chmod 644 /etc/ssh/alcasar-banner-ssh ; chown root:root /etc/ssh/alcasar-banner-ssh
1826
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1833
	[ -e /etc/ssh/sshd_config.default ] || cp /etc/ssh/sshd_config /etc/ssh/sshd_config.default
1827
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1834
	$SED "s?^Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1828
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1835
	$SED "s?^#Banner.*?Banner /etc/ssh/alcasar-banner-ssh?g" /etc/ssh/sshd_config
1829
# postfix banner anonymisation
1836
# postfix banner anonymisation
1830
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1837
	$SED "s?^smtpd_banner =.*?smtpd_banner = $myhostname ESMTP?g" /etc/postfix/main.cf
1831
# sshd écoute côté LAN et WAN
1838
# sshd écoute côté LAN et WAN
1832
	$SED "s?^#ListenAddress.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1839
	$SED "s?^#ListenAddress.*?ListenAddress 0\.0\.0\.0?g" /etc/ssh/sshd_config
1833
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1840
	# Put the default value in conf file (sshd, QOS and protocols/dns/ are off)(web antivirus is on)
1834
	echo "SSH=off" >> $CONF_FILE
1841
	echo "SSH=off" >> $CONF_FILE
1835
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1842
	echo 'SSH_ADMIN_FROM=0.0.0.0/0.0.0.0' >> $CONF_FILE
1836
	echo "QOS=off" >> $CONF_FILE
1843
	echo "QOS=off" >> $CONF_FILE
1837
	echo "LDAP=off" >> $CONF_FILE
1844
	echo "LDAP=off" >> $CONF_FILE
1838
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1845
	echo "LDAP_IP=0.0.0.0/0.0.0.0" >> $CONF_FILE
1839
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1846
	echo "YOUTUBE_ID=ABCD1234567890abcdef" >> $CONF_FILE
1840
	echo "MULTIWAN=off" >> $CONF_FILE
1847
	echo "MULTIWAN=off" >> $CONF_FILE
1841
	echo "FAILOVER=30" >> $CONF_FILE
1848
	echo "FAILOVER=30" >> $CONF_FILE
1842
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1849
	echo "## WANx=active,@IPx/mask,GWx,Weight,MTUx" >> $CONF_FILE
1843
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1850
	echo "#WAN1=\"1,$EXTIF:1,192.168.2.20/24,192.168.2.6,1,1500\"" >> $CONF_FILE
1844
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1851
	echo "#WAN2=\"1,$EXTIF:2,192.168.3.20/24,192.168.3.1,2,1500\"" >> $CONF_FILE
1845
# Coloration des prompts
1852
# Coloration des prompts
1846
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1853
	[ -e /etc/bashrc.default ]  || cp /etc/bashrc /etc/bashrc.default
1847
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1854
	cp -f $DIR_CONF/bashrc /etc/. ; chmod 644 /etc/bashrc ; chown root:root /etc/bashrc
1848
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1855
	$SED "s?^ORGANISME.*?ORGANISME=$ORGANISME?g" /etc/bashrc
1849
# Droits d'exécution pour utilisateur apache et sysadmin
1856
# Droits d'exécution pour utilisateur apache et sysadmin
1850
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1857
	[ -e /etc/sudoers.default ]  || cp /etc/sudoers /etc/sudoers.default
1851
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1858
	cp -f $DIR_CONF/sudoers /etc/. ; chmod 440 /etc/sudoers ; chown root:root /etc/sudoers
1852
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1859
	$SED "s?^Host_Alias.*?Host_Alias	LAN_ORG=$PRIVATE_NETWORK/$PRIVATE_NETMASK,localhost		#réseau de l'organisme?g" /etc/sudoers
1853
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1860
# prise en compte de la rotation des logs sur 1 an (concerne mysql, httpd, dansguardian, radiusd, ulogd)
1854
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1861
	cp -f $DIR_CONF/logrotate.d/* /etc/logrotate.d/
1855
	chmod 644 /etc/logrotate.d/*
1862
	chmod 644 /etc/logrotate.d/*
1856
# rectification sur versions précédentes de la compression des logs
1863
# rectification sur versions précédentes de la compression des logs
1857
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1864
	$SED "s?^delaycompress.*?#&?g" /etc/logrotate.conf
1858
# actualisation des fichiers logs compressés
1865
# actualisation des fichiers logs compressés
1859
	for dir in firewall dansguardian httpd
1866
	for dir in firewall dansguardian httpd
1860
	do
1867
	do
1861
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1868
	      find /var/log/$dir -type f -name *.log-[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9] -exec gzip {} \;
1862
	done
1869
	done
1863
# create the alcasar-load_balancing unit
1870
# create the alcasar-load_balancing unit
1864
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1871
	cat << EOF > /lib/systemd/system/alcasar-load_balancing.service
1865
#  This file is part of systemd.
1872
#  This file is part of systemd.
1866
#
1873
#
1867
#  systemd is free software; you can redistribute it and/or modify it
1874
#  systemd is free software; you can redistribute it and/or modify it
1868
#  under the terms of the GNU General Public License as published by
1875
#  under the terms of the GNU General Public License as published by
1869
#  the Free Software Foundation; either version 2 of the License, or
1876
#  the Free Software Foundation; either version 2 of the License, or
1870
#  (at your option) any later version.
1877
#  (at your option) any later version.
1871
 
