[radius] update
							parent
							
								
									03a0dbfdca
								
							
						
					
					
						commit
						0e396ce23b
					
				| 
						 | 
					@ -0,0 +1,16 @@
 | 
				
			||||||
 | 
					glob_service_firewall:
 | 
				
			||||||
 | 
					  re2o:
 | 
				
			||||||
 | 
					    hostname: "{{ query('ldap', 'ip', 're2o', 'adm') | ipv4 | first }}"
 | 
				
			||||||
 | 
					    user: services
 | 
				
			||||||
 | 
					    password: "{{ vault.re2o_service_password }}"
 | 
				
			||||||
 | 
					  name: firewall
 | 
				
			||||||
 | 
					  install_dir: /var/local/services/firewall
 | 
				
			||||||
 | 
					  frequency: "*/2 * * * *"
 | 
				
			||||||
 | 
					  options: -q
 | 
				
			||||||
 | 
					  dependencies:
 | 
				
			||||||
 | 
					    - python3-iso8601
 | 
				
			||||||
 | 
					    - python3-jinja2
 | 
				
			||||||
 | 
					    - python3-ldap
 | 
				
			||||||
 | 
					  git:
 | 
				
			||||||
 | 
					    remote: https://gitlab.adm.crans.org/nounous/firewall.git
 | 
				
			||||||
 | 
					    version: cachan
 | 
				
			||||||
| 
						 | 
					@ -4,5 +4,24 @@ glob_freeradius:
 | 
				
			||||||
  proxy_to: FEDEREZ
 | 
					  proxy_to: FEDEREZ
 | 
				
			||||||
  infra_switch: "172.16.33.0/24"
 | 
					  infra_switch: "172.16.33.0/24"
 | 
				
			||||||
  infra_bornes: "172.16.34.0/24"
 | 
					  infra_bornes: "172.16.34.0/24"
 | 
				
			||||||
  secret_switch: "ploptotoswitch"
 | 
					  secret_switch: "{{ vault.radius_secret.switch }}"
 | 
				
			||||||
  secret_bornes: "ploptotobornes"
 | 
					  secret_bornes: "ploptotobornes"  # "{{ vault.radius_secret.bornes }}"
 | 
				
			||||||
 | 
					  delegations:
 | 
				
			||||||
 | 
					    - name: parangon
 | 
				
			||||||
 | 
					      ipv4: 185.230.78.47
 | 
				
			||||||
 | 
					      ipv6: 2a0c:700:12:0:67:e5ff:fee9:5
 | 
				
			||||||
 | 
					      secret: '{{ vault.radius_secret.federez }}'
 | 
				
			||||||
 | 
					      server: radius-wifi
 | 
				
			||||||
 | 
					    - name: dodecagon
 | 
				
			||||||
 | 
					      ipv4: 195.154.165.76
 | 
				
			||||||
 | 
					      ipv6: 2001:bc8:273e::1
 | 
				
			||||||
 | 
					      secret: '{{ vault.radius_secret.federez }}'
 | 
				
			||||||
 | 
					      server: radius-wifi
 | 
				
			||||||
 | 
					      
 | 
				
			||||||
 | 
					loc_certbot:
 | 
				
			||||||
 | 
					  - dns_rfc2136_server: '172.16.10.147'
 | 
				
			||||||
 | 
					    dns_rfc2136_name: certbot_challenge.
 | 
				
			||||||
 | 
					    dns_rfc2136_secret: "{{ vault.certbot_dns_secret }}"
 | 
				
			||||||
 | 
					    mail: root@crans.org
 | 
				
			||||||
 | 
					    certname: crans.org
 | 
				
			||||||
 | 
					    domains: "crans.org"
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -1,81 +0,0 @@
 | 
				
			||||||
---
 | 
					 | 
				
			||||||
loc_home_nounou:
 | 
					 | 
				
			||||||
  ip: 172.17.10.9
 | 
					 | 
				
			||||||
  mountpoint: /rpool/home
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
loc_ldap:
 | 
					 | 
				
			||||||
  servers:
 | 
					 | 
				
			||||||
    - 172.17.10.9
 | 
					 | 
				
			||||||
  base: 'dc=crans,dc=org'
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
glob_ntp_client:
 | 
					 | 
				
			||||||
  servers:
 | 
					 | 
				
			||||||
    - terenez.cachan-adm.crans.org
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
debian_mirror: http://172.17.10.202/debian
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
interfaces:
 | 
					 | 
				
			||||||
  cachan-adh: "ens22"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
loc_dhcp:
 | 
					 | 
				
