Compare commits
9 Commits
Author | SHA1 | Date | |
---|---|---|---|
b7be885670 | |||
66ba6ac484 | |||
c11548b778 | |||
b76adc7830 | |||
b5db0b93ef | |||
2ee8d4fa6b | |||
703f169a05 | |||
e4df98a2cd | |||
078b3a300c |
20
Sio1/SISR1/20-DNS/Master/db.domaine.lan
Normal file
20
Sio1/SISR1/20-DNS/Master/db.domaine.lan
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
;
|
||||||
|
; BIND data file for local loopback interface
|
||||||
|
;
|
||||||
|
$TTL 604800
|
||||||
|
domaine.lan. IN SOA srv1.domaine.lan. root.srv1.domaine.lan. (
|
||||||
|
2022020100 ; Serial
|
||||||
|
604800 ; Refresh
|
||||||
|
86400 ; Retry
|
||||||
|
2419200 ; Expire
|
||||||
|
604800 ) ; Negative Cache TTL
|
||||||
|
;
|
||||||
|
@ IN NS srv1.domaine.lan.
|
||||||
|
srv1 IN A 192.168.0.110
|
||||||
|
@ IN NS srv2.domaine.lan.
|
||||||
|
srv2 IN A 192.168.0.114
|
||||||
|
|
||||||
|
;@ IN AAAA ::1
|
||||||
|
poste1 IN A 192.168.0.111
|
||||||
|
poste2 IN A 192.168.0.112
|
||||||
|
www2 IN CNAME poste1
|
14
Sio1/SISR1/20-DNS/Master/db.domaine.lan.rev
Normal file
14
Sio1/SISR1/20-DNS/Master/db.domaine.lan.rev
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
$TTL 38400 ; 10 hours 40 minutes
|
||||||
|
@ IN SOA srv1.domaine.lan. root.srv1.domaine.lan. (
|
||||||
|
2022020100 ; serial
|
||||||
|
10800 ; refresh (3 hours)
|
||||||
|
3600 ; retry (1 hour)
|
||||||
|
604800 ; expire (1 week)
|
||||||
|
38400 ; minimum (10 hours 40 minutes)
|
||||||
|
)
|
||||||
|
IN NS srv1.domaine.lan.
|
||||||
|
IN NS srv2.domaine.lan.
|
||||||
|
|
||||||
|
110 IN PTR srv1.domaine.lan.
|
||||||
|
111 IN PTR xp.domaine.lan.
|
||||||
|
114 IN PTR srv2.domaine.lan.
|
11
Sio1/SISR1/20-DNS/Master/named.conf
Normal file
11
Sio1/SISR1/20-DNS/Master/named.conf
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
// This is the primary configuration file for the BIND DNS server named.
|
||||||
|
//
|
||||||
|
// Please read /usr/share/doc/bind9/README.Debian.gz for information on the
|
||||||
|
// structure of BIND configuration files in Debian, *BEFORE* you customize
|
||||||
|
// this configuration file.