1878
 
1872
# This unit lauches alcasar-load-balancing.sh script.
1879
# This unit lauches alcasar-load-balancing.sh script.
1873
[Unit]
1880
[Unit]
1874
Description=alcasar-load_balancing.sh execution
1881
Description=alcasar-load_balancing.sh execution
1875
After=network.target iptables.service
1882
After=network.target iptables.service
1876
 
1883
 
1877
[Service]
1884
[Service]
1878
Type=oneshot
1885
Type=oneshot
1879
RemainAfterExit=yes
1886
RemainAfterExit=yes
1880
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1887
ExecStart=/usr/local/sbin/alcasar-load_balancing.sh start
1881
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1888
ExecStop=/usr/local/sbin/alcasar-load_balancing.sh stop
1882
TimeoutSec=0
1889
TimeoutSec=0
1883
SysVStartPriority=99
1890
SysVStartPriority=99
1884
 
1891
 
1885
[Install]
1892
[Install]
1886
WantedBy=multi-user.target
1893
WantedBy=multi-user.target
1887
EOF
1894
EOF
1888
# processes launched at boot time (Systemctl)
1895
# processes launched at boot time (Systemctl)
1889
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1896
	for i in alcasar-load_balancing mysqld httpd ntpd iptables dnsmasq dnsmasq-blacklist dnsmasq-whitelist dnsmasq-blackhole radiusd nfsen dansguardian freshclam ulogd-ssh ulogd-traceability ulogd-ext-access chilli fail2ban havp tinyproxy vnstat
1890
	do
1897
	do
1891
		systemctl -q enable $i.service
1898
		systemctl -q enable $i.service
1892
	done
1899
	done
1893
	
1900
	
1894
# disable processes at boot time (Systemctl)
1901
# disable processes at boot time (Systemctl)
1895
	for i in ulogd
1902
	for i in ulogd
1896
	do
1903
	do
1897
		systemctl -q disable $i.service
1904
		systemctl -q disable $i.service
1898
	done
1905
	done
1899
	