			||||||
  authoritative: True
 | 
					 | 
				
			||||||
  global_options:
 | 
					 | 
				
			||||||
    - { key: "interface-mtu", value: "1500" }
 | 
					 | 
				
			||||||
  global_parameters: []
 | 
					 | 
				
			||||||
  subnets:
 | 
					 | 
				
			||||||
    - network: "185.230.76.0/26"
 | 
					 | 
				
			||||||
      deny_unknown: True
 | 
					 | 
				
			||||||
      vlan: "cachan-adh"
 | 
					 | 
				
			||||||
      default_lease_time: "600"
 | 
					 | 
				
			||||||
      max_lease_time: "7200"
 | 
					 | 
				
			||||||
      routers: "185.230.76.62"
 | 
					 | 
				
			||||||
      dns: ["185.230.76.62"]
 | 
					 | 
				
			||||||
      domain_name: "adh.crans.org"
 | 
					 | 
				
			||||||
      domain_search: "adh.crans.org"
 | 
					 | 
				
			||||||
      options: []
 | 
					 | 
				
			||||||
      lease_file: "/var/local/services/dhcp/generated/dhcp.cachan-adh.crans.org.list"
 | 
					 | 
				
			||||||
#    - network: 100.65.0.0/16
 | 
					 | 
				
			||||||
#      vlan: "federez"
 | 
					 | 
				
			||||||
#      default_lease_time: "600"
 | 
					 | 
				
			||||||
#      max_lease_time: "7200"
 | 
					 | 
				
			||||||
#      routers: "100.65.0.99"
 | 
					 | 
				
			||||||
#      dns: ["100.65.0.99"]
 | 
					 | 
				
			||||||
#      domain_name: "federez.net"
 | 
					 | 
				
			||||||
#      domain_search: "federez.net"
 | 
					 | 
				
			||||||
#      ranges:
 | 
					 | 
				
			||||||
#        - min: 100.65.1.0
 | 
					 | 
				
			||||||
#          max: 100.65.255.254
 | 
					 | 
				
			||||||
#      options: []
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
loc_service_dhcp:
 | 
					 | 
				
			||||||
  re2o:
 | 
					 | 
				
			||||||
    hostname: "{{ query('ldap', 'ip', 're2o', 'adm') | ipv4 | first }}"
 | 
					 | 
				
			||||||
    user: services
 | 
					 | 
				
			||||||
    password: "{{ vault.re2o_service_password }}"
 | 
					 | 
				
			||||||
  name: dhcp
 | 
					 | 
				
			||||||
  install_dir: /var/local/services/dhcp
 | 
					 | 
				
			||||||
  generated: yes
 | 
					 | 
				
			||||||
  frequency: "*/2 * * * *"
 | 
					 | 
				
			||||||
  options: -q
 | 
					 | 
				
			||||||
  dependencies:
 | 
					 | 
				
			||||||
    - python3-jinja2
 | 
					 | 
				
			||||||
  git:
 | 
					 | 
				
			||||||
    remote: https://gitlab.adm.crans.org/nounous/dhcp.git
 | 
					 | 
				
			||||||
    version: cachan
 | 
					 | 
				
			||||||
  config:
 | 
					 | 
				
			||||||
    subnets:
 | 
					 | 
				
			||||||
      cachan-adh.crans.org: 185.230.76.0/26
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
glob_radvd:
 | 
					 | 
				
			||||||
  subnets:
 | 
					 | 
				
			||||||
    - name: cachan-adh
 | 
					 | 
				
			||||||
      prefix: 2a0c:700:3012::/64
 | 
					 | 
				
			||||||
      dnssl: adh.crans.org
 | 
					 | 
				
			||||||
      dns:
 | 
					 | 
				
			||||||
        - "{{ query('ldap', 'ip', 'routeur-gulp', 'cachan-adh') | ipv6 | first }}"
 | 
					 | 
				
			||||||
#    - name: federez
 | 
					 | 
				
			||||||
#      prefix: 2a0c:700:254::/64
 | 
					 | 
				
			||||||
#      dnssl: federez.net
 | 
					 | 
				
			||||||
#      dns:
 | 
					 | 
				
			||||||
#        - 2a0c:700:254::ff:fe00:99fe
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
| 
						 | 
					@ -0,0 +1,23 @@
 | 
				
			||||||
 | 
					---
 | 
				
			||||||
 | 
					loc_re2o:
 | 
				
			||||||
 | 
					  owner: freerad
 | 
				
			||||||
 | 
					  group: _nounou
 | 
				
			||||||
 | 
					  version: master_freeradius_python3
 | 
				
			||||||
 | 
					  settings_local_owner: freerad
 | 
				
			||||||
 | 
					  settings_local_group: _nounou
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  django_secret_key: "{{ vault.re2o_django_secret_key }}"
 | 
				
