1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Alters the security settings
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2015-2016 Bob Mottram <bob@robotics.uk.to>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. PROJECT_NAME='freedombone'
  31. export TEXTDOMAIN=${PROJECT_NAME}-sec
  32. export TEXTDOMAINDIR="/usr/share/locale"
  33. CONFIGURATION_FILE=$HOME/${PROJECT_NAME}.cfg
  34. COMPLETION_FILE=$HOME/${PROJECT_NAME}-completed.txt
  35. UTILS_FILES=/usr/share/${PROJECT_NAME}/utils/${PROJECT_NAME}-utils-*
  36. for f in $UTILS_FILES
  37. do
  38. source $f
  39. done
  40. SSL_PROTOCOLS=
  41. SSL_CIPHERS=
  42. SSH_CIPHERS=
  43. SSH_MACS=
  44. SSH_KEX=
  45. SSH_HOST_KEY_ALGORITHMS=
  46. SSH_PASSWORDS=
  47. XMPP_CIPHERS=
  48. XMPP_ECC_CURVE=
  49. WEBSITES_DIRECTORY='/etc/nginx/sites-available'
  50. DOVECOT_CIPHERS='/etc/dovecot/conf.d/10-ssl.conf'
  51. SSH_CONFIG='/etc/ssh/sshd_config'
  52. XMPP_CONFIG='/etc/prosody/conf.avail/xmpp.cfg.lua'
  53. MINIMUM_LENGTH=6
  54. IMPORT_FILE=
  55. EXPORT_FILE=
  56. CURRENT_DIR=$(pwd)
  57. REGENERATE_SSH_HOST_KEYS="no"
  58. REGENERATE_DH_KEYS="no"
  59. DH_KEYLENGTH=2048
  60. LETSENCRYPT_SERVER='https://acme-v01.api.letsencrypt.org/directory'
  61. MY_USERNAME=
  62. function get_protocols_from_website {
  63. if [ ! -f $WEBSITES_DIRECTORY/$1 ]; then
  64. return
  65. fi
  66. SSL_PROTOCOLS=$(cat $WEBSITES_DIRECTORY/$1 | grep 'ssl_protocols ' | awk -F "ssl_protocols " '{print $2}' | awk -F ';' '{print $1}')
  67. }
  68. function get_ciphers_from_website {
  69. if [ ! -f $WEBSITES_DIRECTORY/$1 ]; then
  70. return
  71. fi
  72. SSL_CIPHERS=$(cat $WEBSITES_DIRECTORY/$1 | grep 'ssl_ciphers ' | awk -F "ssl_ciphers " '{print $2}' | awk -F "'" '{print $2}')
  73. }
  74. function get_website_settings {
  75. if [ ! -d $WEBSITES_DIRECTORY ]; then
  76. return
  77. fi
  78. cd $WEBSITES_DIRECTORY
  79. for file in `dir -d *` ; do
  80. get_protocols_from_website $file
  81. if [ ${#SSL_PROTOCOLS} -gt $MINIMUM_LENGTH ]; then
  82. get_ciphers_from_website $file
  83. if [ ${#SSL_CIPHERS} -gt $MINIMUM_LENGTH ]; then
  84. break
  85. else
  86. SSL_PROTOCOLS=""
  87. fi
  88. fi
  89. done
  90. }
  91. function get_imap_settings {
  92. if [ ! -f $DOVECOT_CIPHERS ]; then
  93. return
  94. fi
  95. # clear commented out cipher list
  96. sed -i "s|#ssl_cipher_list.*||g" $DOVECOT_CIPHERS
  97. if [ $SSL_CIPHERS ]; then
  98. return
  99. fi
  100. if [ ${#SSL_CIPHERS} -gt $MINIMUM_LENGTH ]; then
  101. return
  102. fi
  103. SSL_CIPHERS=$(cat $DOVECOT_CIPHERS | grep 'ssl_cipher_list' | awk -F '=' '{print $2}' | awk -F "'" '{print $2}')
  104. }
  105. function get_xmpp_settings {
  106. if [ ! -f $XMPP_CONFIG ]; then
  107. return
  108. fi
  109. XMPP_CIPHERS=$(cat $XMPP_CONFIG | grep 'ciphers ' | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  110. XMPP_ECC_CURVE=$(cat $XMPP_CONFIG | grep 'curve ' | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  111. }