|
||||||
|
//
|
||||||
|
// If you are just adding zones, please do that in /etc/bind/named.conf.local
|
||||||
|
|
||||||
|
include "/etc/bind/named.conf.options";
|
||||||
|
include "/etc/bind/named.conf.local";
|
||||||
|
include "/etc/bind/named.conf.default-zones";
|
20
Sio1/SISR1/20-DNS/Master/named.conf.local
Normal file
20
Sio1/SISR1/20-DNS/Master/named.conf.local
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
//
|
||||||
|
// Do any local configuration here
|
||||||
|
//
|
||||||
|
|
||||||
|
// Consider adding the 1918 zones here, if they are not used in your
|
||||||
|
// organization
|
||||||
|
//include "/etc/bind/zones.rfc1918";
|
||||||
|
|
||||||
|
// zone directe
|
||||||
|
zone "domaine.lan" {
|
||||||
|
type master;
|
||||||
|
file "/etc/bind/db.domaine.lan";
|
||||||
|
};
|
||||||
|
|
||||||
|
// zone inverse
|
||||||
|
zone "0.168.192.in-addr.arpa" {
|
||||||
|
type master;
|
||||||
|
notify no;
|
||||||
|
file "/etc/bind/db.domaine.lan.rev";
|
||||||
|
};
|
3
Sio1/SISR1/20-DNS/Master/resolv.conf
Normal file
3
Sio1/SISR1/20-DNS/Master/resolv.conf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
domain domaine.lan
|
||||||
|
search domaine.lan
|
||||||
|
nameserver 127.0.0.1
|
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
|
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# autorise le loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
@ -0,0 +1,28 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# autorise le loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connection ssh
|
||||||
|
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
@ -0,0 +1,36 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# Loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connexion ssh serveur
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||||
|
|
||||||
|
# Requete DNS client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
# Acces HTTP client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||||
|
|
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
@ -0,0 +1,41 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# Loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connexion ssh serveur
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||||
|
|
||||||
|
# Requete DNS client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
# Acces HTTP client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||||
|
|
||||||
|
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||||
|
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||||
|
#sudo iptables -L -t nat # pour controler
|
||||||
|
sudo iptables -A FORWARD -j ACCEPT
|
||||||
|
|
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5.sh
Executable file
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5.sh
Executable file
@ -0,0 +1,46 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# Loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connexion ssh serveur
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||||
|
|
||||||
|
# Requete DNS client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
# Acces HTTP client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||||
|
|
||||||
|
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||||
|
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||||
|
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 172.16.0.0/16
|
||||||
|
#sudo iptables -L -t nat # pour controler
|
||||||
|
sudo iptables -A FORWARD -j ACCEPT
|
||||||
|
|
||||||
|
# Acces DNS sortante
|
||||||
|
sudo iptables -A FORWARD -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A FORWARD -p udp --sport 53 -j ACCEPT
|
||||||
|
|
10
Sio1/SISR1/40-ShellEtBash/crsamba1
Executable file
10
Sio1/SISR1/40-ShellEtBash/crsamba1
Executable file
@ -0,0 +1,10 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
fich=users.txt
|
||||||
|
while read ligne
|
||||||
|
do
|
||||||
|
echo "${ligne}"
|
||||||
|
done < $fich
|
21
Sio1/SISR1/40-ShellEtBash/crsamba2
Executable file
21
Sio1/SISR1/40-ShellEtBash/crsamba2
Executable file
@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#set -e
|
||||||
|
#set -u
|
||||||
|
|
||||||
|
fich=$1
|
||||||
|
|
||||||
|
if [[ $# -ne 1 ]] ; then
|
||||||
|
echo "usage : $0 <fichier>"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! -r "${fich}" ]] ; then