1906
	
1900
# Apply French Security Agency (ANSSI) rules
1907
# Apply French Security Agency (ANSSI) rules
1901
# ignore ICMP broadcast (smurf attack)
1908
# ignore ICMP broadcast (smurf attack)
1902
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1909
	echo "net.ipv4.icmp_echo_ignore_broadcasts = 1" > /etc/sysctl.d/alcasar.conf
1903
# ignore ICMP errors bogus
1910
# ignore ICMP errors bogus
1904
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1911
	echo "net.ipv4.icmp_ignore_bogus_error_responses = 1" >> /etc/sysctl.d/alcasar.conf
1905
# remove ICMP redirects responces
1912
# remove ICMP redirects responces
1906
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1913
	echo "net.ipv4.conf.all.accept_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1907
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1914
	echo "net.ipv4.conf.all.send_redirects = 0" >> /etc/sysctl.d/alcasar.conf
1908
# enable SYN Cookies (Syn flood attacks)
1915
# enable SYN Cookies (Syn flood attacks)
1909
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1916
	echo "net.ipv4.tcp_syncookies = 1" >> /etc/sysctl.d/alcasar.conf
1910
# enable kernel antispoofing
1917
# enable kernel antispoofing
1911
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1918
	echo "net.ipv4.conf.all.rp_filter = 1" >> /etc/sysctl.d/alcasar.conf
1912
# ignore source routing
1919
# ignore source routing
1913
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1920
	echo "net.ipv4.conf.all.accept_source_route = 0" >> /etc/sysctl.d/alcasar.conf
1914
# set conntrack timer to 1h (3600s) instead of 5 weeks
1921
# set conntrack timer to 1h (3600s) instead of 5 weeks
1915
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1922
	echo "net.netfilter.nf_conntrack_tcp_timeout_established = 3600" >> /etc/sysctl.d/alcasar.conf
1916
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1923
# disable log_martians (ALCASAR is often installed between two private network addresses) 
1917
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1924
	echo "net.ipv4.conf.all.log_martians = 0" >> /etc/sysctl.d/alcasar.conf
1918
# remove Magic SysReq Keys
1925
# remove Magic SysReq Keys
1919
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1926
	[ -e /etc/sysctl.d/51-alt-sysrq.conf ] && rm /etc/sysctl.d/51-alt-sysrq.conf
1920
# switch to multi-users runlevel (instead of x11)
1927
# switch to multi-users runlevel (instead of x11)
1921
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1928
	ln -sf /lib/systemd/system/multi-user.target /etc/systemd/system/default.target
1922
#	GRUB modifications
1929
#	GRUB modifications
1923
# limit wait time to 3s
1930
# limit wait time to 3s
1924
# create an alcasar entry instead of linux-nonfb
1931
# create an alcasar entry instead of linux-nonfb
1925
# change display to 1024*768 (vga791)
1932
# change display to 1024*768 (vga791)
1926
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1933
	$SED "s?^timeout.*?timeout 3?g" /boot/grub/menu.lst
1927
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1934
	$SED "s?^title linux?title ALCASAR?g" /boot/grub/menu.lst
1928
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1935
	$SED "/^kernel/s/splash quiet //" /boot/grub/menu.lst
1929
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1936
	$SED "/^kernel/s/vga=.*/vga=791 nomodeset/" /boot/grub/menu.lst
1930
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1937
	$SED "/^kernel/s/BOOT_IMAGE=linux /BOOT_IMAGE=linux-nonfb /" /boot/grub/menu.lst
1931
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1938
	$SED "/^gfxmenu/d" /boot/grub/menu.lst
1932
# Remove unused services and users
1939
# Remove unused services and users
1933
	for svc in sshd
1940
	for svc in sshd
1934
	do
1941
	do
1935
		/bin/systemctl -q disable $svc.service
1942
		/bin/systemctl -q disable $svc.service
1936
	done
1943
	done
1937
# Load and apply the previous conf file
1944
# Load and apply the previous conf file
1938
	if [ "$mode" = "update" ]
1945
	if [ "$mode" = "update" ]
1939
	then
1946
	then
1940
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1947
		$DIR_DEST_BIN/alcasar-archive.sh --now # exports current logs in /var/Save/logs
1941
		$DIR_DEST_BIN/alcasar-conf.sh --load
1948
		$DIR_DEST_BIN/alcasar-conf.sh --load
1942
		PARENT_SCRIPT=`basename $0`
1949
		PARENT_SCRIPT=`basename $0`
1943
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1950
		export PARENT_SCRIPT # to avoid stop&start process during the installation process
1944
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1951
		$DIR_DEST_BIN/alcasar-conf.sh --apply
1945
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1952
		$SED "s?^INSTALL_DATE=.*?INSTALL_DATE=$DATE?g" $CONF_FILE
1946
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1953
		$SED "s?^VERSION=.*?VERSION=$VERSION?g" $CONF_FILE
1947
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1954
		if [ $MAJ_PREVIOUS_VERSION -lt 2 ] || ([ $MAJ_PREVIOUS_VERSION -eq 2 ] && [ $MIN_PREVIOUS_VERSION -lt 8 ])
1948
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1955
		# update needed for versions previous then 2.8 due to the integration of the domainname ("localdomain" by default)
1949
		then
1956
		then
1950
			header_install
1957
			header_install
1951
			if [ $Lang == "fr" ]
1958
			if [ $Lang == "fr" ]
1952
			then 
1959
			then 
1953
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1960
				echo "Cette mise à jour nécessite de redéfinir le premier compte d'administration du portail"
1954
				echo
1961