  112. function get_ssh_settings {
  113. if [ -f $SSH_CONFIG ]; then
  114. SSH_CIPHERS=$(cat $SSH_CONFIG | grep 'Ciphers ' | awk -F 'Ciphers ' '{print $2}')
  115. SSH_MACS=$(cat $SSH_CONFIG | grep 'MACs ' | awk -F 'MACs ' '{print $2}')
  116. SSH_KEX=$(cat $SSH_CONFIG | grep 'KexAlgorithms ' | awk -F 'KexAlgorithms ' '{print $2}')
  117. SSH_PASSWORDS=$(cat $SSH_CONFIG | grep 'PasswordAuthentication ' | awk -F 'PasswordAuthentication ' '{print $2}')
  118. fi
  119. if [ -f /etc/ssh/ssh_config ]; then
  120. SSH_HOST_KEY_ALGORITHMS=$(cat /etc/ssh/ssh_config | grep 'HostKeyAlgorithms ' | awk -F 'HostKeyAlgorithms ' '{print $2}')
  121. if [ ! $SSH_CIPHERS ]; then
  122. SSH_CIPHERS=$(cat /etc/ssh/ssh_config | grep 'Ciphers ' | awk -F 'Ciphers ' '{print $2}')
  123. fi
  124. if [ ! $SSH_MACS ]; then
  125. SSH_MACS=$(cat /etc/ssh/ssh_config | grep 'MACs ' | awk -F 'MACs ' '{print $2}')
  126. fi
  127. fi
  128. }
  129. function change_website_settings {
  130. if [ ! "$SSL_PROTOCOLS" ]; then
  131. return
  132. fi
  133. if [ ! $SSL_CIPHERS ]; then
  134. return
  135. fi
  136. if [ ${#SSL_PROTOCOLS} -lt $MINIMUM_LENGTH ]; then
  137. return
  138. fi
  139. if [ ${#SSL_CIPHERS} -lt $MINIMUM_LENGTH ]; then
  140. return
  141. fi
  142. if [ ! -d $WEBSITES_DIRECTORY ]; then
  143. return
  144. fi
  145. cd $WEBSITES_DIRECTORY
  146. for file in `dir -d *` ; do
  147. sed -i "s|ssl_protocols .*|ssl_protocols $SSL_PROTOCOLS;|g" $WEBSITES_DIRECTORY/$file
  148. sed -i "s|ssl_ciphers .*|ssl_ciphers '$SSL_CIPHERS';|g" $WEBSITES_DIRECTORY/$file
  149. done
  150. systemctl restart nginx
  151. echo $'Web security settings changed'
  152. }
  153. function change_imap_settings {
  154. if [ ! -f $DOVECOT_CIPHERS ]; then
  155. return
  156. fi
  157. if [ ! $SSL_CIPHERS ]; then
  158. return
  159. fi
  160. if [ ${#SSL_CIPHERS} -lt $MINIMUM_LENGTH ]; then
  161. return
  162. fi
  163. sed -i "s|ssl_cipher_list.*|ssl_cipher_list = '$SSL_CIPHERS'|g" $DOVECOT_CIPHERS
  164. sed -i "s|ssl_protocols.*|ssl_protocols = '$SSL_PROTOCOLS'|g" $DOVECOT_CIPHERS
  165. systemctl restart dovecot
  166. echo $'imap security settings changed'
  167. }
  168. function change_ssh_settings {
  169. if [ -f /etc/ssh/ssh_config ]; then
  170. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  171. sed -i "s|HostKeyAlgorithms .*|HostKeyAlgorithms $SSH_HOST_KEY_ALGORITHMS|g" /etc/ssh/ssh_config
  172. echo $'ssh client security settings changed'
  173. fi
  174. fi
  175. if [ -f $SSH_CONFIG ]; then
  176. if [ ! $SSH_CIPHERS ]; then
  177. return
  178. fi
  179. if [ ! $SSH_MACS ]; then
  180. return
  181. fi
  182. if [ ! $SSH_KEX ]; then
  183. return
  184. fi
  185. if [ ! $SSH_PASSWORDS ]; then
  186. return
  187. fi
  188. sed -i "s|Ciphers .*|Ciphers $SSH_CIPHERS|g" $SSH_CONFIG
  189. sed -i "s|MACs .*|MACs $SSH_MACS|g" $SSH_CONFIG