			||||||
 | 
					  aes_key: "{{ vault.re2o_aes_key }}"
 | 
				
			||||||
 | 
					  admins:
 | 
				
			||||||
 | 
					    - ('Root', 'root@crans.org')
 | 
				
			||||||
 | 
					  allowed_hosts:
 | 
				
			||||||
 | 
					    - 're2o.cachan-adm.crans.org'
 | 
				
			||||||
 | 
					    - 'intranet.cachan-adm.crans.org'
 | 
				
			||||||
 | 
					  from_email: "root@crans.org"
 | 
				
			||||||
 | 
					  ldap:
 | 
				
			||||||
 | 
					    master_password: "{{ vault.ldap_master_password }}"
 | 
				
			||||||
 | 
					    uri: "ldap://re2o-ldap.cachan-adm.crans.org/"
 | 
				
			||||||
 | 
					    dn: "cn=admin,dc=crans,dc=org"
 | 
				
			||||||
 | 
					  database:
 | 
				
			||||||
 | 
					      password: "{{ vault.re2o_db_password }}"
 | 
				
			||||||
 | 
					      uri: "gulp.cachan-adm.crans.org"
 | 
				
			||||||
| 
						 | 
					@ -0,0 +1,6 @@
 | 
				
			||||||
 | 
					#!/usr/bin/env ansible-playbook
 | 
				
			||||||
 | 
					---
 | 
				
			||||||
 | 
					# Deploy recursive DNS cache server
 | 
				
			||||||
 | 
					- hosts: dns_recursive
 | 
				
			||||||
 | 
					  roles:
 | 
				
			||||||
 | 
					    - bind-recursive
 | 
				
			||||||
| 
						 | 
					@ -1,11 +1,18 @@
 | 
				
			||||||
#!/usr/bin/env ansible-playbook
 | 
					#!/usr/bin/env ansible-playbook
 | 
				
			||||||
---
 | 
					---
 | 
				
			||||||
 | 
					# Deploy re2o
 | 
				
			||||||
 | 
					#- hosts: re2o
 | 
				
			||||||
 | 
					#  vars:
 | 
				
			||||||
 | 
					#    re2o: "{{ glob_re2o | default({}) | combine(loc_re2o | default({})) }}"
 | 
				
			||||||
 | 
					#  roles:
 | 
				
			||||||
 | 
					#    - re2o
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Deploy radius server
 | 
					# Deploy radius server
 | 
				
			||||||
- hosts: radius
 | 
					- hosts: radius
 | 
				
			||||||
  vars:
 | 
					  vars:
 | 
				
			||||||
    certbot: '{{ loc_certbot | default(glob_certbot | default([])) }}'
 | 
					    certbot: '{{ loc_certbot | default(glob_certbot | default([])) }}'
 | 
				
			||||||
    freeradius: '{{ glob_freeradius | default({}) | combine(loc_freeradius | default({})) }}'
 | 
					    freeradius: '{{ glob_freeradius | default({}) | combine(loc_freeradius | default({})) }}'
 | 
				
			||||||
    mirror: '{{ glob_mirror.name }}'
 | 
					    mirror: '{{ glob_mirror | default({}) | combine(loc_mirror | default({})) }}'
 | 
				
			||||||
  roles:
 | 
					  roles:
 | 
				
			||||||
    - certbot
 | 
					#    - certbot
 | 
				
			||||||
    - freeradius
 | 
					    - freeradius
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -1,7 +1,7 @@
 | 
				
			||||||
---
 | 
					---
 | 
				
			||||||
- name: Add buster-backports to apt sources
 | 
					- name: Add buster-backports to apt sources
 | 
				
			||||||
  apt_repository:
 | 
					  apt_repository:
 | 
				
			||||||
    repo: deb http://{{ mirror }}/debian buster-backports main
 | 
					    repo: deb http://{{ mirror.name }}/debian buster-backports main
 | 
				
			||||||
    state: present
 | 
					    state: present
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- name: Pin freeradius from backports
 | 
					- name: Pin freeradius from backports
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -40,5 +40,20 @@ client bornes_v4 {
 | 
				
			||||||
	   ipaddr = {{ freeradius.infra_bornes }}
 | 
						   ipaddr = {{ freeradius.infra_bornes }}
 | 
				
			||||||
	   secret = {{ freeradius.secret_bornes }}
 | 
						   secret = {{ freeradius.secret_bornes }}
 | 
				