				echo
1955
				echo -n "Nom : "
1962
				echo -n "Nom : "
1956
			else
1963
			else
1957
				echo "This update need to redefine the first admin account"
1964
				echo "This update need to redefine the first admin account"
1958
				echo
1965
				echo
1959
				echo -n "Account : "
1966
				echo -n "Account : "
1960
			fi
1967
			fi
1961
			read admin_portal
1968
			read admin_portal
1962
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1969
			[ -d $DIR_DEST_ETC/digest ] && rm -rf $DIR_DEST_ETC/digest
1963
			mkdir -p $DIR_DEST_ETC/digest
1970
			mkdir -p $DIR_DEST_ETC/digest
1964
			chmod 755 $DIR_DEST_ETC/digest
1971
			chmod 755 $DIR_DEST_ETC/digest
1965
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1972
			until [ -s $DIR_DEST_ETC/digest/key_admin ]
1966
			do
1973
			do
1967
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1974
				/usr/bin/htdigest -c $DIR_DEST_ETC/digest/key_admin $HOSTNAME.$DOMAIN $admin_portal
1968
			done
1975
			done
1969
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1976
			$DIR_DEST_SBIN/alcasar-profil.sh --list
1970
		fi
1977
		fi
1971
	fi
1978
	fi
1972
	rm -f /tmp/alcasar-conf*
1979
	rm -f /tmp/alcasar-conf*
1973
	chown -R root:apache $DIR_DEST_ETC/*
1980
	chown -R root:apache $DIR_DEST_ETC/*
1974
	chmod -R 660 $DIR_DEST_ETC/*
1981
	chmod -R 660 $DIR_DEST_ETC/*
1975
	chmod ug+x $DIR_DEST_ETC/digest
1982
	chmod ug+x $DIR_DEST_ETC/digest
1976
# Apply and save the firewall rules
1983
# Apply and save the firewall rules
1977
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1984
 	sh $DIR_DEST_BIN/alcasar-iptables.sh
1978
	sleep 2
1985
	sleep 2
1979
	cd $DIR_INSTALL
1986
	cd $DIR_INSTALL
1980
	echo ""
1987
	echo ""
1981
	echo "#############################################################################"
1988
	echo "#############################################################################"
1982
	if [ $Lang == "fr" ]
1989
	if [ $Lang == "fr" ]
1983
		then
1990
		then
1984
		echo "#                        Fin d'installation d'ALCASAR                       #"
1991
		echo "#                        Fin d'installation d'ALCASAR                       #"
1985
		echo "#                                                                           #"
1992
		echo "#                                                                           #"
1986
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1993
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
1987
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1994
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
1988
		echo "#                                                                           #"
1995
		echo "#                                                                           #"
1989
		echo "#############################################################################"
1996
		echo "#############################################################################"
1990
		echo
1997
		echo
1991
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1998
		echo "- ALCASAR sera fonctionnel après redémarrage du système"
1992
		echo
1999
		echo
1993
		echo "- Lisez attentivement la documentation d'exploitation"
2000
		echo "- Lisez attentivement la documentation d'exploitation"
1994
		echo
2001
		echo
1995
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
2002
		echo "- Le centre de controle d'ALCASAR (ACC) est à l'adresse http://alcasar"
1996
		echo
2003
		echo
1997
		echo "                   Appuyez sur 'Entrée' pour continuer"
2004
		echo "                   Appuyez sur 'Entrée' pour continuer"
1998
	else	
2005
	else	
1999
		echo "#                        Enf of ALCASAR install process                     #"
2006
		echo "#                        Enf of ALCASAR install process                     #"
2000
		echo "#                                                                           #"
2007
		echo "#                                                                           #"
2001
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2008
		echo "#         Application Libre pour le Contrôle Authentifié et Sécurisé        #"
2002
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2009
		echo "#                     des Accès au Réseau ( ALCASAR )                       #"
2003
		echo "#                                                                           #"
2010
		echo "#                                                                           #"
2004
		echo "#############################################################################"
2011
		echo "#############################################################################"
2005
		echo
2012
		echo
2006
		echo "- The system will be rebooted in order to operate ALCASAR"
2013
		echo "- The system will be rebooted in order to operate ALCASAR"
2007
		echo
2014
		echo
2008
		echo "- Read the exploitation documentation"
2015
		echo "- Read the exploitation documentation"
2009
		echo
2016
		echo
2010
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2017
		echo "- The ALCASAR Control Center (ACC) is at http://alcasar"
2011
		echo
2018
		echo
2012
		echo "                   Hit 'Enter' to continue"
2019
		echo "                   Hit 'Enter' to continue"
2013
	fi
2020
	fi
2014
	sleep 2
2021
	sleep 2
2015
	if [ "$mode" != "update" ]
2022
	if [ "$mode" != "update" ]
2016
	then
2023
	then
2017
		read a
2024
		read a
2018
	fi
2025
	fi
2019
	clear
2026
	clear
2020
	reboot
2027
	reboot
2021
} # End post_install ()
2028
} # End post_install ()
2022
 