  190. sed -i "s|KexAlgorithms .*|KexAlgorithms $SSH_KEX|g" $SSH_CONFIG
  191. sed -i "s|PasswordAuthentication .*|PasswordAuthentication $SSH_PASSWORDS|g" $SSH_CONFIG
  192. systemctl restart ssh
  193. echo $'ssh server security settings changed'
  194. fi
  195. }
  196. function change_xmpp_settings {
  197. if [ ! -f $XMPP_CONFIG ]; then
  198. return
  199. fi
  200. if [ ! $XMPP_CIPHERS ]; then
  201. return
  202. fi
  203. if [ ! $XMPP_ECC_CURVE ]; then
  204. return
  205. fi
  206. sed -i "s|ciphers =.*|ciphers = \"$XMPP_CIPHERS\";|g" $XMPP_CONFIG
  207. sed -i "s|curve =.*|curve = \"$XMPP_ECC_CURVE\";|g" $XMPP_CONFIG
  208. systemctl restart prosody
  209. echo $'xmpp security settings changed'
  210. }
  211. function interactive_setup {
  212. if [ $SSL_CIPHERS ]; then
  213. data=$(tempfile 2>/dev/null)
  214. trap "rm -f $data" 0 1 2 5 15
  215. dialog --backtitle $"Freedombone Security Configuration" \
  216. --form $"\nWeb/IMAP Ciphers:" 10 95 2 \
  217. $"Protocols:" 1 1 "$SSL_PROTOCOLS" 1 15 90 90 \
  218. $"Ciphers:" 2 1 "$SSL_CIPHERS" 2 15 90 512 \
  219. 2> $data
  220. sel=$?
  221. case $sel in
  222. 1) SSL_PROTOCOLS=$(cat $data | sed -n 1p)
  223. SSL_CIPHERS=$(cat $data | sed -n 2p)
  224. ;;
  225. 255) exit 0;;
  226. esac
  227. fi
  228. data=$(tempfile 2>/dev/null)
  229. trap "rm -f $data" 0 1 2 5 15
  230. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  231. dialog --backtitle $"Freedombone Security Configuration" \
  232. --form $"\nSecure Shell Ciphers:" 13 95 4 \
  233. $"Ciphers:" 1 1 "$SSH_CIPHERS" 1 15 90 512 \
  234. $"MACs:" 2 1 "$SSH_MACS" 2 15 90 512 \
  235. $"KEX:" 3 1 "$SSH_KEX" 3 15 90 512 \
  236. $"Host key algorithms:" 4 1 "$SSH_HOST_KEY_ALGORITHMS" 4 15 90 512 \
  237. 2> $data
  238. sel=$?
  239. case $sel in
  240. 1) SSH_CIPHERS=$(cat $data | sed -n 1p)
  241. SSH_MACS=$(cat $data | sed -n 2p)
  242. SSH_KEX=$(cat $data | sed -n 3p)
  243. SSH_HOST_KEY_ALGORITHMS=$(cat $data | sed -n 4p)
  244. ;;
  245. 255) exit 0;;
  246. esac
  247. else
  248. dialog --backtitle $"Freedombone Security Configuration" \
  249. --form $"\nSecure Shell Ciphers:" 11 95 3 \
  250. $"Ciphers:" 1 1 "$SSH_CIPHERS" 1 15 90 512 \
  251. $"MACs:" 2 1 "$SSH_MACS" 2 15 90 512 \
  252. $"KEX:" 3 1 "$SSH_KEX" 3 15 90 512 \
  253. 2> $data
  254. sel=$?
  255. case $sel in
  256. 1) SSH_CIPHERS=$(cat $data | sed -n 1p)
  257. SSH_MACS=$(cat $data | sed -n 2p)
  258. SSH_KEX=$(cat $data | sed -n 3p)
  259. ;;
  260. 255) exit 0;;
  261. esac
  262. fi
  263. if [[ $SSH_PASSWORDS == "yes" ]]; then
  264. dialog --title $"SSH Passwords" \
  265. --backtitle $"Freedombone Security Configuration" \
  266. --yesno $"\nAllow SSH login using passwords?" 7 60
  267. else
  268. dialog --title $"SSH Passwords" \
  269. --backtitle $"Freedombone Security Configuration" \
  270. --defaultno \
  271. --yesno $"\nAllow SSH login using passwords?" 7 60
  272. fi
  273. sel=$?