|
||||||
|
echo "$0 : erreur ouverture ${fich}"
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
|
||||||
|
while read ligne
|
||||||
|
do
|
||||||
|
echo "${ligne}"
|
||||||
|
done < $fich
|
22
Sio1/SISR1/40-ShellEtBash/crsamba4
Executable file
22
Sio1/SISR1/40-ShellEtBash/crsamba4
Executable file
@ -0,0 +1,22 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#set -e
|
||||||
|
#set -u
|
||||||
|
|
||||||
|
if [[ $# -ne 1 ]] ; then
|
||||||
|
echo "usage : $0 <fichier>"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! -r "$1" ]] ; then
|
||||||
|
echo "$0 : erreur ouverture ${fich}"
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
fich=$1
|
||||||
|
while read ligne
|
||||||
|
do
|
||||||
|
echo "${ligne}"|cut -d: -f1
|
||||||
|
done < $fich
|
30
Sio1/SISR1/40-ShellEtBash/crsamba5
Executable file
30
Sio1/SISR1/40-ShellEtBash/crsamba5
Executable file
@ -0,0 +1,30 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#set -e
|
||||||
|
#set -u
|
||||||
|
|
||||||
|
if [[ $# -ne 1 ]] ; then
|
||||||
|
echo "usage : $0 <fichier>"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! -r "$1" ]] ; then
|
||||||
|
echo "$0 : erreur ouverture ${fich}"
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
|
||||||
|
fich=$1
|
||||||
|
while read ligne
|
||||||
|
do
|
||||||
|
login=$(echo "${ligne}"|cut -d: -f1)
|
||||||
|
nom=$(echo "${ligne}"|cut -d: -f2)
|
||||||
|
#echo "${login} ${nom}"
|
||||||
|
getent passwd "${login}" >> /dev/null
|
||||||
|
if [[ $? -ne 0 ]] ; then
|
||||||
|
sudo useradd --create-home --home-dir /home/"${login}" --shell /bin/bash --comment "${nom}" "${login}"
|
||||||
|
else
|
||||||
|
echo "$0 : utilisateur ${login} existe deja"
|
||||||
|
fi
|
||||||
|
|
||||||
|
done < $fich
|
||||||
|
|
33
Sio1/SISR1/40-ShellEtBash/crsamba7
Executable file
33
Sio1/SISR1/40-ShellEtBash/crsamba7
Executable file
@ -0,0 +1,33 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#set -e
|
||||||
|
#set -u
|
||||||
|
|
||||||
|
if [[ $# -ne 1 ]] ; then
|
||||||
|
echo "usage : $0 <fichier>"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! -r "$1" ]] ; then
|
||||||
|
echo "$0 : erreur ouverture ${fich}"
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
|
||||||
|
fich=$1
|
||||||
|
while read ligne
|
||||||
|
do
|
||||||
|
login=$(echo "${ligne}"|cut -d: -f1)
|
||||||
|
nom=$(echo "${ligne}"|cut -d: -f2)
|
||||||
|
#echo "${login} ${nom}"
|
||||||
|
getent passwd "${login}" >> /dev/null
|
||||||
|
if [[ $? -ne 0 ]] ; then
|
||||||
|
sudo useradd --create-home --home-dir /home/"${login}" --shell /bin/bash --comment "${nom}" "${login}"
|
||||||
|
mdp=$(pwgen 6 1)
|
||||||
|
#echo "${mdp}"
|
||||||
|
echo "${login}:${mdp}"|chpasswd
|
||||||
|
echo "${login}:${mdp}" >> "${fich}.pwd"
|
||||||
|
else
|
||||||
|
echo "$0 : utilisateur ${login} existe deja"
|
||||||
|
fi
|
||||||
|
done < $fich
|
||||||
|
|
27
Sio1/SISR1/40-ShellEtBash/rsamba
Executable file
27
Sio1/SISR1/40-ShellEtBash/rsamba
Executable file
@ -0,0 +1,27 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
if [[ $# -ne 1 ]] ; then
|
||||||
|
echo "usage : $0 <fichier>"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ ! -r "$1" ]] ; then
|
||||||
|
echo "$0 : erreur ouverture ${fich}"
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
|
||||||
|
fich=$1
|
||||||
|
|
||||||
|
while read -r ligne
|
||||||
|
do
|
||||||
|
login=$(echo "${ligne}"|cut -d: -f1)
|
||||||
|
getent passwd "${login}" > /dev/null
|
||||||
|
if [[ $? -eq 0 ]] ; then
|
||||||
|
sudo userdel --remove "${login}"
|
||||||
|
echo "Utilisateur ${login} supprime"
|
||||||
|
fi
|
||||||
|
|
||||||
|
done < "${fich}"
|
4
Sio1/SISR1/40-ShellEtBash/users.txt
Normal file
4
Sio1/SISR1/40-ShellEtBash/users.txt
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
lucien:Lucien Aymar
|
||||||
|
claudine:Claudine Dupont
|
||||||
|
robert:Robert Michel
|
||||||
|
marcelle:Marcelle Parde
|
8
Sio1/SISR1/40-ShellEtBash/users.txt.pwd
Normal file
8
Sio1/SISR1/40-ShellEtBash/users.txt.pwd
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
lucien:naid0O
|
||||||
|
claudine:ooC8oh
|
||||||
|
robert:Ax0aiy
|
||||||
|
marcelle:iv7Oot
|
||||||
|
lucien:Mie8sh
|
||||||
|
claudine:loHe1t
|
||||||
|
robert:Phoo5i
|
||||||
|
marcelle:WuaL5i
|
Reference in New Issue
Block a user