2029
 
2023
#################################
2030
#################################
2024
#  	Main Install loop  	#
2031
#  	Main Install loop  	#
2025
#################################
2032
#################################
2026
dir_exec=`dirname "$0"`
2033
dir_exec=`dirname "$0"`
2027
if [ $dir_exec != "." ]
2034
if [ $dir_exec != "." ]
2028
then
2035
then
2029
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2036
	echo "Lancez ce programme depuis le répertoire de l'archive d'ALCASAR"
2030
	echo "Launch this program from the ALCASAR archive directory"
2037
	echo "Launch this program from the ALCASAR archive directory"
2031
	exit 0
2038
	exit 0
2032
fi
2039
fi
2033
VERSION=`cat $DIR_INSTALL/VERSION`
2040
VERSION=`cat $DIR_INSTALL/VERSION`
2034
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2041
usage="Usage: alcasar.sh {-i or --install} | {-u or --uninstall}"
2035
nb_args=$#
2042
nb_args=$#
2036
args=$1
2043
args=$1
2037
if [ $nb_args -eq 0 ]
2044
if [ $nb_args -eq 0 ]
2038
then
2045
then
2039
	nb_args=1
2046
	nb_args=1
2040
	args="-h"
2047
	args="-h"
2041
fi
2048
fi
2042
chmod -R u+x $DIR_SCRIPTS/*
2049
chmod -R u+x $DIR_SCRIPTS/*
2043
case $args in
2050
case $args in
2044
	-\? | -h* | --h*)
2051
	-\? | -h* | --h*)
2045
		echo "$usage"
2052
		echo "$usage"
2046
		exit 0
2053
		exit 0
2047
		;;
2054
		;;
2048
	-i | --install)
2055
	-i | --install)
2049
		license
2056
		license
2050
		header_install
2057
		header_install
2051
		testing
2058
		testing
2052
# RPMs install
2059
# RPMs install
2053
		$DIR_SCRIPTS/alcasar-urpmi.sh
2060
		$DIR_SCRIPTS/alcasar-urpmi.sh
2054
		if [ "$?" != "0" ]
2061
		if [ "$?" != "0" ]
2055
		then
2062
		then
2056
			exit 0
2063
			exit 0
2057
		fi
2064
		fi
2058
		if [ -e $CONF_FILE ]
2065
		if [ -e $CONF_FILE ]
2059
		then
2066
		then
2060
# Uninstall the running version
2067
# Uninstall the running version
2061
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2068
			$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2062
		fi
2069
		fi
2063
# Test if manual update	
2070
# Test if manual update	
2064
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2071
		if [ -e /tmp/alcasar-conf*.tar.gz ] && [ "$mode" == "install" ]
2065
		then
2072
		then
2066
			header_install
2073
			header_install
2067
			if [ $Lang == "fr" ]
2074
			if [ $Lang == "fr" ]
2068
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2075
				then echo "Le fichier de configuration d'une ancienne version a été trouvé";
2069
				else echo "The configuration file of an old version has been found";
2076
				else echo "The configuration file of an old version has been found";
2070
			fi
2077
			fi
2071
			response=0
2078
			response=0
2072
			PTN='^[oOnNyY]$'
2079
			PTN='^[oOnNyY]$'
2073
			until [[ $(expr $response : $PTN) -gt 0 ]]
2080
			until [[ $(expr $response : $PTN) -gt 0 ]]
2074
			do
2081
			do
2075
				if [ $Lang == "fr" ]
2082
				if [ $Lang == "fr" ]
2076
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2083
					then echo -n "Voulez-vous l'utiliser (O/n)? ";
2077
					else echo -n "Do you want to use it (Y/n)?";
2084
					else echo -n "Do you want to use it (Y/n)?";
2078
				 fi
2085
				 fi
2079
				read response
2086
				read response
2080
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2087
				if [ "$response" = "n" ] || [ "$response" = "N" ] 
2081
				then rm -f /tmp/alcasar-conf*
2088
				then rm -f /tmp/alcasar-conf*
2082
				fi
2089
				fi
2083
			done
2090
			done
2084
		fi
2091
		fi
2085
# Test if update
2092
# Test if update
2086
		if [ -e /tmp/alcasar-conf* ] 
2093
		if [ -e /tmp/alcasar-conf* ] 
2087
		then
2094
		then
2088
			if [ $Lang == "fr" ]
2095
			if [ $Lang == "fr" ]
2089
				then echo "#### Installation avec mise à jour ####";