  274. case $sel in
  275. 0) SSH_PASSWORDS="yes";;
  276. 1) SSH_PASSWORDS="no";;
  277. 255) exit 0;;
  278. esac
  279. if [ $XMPP_CIPHERS ]; then
  280. data=$(tempfile 2>/dev/null)
  281. trap "rm -f $data" 0 1 2 5 15
  282. dialog --backtitle $"Freedombone Security Configuration" \
  283. --form $"\nXMPP Ciphers:" 10 95 2 \
  284. $"Ciphers:" 1 1 "$XMPP_CIPHERS" 1 15 90 512 \
  285. $"ECC Curve:" 2 1 "$XMPP_ECC_CURVE" 2 15 50 50 \
  286. 2> $data
  287. sel=$?
  288. case $sel in
  289. 1) XMPP_CIPHERS=$(cat $data | sed -n 1p)
  290. XMPP_ECC_CURVE=$(cat $data | sed -n 2p)
  291. ;;
  292. 255) exit 0;;
  293. esac
  294. fi
  295. dialog --title $"Final Confirmation" \
  296. --backtitle $"Freedombone Security Configuration" \
  297. --defaultno \
  298. --yesno $"\nPlease confirm that you wish your security settings to be changed?\n\nWARNING: any mistakes made in the security settings could compromise your system, so be extra careful when answering 'yes'." 12 60
  299. sel=$?
  300. case $sel in
  301. 1) clear
  302. echo $'Exiting without changing security settings'
  303. exit 0;;
  304. 255) clear
  305. echo $'Exiting without changing security settings'
  306. exit 0;;
  307. esac
  308. clear
  309. }
  310. function send_monkeysphere_server_keys_to_users {
  311. monkeysphere_server_keys=$(monkeysphere-host show-key | grep $"OpenPGP fingerprint" | awk -F ' ' '{print $3}')
  312. for d in /home/*/ ; do
  313. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  314. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  315. if [ ! -d /home/$USERNAME/.monkeysphere ]; then
  316. mkdir /home/$USERNAME/.monkeysphere
  317. fi
  318. echo $monkeysphere_server_keys > /home/$USERNAME/.monkeysphere/server_keys
  319. chown -R $USERNAME:$USERNAME /home/$USERNAME/.monkeysphere
  320. fi
  321. done
  322. }
  323. function regenerate_ssh_host_keys {
  324. if [[ $REGENERATE_SSH_HOST_KEYS == "yes" ]]; then
  325. rm -f /etc/ssh/ssh_host_*
  326. dpkg-reconfigure openssh-server
  327. echo $'ssh host keys regenerated'
  328. # remove small moduli
  329. awk '$5 > 2000' /etc/ssh/moduli > ~/moduli
  330. mv ~/moduli /etc/ssh/moduli
  331. echo $'ssh small moduli removed'
  332. # update monkeysphere
  333. DEFAULT_DOMAIN_NAME=
  334. read_config_param "DEFAULT_DOMAIN_NAME"
  335. monkeysphere-host import-key /etc/ssh/ssh_host_rsa_key ssh://$DEFAULT_DOMAIN_NAME
  336. SSH_ONION_HOSTNAME=$(cat ${COMPLETION_FILE} | grep 'ssh onion domain' | awk -F ':' '{print $2}')
  337. monkeysphere-host import-key /etc/ssh/ssh_host_rsa_key ssh://$SSH_ONION_HOSTNAME
  338. monkeysphere-host publish-key
  339. send_monkeysphere_server_keys_to_users
  340. echo $'updated monkeysphere ssh host key'
  341. systemctl restart ssh
  342. fi
  343. }
  344. function regenerate_dh_keys {
  345. if [[ $REGENERATE_DH_KEYS == "yes" ]]; then
  346. if [ ! -d /etc/ssl/mycerts ]; then
  347. echo $'No dhparam certificates were found'
  348. return
  349. fi
  350. data=$(tempfile 2>/dev/null)
  351. trap "rm -f $data" 0 1 2 5 15
  352. dialog --backtitle "Freedombone Security Configuration" \
  353. --title "Diffie-Hellman key length" \
  354. --radiolist "The smaller length is better suited to low power embedded systems:" 12 40 3 \
  355. 1 "2048 bits" off \
  356. 2 "3072 bits" on \
  357. 3 "4096 bits" off 2> $data
  358. sel=$?