			||||||
	   virtual_server = radius-wifi
 | 
						   virtual_server = radius-wifi
 | 
				
			||||||
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					{% for delegation in freeradius.delegations %}
 | 
				
			||||||
 | 
					client {{ delegation.name }} {
 | 
				
			||||||
 | 
					        secret = {{ delegation.secret }}
 | 
				
			||||||
 | 
					        ipaddr = {{ delegation.ipv4 }}
 | 
				
			||||||
 | 
					        virtual_server = {{ delegation.server }}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					{% if delegation.ipv6 is defined %}
 | 
				
			||||||
 | 
					client {{ delegation.name }} {
 | 
				
			||||||
 | 
					        secret = {{ delegation.secret }}
 | 
				
			||||||
 | 
					        ipaddr = {{ delegation.ipv6 }}
 | 
				
			||||||
 | 
					        virtual_server = {{ delegation.server }}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					{% endif %}
 | 
				
			||||||
 | 
					{% endfor %}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -196,12 +196,12 @@ eap {
 | 
				
			||||||
		#  In that case, this CA file should contain
 | 
							#  In that case, this CA file should contain
 | 
				
			||||||
		#  *one* CA certificate.
 | 
							#  *one* CA certificate.
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		# ca_file = ${certdir}/ca.crt
 | 
							ca_file = /etc/ssl/certs/ca-certificates.crt
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	 	#  OpenSSL will automatically create certificate chains,
 | 
							#  OpenSSL will automatically create certificate chains,
 | 
				
			||||||
	 	#  unless we tell it to not do that.  The problem is that
 | 
							#  unless we tell it to not do that.  The problem is that
 | 
				
			||||||
	 	#  it sometimes gets the chains right from a certificate
 | 
							#  it sometimes gets the chains right from a certificate
 | 
				
			||||||
	 	#  signature view, but wrong from the clients view.
 | 
							#  signature view, but wrong from the clients view.
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		#  When setting "auto_chain = no", the server certificate
 | 
							#  When setting "auto_chain = no", the server certificate
 | 
				
			||||||
		#  file MUST include the full certificate chain.
 | 
							#  file MUST include the full certificate chain.
 | 
				
			||||||
| 
						 | 
					@ -235,7 +235,7 @@ eap {
 | 
				
			||||||
		#  For DH cipher suites to work, you have to
 | 
							#  For DH cipher suites to work, you have to
 | 
				
			||||||
		#  run OpenSSL to create the DH file first:
 | 
							#  run OpenSSL to create the DH file first:
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		#  	openssl dhparam -out certs/dh 2048
 | 
							#	openssl dhparam -out certs/dh 2048
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		dh_file = ${certdir}/dh
 | 
							dh_file = ${certdir}/dh
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -363,7 +363,7 @@ eap {
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		#  The values must be in quotes.
 | 
							#  The values must be in quotes.
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		tls_min_version = "1.2"
 | 
							tls_min_version = "1.0"
 | 
				
			||||||
		tls_max_version = "1.2"
 | 
							tls_max_version = "1.2"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -777,7 +777,7 @@ eap {
 | 
				
			||||||
		#  As of version 3.0.5, this configuration item
 | 
							#  As of version 3.0.5, this configuration item
 | 
				
			||||||
		#  is deprecated.  Instead, you should use
 | 
							#  is deprecated.  Instead, you should use
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		# 	update outer.session-state {
 | 
							#	update outer.session-state {
 | 
				
			||||||
		#		...
 | 
							#		...
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		#	}
 | 
							#	}
 | 
				
			||||||
| 
						 | 
					@ -864,13 +864,13 @@ eap {
 | 
				
			||||||
		#  but *may* also cause other clients to stop
 | 
							#  but *may* also cause other clients to stop
 | 
				
			||||||
		#  working.
 | 
							#  working.
 | 
				
			||||||
		#
 | 
							#
 | 
				
			||||||
		send_error = yes
 | 
							send_error = no
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		#  Server identifier to send back in the challenge.
 | 
							#  Server identifier to send back in the challenge.
 | 
				
			||||||
		#  This should generally be the host name of the
 | 
							#  This should generally be the host name of the
 | 
				
			||||||
		#  RADIUS server.  Or, some information to uniquely
 | 
							#  RADIUS server.  Or, some information to uniquely
 | 
				
			||||||
		#  identify it.
 | 
							#  identify it.
 | 
				
			||||||
#		identity = "FreeRADIUS"
 | 
							identity = "FreeRadius"
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	## EAP-FAST
 | 
						## EAP-FAST
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in New Issue