2096
				then echo "#### Installation avec mise à jour ####";
2090
				else echo "#### Installation with update     ####";
2097
				else echo "#### Installation with update     ####";
2091
			fi
2098
			fi
2092
# Extract the central configuration file
2099
# Extract the central configuration file
2093
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2100
			tar -xf /tmp/alcasar-conf* conf/etc/alcasar.conf 
2094
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2101
			ORGANISME=`grep ORGANISM conf/etc/alcasar.conf|cut -d"=" -f2`
2095
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2102
			PREVIOUS_VERSION=`grep VERSION conf/etc/alcasar.conf|cut -d"=" -f2`
2096
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2103
			MAJ_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f1`
2097
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2104
			MIN_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f2|cut -c1`
2098
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2105
			UPD_PREVIOUS_VERSION=`echo $PREVIOUS_VERSION|cut -d"." -f3`
2099
			mode="update"
2106
			mode="update"
2100
		fi
2107
		fi
2101
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen dnsmasq BL cron fail2ban gammu_smsd post_install
2108
		for func in init network ACC CA init_db radius radius_web chilli dansguardian antivirus tinyproxy ulogd nfsen dnsmasq BL cron fail2ban gammu_smsd post_install
2102
		do
2109
		do
2103
			$func
2110
			$func
2104
# echo "*** 'debug' : end of function $func ***"; read a
2111
# echo "*** 'debug' : end of function $func ***"; read a
2105
		done
2112
		done
2106
		;;
2113
		;;
2107
	-u | --uninstall)
2114
	-u | --uninstall)
2108
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2115
		if [ ! -e $DIR_DEST_SBIN/alcasar-uninstall.sh ]
2109
		then
2116
		then
2110
			if [ $Lang == "fr" ]
2117
			if [ $Lang == "fr" ]
2111
				then echo "ALCASAR n'est pas installé!";
2118
				then echo "ALCASAR n'est pas installé!";
2112
				else echo "ALCASAR isn't installed!";
2119
				else echo "ALCASAR isn't installed!";
2113
			fi
2120
			fi
2114
			exit 0
2121
			exit 0
2115
		fi
2122
		fi
2116
		response=0
2123
		response=0
2117
		PTN='^[oOnN]$'
2124
		PTN='^[oOnN]$'
2118
		until [[ $(expr $response : $PTN) -gt 0 ]]
2125
		until [[ $(expr $response : $PTN) -gt 0 ]]
2119
		do
2126
		do
2120
			if [ $Lang == "fr" ]
2127
			if [ $Lang == "fr" ]
2121
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2128
				then echo -n "Voulez-vous créer le fichier de configuration de la version actuelle (0/n)? ";
2122
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2129
				else echo -n "Do you want to create the running version configuration file (Y/n)? ";
2123
			fi
2130
			fi
2124
			read response
2131
			read response
2125
		done
2132
		done
2126
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2133
		if [ "$response" = "o" ] || [ "$response" = "O" ] || [ "$response" = "Y" ] || [ "$response" = "y" ]
2127
		then
2134
		then
2128
			$DIR_SCRIPTS/alcasar-conf.sh --create
2135
			$DIR_SCRIPTS/alcasar-conf.sh --create
2129
		else	
2136
		else	
2130
			rm -f /tmp/alcasar-conf*
2137
			rm -f /tmp/alcasar-conf*
2131
		fi
2138
		fi
2132
# Uninstall the running version
2139
# Uninstall the running version
2133
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2140
		$DIR_SCRIPTS/sbin/alcasar-uninstall.sh
2134
		;;
2141
		;;
2135
	*)
2142
	*)
2136
		echo "Argument inconnu :$1";
2143
		echo "Argument inconnu :$1";
2137
		echo "Unknown argument :$1";
2144
		echo "Unknown argument :$1";
2138
		echo "$usage"
2145
		echo "$usage"
2139
		exit 1
2146
		exit 1
2140
		;;
2147
		;;
2141
esac
2148
esac
2142
# end of script
2149
# end of script
2143
 
2150
 
2144
 
2151