  359. case $sel in
  360. 1) exit 1;;
  361. 255) exit 1;;
  362. esac
  363. case $(cat $data) in
  364. 1) DH_KEYLENGTH=2048;;
  365. 2) DH_KEYLENGTH=3072;;
  366. 3) DH_KEYLENGTH=4096;;
  367. esac
  368. ${PROJECT_NAME}-dhparam --recalc yes -l ${DH_KEYLENGTH}
  369. fi
  370. }
  371. function renew_startssl {
  372. renew_domain=
  373. data=$(tempfile 2>/dev/null)
  374. trap "rm -f $data" 0 1 2 5 15
  375. dialog --title $"Renew a StartSSL certificate" \
  376. --backtitle $"Freedombone Security Settings" \
  377. --inputbox $"Enter the domain name" 8 60 2>$data
  378. sel=$?
  379. case $sel in
  380. 0)
  381. renew_domain=$(<$data)
  382. ;;
  383. esac
  384. if [ ! $renew_domain ]; then
  385. return
  386. fi
  387. if [[ $renew_domain == "http"* ]]; then
  388. dialog --title $"Renew a StartSSL certificate" \
  389. --msgbox $"Don't include the https://" 6 40
  390. return
  391. fi
  392. if [ ! -f /etc/ssl/certs/${renew_domain}.dhparam ]; then
  393. dialog --title $"Renew a StartSSL certificate" \
  394. --msgbox $"An existing certificate for $renew_domain was not found" 6 40
  395. return
  396. fi
  397. if [[ $renew_domain != *"."* ]]; then
  398. dialog --title $"Renew a StartSSL certificate" \
  399. --msgbox $"Invalid domain name: $renew_domain" 6 40
  400. return
  401. fi
  402. ${PROJECT_NAME}-renew-cert -h $renew_domain -p startssl
  403. exit 0
  404. }
  405. function renew_letsencrypt {
  406. renew_domain=
  407. data=$(tempfile 2>/dev/null)
  408. trap "rm -f $data" 0 1 2 5 15
  409. dialog --title $"Renew a Let's Encrypt certificate" \
  410. --backtitle $"Freedombone Security Settings" \
  411. --inputbox $"Enter the domain name" 8 60 2>$data
  412. sel=$?
  413. case $sel in
  414. 0)
  415. renew_domain=$(<$data)
  416. ;;
  417. esac
  418. if [ ! $renew_domain ]; then
  419. return
  420. fi
  421. if [[ $renew_domain == "http"* ]]; then
  422. dialog --title $"Renew a Let's Encrypt certificate" \
  423. --msgbox $"Don't include the https://" 6 40
  424. return
  425. fi
  426. if [ ! -f /etc/ssl/certs/${renew_domain}.dhparam ]; then
  427. dialog --title $"Renew a Let's Encrypt certificate" \
  428. --msgbox $"An existing certificate for $renew_domain was not found" 6 40
  429. return
  430. fi
  431. if [[ $renew_domain != *"."* ]]; then
  432. dialog --title $"Renew a Let's Encrypt certificate" \
  433. --msgbox $"Invalid domain name: $renew_domain" 6 40
  434. return
  435. fi
  436. ${PROJECT_NAME}-renew-cert -h $renew_domain -p 'letsencrypt'
  437. exit 0
  438. }
  439. function create_letsencrypt {
  440. new_domain=
  441. data=$(tempfile 2>/dev/null)
  442. trap "rm -f $data" 0 1 2 5 15
  443. dialog --title $"Create a new Let's Encrypt certificate" \
  444. --backtitle $"Freedombone Security Settings" \
  445. --inputbox $"Enter the domain name" 8 60 2>$data
  446. sel=$?
