2088 |
raphael.pi |
1 |
#!/bin/sh
|
2234 |
richard |
2 |
#
|
|
|
3 |
# $Id: alcasar-macup.sh 2262 2017-05-29 20:19:03Z tom.houdayer $
|
|
|
4 |
#
|
|
|
5 |
# Le script 'macup' est appelé par coovachilli lorsqu'il attribut une @IP à une @MAC.
|
|
|
6 |
# Depuis la version 3.1 de ALCASAR, le système d'interception a changé. On doit traiter les authorisations par adresse MAC en amont
|
|
|
7 |
# Pour une adresse mac authorisée, nous stockons sont @IP dans l'ipset 'not_filtered'
|
2088 |
raphael.pi |
8 |
|
2234 |
richard |
9 |
if [ -z $CALLING_STATION_ID ]; then
|
|
|
10 |
exit 1
|
|
|
11 |
fi
|
2088 |
raphael.pi |
12 |
|
|
|
13 |
chilli_current_mac=$(chilli_query list | grep $CALLING_STATION_ID)
|
|
|
14 |
is_connected=$(echo $chilli_current_mac | cut -d' ' -f5)
|
|
|
15 |
current_mac=$(echo $chilli_current_mac | cut -d' ' -f1)
|
|
|
16 |
current_name=$(echo $chilli_current_mac | cut -d' ' -f6)
|
|
|
17 |
current_ip=$(echo $chilli_current_mac | cut -d' ' -f2)
|
|
|
18 |
|
2094 |
raphael.pi |
19 |
|
2088 |
raphael.pi |
20 |
if [ $is_connected == "1" ] && [ $current_mac == $current_name ]; then
|
2094 |
raphael.pi |
21 |
#Lecture du filter-id dans la DB radius afin de placer l'équipement réseau dans le bon ipset
|
|
|
22 |
#Un équipement autorisé "à chaud" sera placé dans l'ipset 'not_filtered' + pas de filtrage de protocole (proto_0)
|
|
|
23 |
PASSWD_FILE="/root/ALCASAR-passwords.txt"
|
2234 |
richard |
24 |
QUERY="SELECT value FROM radreply WHERE attribute='Filter-Id' AND username='$current_mac';"
|
|
|
25 |
FILTER_ID=$(mysql -D radius -u root -p$(cat $PASSWD_FILE | grep "root /" | rev | cut -d' ' -f1 | rev) -e "$QUERY" -Ns)
|
2094 |
raphael.pi |
26 |
|
2234 |
richard |
27 |
# FilterID Byte N°0 to 7
|
|
|
28 |
# 0: profile_1 (WEB)
|
|
|
29 |
# 1: profile_2 (WEB + Mail + Remote access)
|
|
|
30 |
# 2: profile_3 (Custom)
|
|
|
31 |
# 3: warn_user (if imputability report has been generated)
|
|
|
32 |
# 5: WL
|
|
|
33 |
# 6: BL
|
|
|
34 |
# 7: HAVP
|
2094 |
raphael.pi |
35 |
|
2249 |
tom.houday |
36 |
if [ ${FILTER_ID:5:1} == '1' ]; then # HAVP_WL
|
|
|
37 |
set_filter="havp_wl"
|
2234 |
richard |
38 |
elif [ ${FILTER_ID:6:1} == '1' ]; then # HAVP_BL
|
|
|
39 |
set_filter="havp_bl"
|
2249 |
tom.houday |
40 |
elif [ ${FILTER_ID:7:1} == '1' ]; then # HAVP
|
|
|
41 |
set_filter="havp"
|
2234 |
richard |
42 |
else # NOT_FILTERED
|
|
|
43 |
set_filter="not_filtered"
|
2094 |
raphael.pi |
44 |
fi
|
|
|
45 |
|
2249 |
tom.houday |
46 |
if [ ${FILTER_ID:2:1} == '1' ]; then # PROFILE 3 (Custom)
|
|
|
47 |
set_proto="proto_3";
|
2234 |
richard |
48 |
elif [ ${FILTER_ID:1:1} == '1' ]; then # PROFILE 2 (WEB + Mail + Remote access)
|
|
|
49 |
set_proto="proto_2";
|
2249 |
tom.houday |
50 |
elif [ ${FILTER_ID:0:1} == '1' ]; then # PROFILE 1 (WEB)
|
|
|
51 |
set_proto="proto_1";
|
2234 |
richard |
52 |
else # PROFILE 0 (Not filtered)
|
|
|
53 |
set_proto="proto_0";
|
2094 |
raphael.pi |
54 |
fi
|
|
|
55 |
|
2234 |
richard |
56 |
ipset add $set_filter $current_ip
|
2094 |
raphael.pi |
57 |
ipset add $set_proto $current_ip
|
2088 |
raphael.pi |
58 |
fi
|