  447. case $sel in
  448. 0)
  449. new_domain=$(<$data)
  450. ;;
  451. esac
  452. if [ ! $new_domain ]; then
  453. return
  454. fi
  455. if [[ $new_domain == "http"* ]]; then
  456. dialog --title $"Create a new Let's Encrypt certificate" \
  457. --msgbox $"Don't include the https://" 6 40
  458. return
  459. fi
  460. if [[ $new_domain != *"."* ]]; then
  461. dialog --title $"Create a new Let's Encrypt certificate" \
  462. --msgbox $"Invalid domain name: $new_domain" 6 40
  463. return
  464. fi
  465. if [ ! -d /var/www/${new_domain} ]; then
  466. dialog --title $"Create a new Let's Encrypt certificate" \
  467. --msgbox $'Domain not found within /var/www' 6 40
  468. return
  469. fi
  470. ${PROJECT_NAME}-addcert -e $new_domain -s $LETSENCRYPT_SERVER --dhkey $DH_KEYLENGTH
  471. exit 0
  472. }
  473. function update_ciphersuite {
  474. project_filename=/usr/local/bin/${PROJECT_NAME}
  475. if [ ! -f $project_filename ]; then
  476. project_filename=/usr/bin/${PROJECT_NAME}
  477. fi
  478. SSH_FILENAME=${project_filename}-utils-ssh
  479. SSL_FILENAME=${project_filename}-utils-web
  480. RECOMMENDED_SSL_CIPHERS=$(cat $SSL_FILENAME | grep 'SSL_CIPHERS=' | head -n 1 | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  481. if [ ! "$RECOMMENDED_SSL_CIPHERS" ]; then
  482. return
  483. fi
  484. if [ ${#RECOMMENDED_SSL_CIPHERS} -lt 5 ]; then
  485. return
  486. fi
  487. RECOMMENDED_SSL_PROTOCOLS=$(cat $SSL_FILENAME | grep 'SSL_PROTOCOLS=' | head -n 1 | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  488. if [ ! "$RECOMMENDED_SSL_PROTOCOLS" ]; then
  489. return
  490. fi
  491. if [ ${#RECOMMENDED_SSL_PROTOCOLS} -lt 5 ]; then
  492. return
  493. fi
  494. RECOMMENDED_SSH_CIPHERS=$(cat $SSH_FILENAME | grep 'SSH_CIPHERS=' | head -n 1 | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  495. if [ ! "$RECOMMENDED_SSH_CIPHERS" ]; then
  496. return
  497. fi
  498. if [ ${#RECOMMENDED_SSH_CIPHERS} -lt 5 ]; then
  499. return
  500. fi
  501. RECOMMENDED_SSH_MACS=$(cat $SSH_FILENAME | grep 'SSH_MACS=' | head -n 1 | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  502. if [ ! "$RECOMMENDED_SSH_MACS" ]; then
  503. return
  504. fi
  505. if [ ${#RECOMMENDED_SSH_MACS} -lt 5 ]; then
  506. return
  507. fi
  508. RECOMMENDED_SSH_KEX=$(cat $SSH_FILENAME | grep 'SSH_KEX=' | head -n 1 | awk -F '=' '{print $2}' | awk -F '"' '{print $2}')
  509. if [ ! "$RECOMMENDED_SSH_KEX" ]; then
  510. return
  511. fi
  512. if [ ${#RECOMMENDED_SSH_KEX} -lt 5 ]; then
  513. return
  514. fi
  515. cd $WEBSITES_DIRECTORY
  516. for file in `dir -d *` ; do
  517. sed -i "s|ssl_protocols .*|ssl_protocols $RECOMMENDED_SSL_PROTOCOLS;|g" $WEBSITES_DIRECTORY/$file
  518. sed -i "s|ssl_ciphers .*|ssl_ciphers '$RECOMMENDED_SSL_CIPHERS';|g" $WEBSITES_DIRECTORY/$file
  519. done
  520. systemctl restart nginx
  521. sed -i "s|Ciphers .*|Ciphers $RECOMMENDED_SSH_CIPHERS|g" $SSH_CONFIG
  522. sed -i "s|MACs .*|MACs $RECOMMENDED_SSH_MACS|g" $SSH_CONFIG
  523. sed -i "s|KexAlgorithms .*|KexAlgorithms $RECOMMENDED_SSH_KEX|g" $SSH_CONFIG
  524. systemctl restart ssh
  525. dialog --title $"Update ciphersuite" \
  526. --msgbox $"The ciphersuite has been updated to recommended versions" 6 40
  527. exit 0
  528. }
  529. function gpg_pubkey_from_email {
  530. key_owner_username=$1
  531. key_email_address=$2
  532. key_id=
  533. if [[ $key_owner_username != "root" ]]; then
  534. key_id=$(su -c "gpg --list-keys $key_email_address | grep 'pub '" - $key_owner_username | awk -F ' ' '{print $2}' | awk -F '/' '{print $2}')
  535. else
  536. key_id=$(gpg --list-keys $key_email_address | grep 'pub ' | awk -F ' ' '{print $2}' | awk -F '/' '{print $2}')
  537. fi
  538. echo $key_id
  539. }
  540. function enable_monkeysphere {
  541. monkey=
  542. dialog --title $"GPG based authentication" \
  543. --backtitle $"Freedombone Security Configuration" \
  544. --defaultno \
  545. --yesno $"\nEnable GPG based authentication with monkeysphere ?" 7 60
  546. sel=$?
  547. case $sel in
  548. 0) monkey='yes';;
  549. 255) exit 0;;
  550. esac
  551. if [ $monkey ]; then
  552. read_config_param "MY_USERNAME"
  553. if [ ! -f /home/$MY_USERNAME/.monkeysphere/authorized_user_ids ]; then
  554. dialog --title $"GPG based authentication" \
  555. --msgbox $"$MY_USERNAME does not currently have any ids within ~/.monkeysphere/authorized_user_ids" 6 40
  556. exit 0
  557. fi
  558. MY_GPG_PUBLIC_KEY_ID=$(gpg_pubkey_from_email "$MY_USERNAME" "$MY_USERNAME@$HOSTNAME")
  559. if [ ${#MY_GPG_PUBLIC_KEY_ID} -lt 4 ]; then
  560. echo $'monkeysphere unable to get GPG key ID for user $MY_USERNAME'
  561. exit 52825
  562. fi
  563. sed -i 's|#AuthorizedKeysFile|AuthorizedKeysFile|g' /etc/ssh/sshd_config
  564. sed -i 's|AuthorizedKeysFile.*|AuthorizedKeysFile /var/lib/monkeysphere/authorized_keys/%u|g' /etc/ssh/sshd_config
  565. monkeysphere-authentication update-users
  566. # The admin user is the identity certifier
  567. fpr=$(gpg --with-colons --fingerprint $MY_GPG_PUBLIC_KEY_ID | grep fpr | head -n 1 | awk -F ':' '{print $10}')
  568. monkeysphere-authentication add-identity-certifier $fpr
  569. monkeysphere-host publish-key
  570. send_monkeysphere_server_keys_to_users
  571. else
  572. sed -i 's|#AuthorizedKeysFile|AuthorizedKeysFile|g' /etc/ssh/sshd_config
  573. sed -i 's|AuthorizedKeysFile.*|AuthorizedKeysFile %h/.ssh/authorized_keys|g' /etc/ssh/sshd_config
  574. fi
  575. systemctl restart ssh
  576. if [ $monkey ]; then
  577. dialog --title $"GPG based authentication" \
  578. --msgbox $"GPG based authentication was enabled" 6 40
  579. else
  580. dialog --title $"GPG based authentication" \
  581. --msgbox $"GPG based authentication was disabled" 6 40
  582. fi
  583. exit 0
  584. }
  585. function register_website {
  586. domain="$1"
  587. if [[ ${domain} == *".local" ]]; then
  588. echo $"Can't register local domains"
  589. return
  590. fi
  591. if [ ! -f /etc/ssl/private/${domain}.key ]; then
  592. echo $"No SSL/TLS private key found for ${domain}"
  593. return
  594. fi
  595. if [ ! -f /etc/nginx/sites-available/${domain} ]; then
  596. echo $"No virtual host found for ${domain}"
  597. return
  598. fi
  599. monkeysphere-host import-key /etc/ssl/private/${domain}.key https://${domain}
  600. monkeysphere-host publish-key
  601. echo "0"
  602. }
  603. function register_website_interactive {
  604. data=$(tempfile 2>/dev/null)
  605. trap "rm -f $data" 0 1 2 5 15
  606. dialog --title $"Register a website with monkeysphere" \
  607. --backtitle $"Freedombone Security Settings" \
  608. --inputbox $"Enter the website domain name (without https://)" 8 60 2>$data
  609. sel=$?
  610. case $sel in
  611. 0)
  612. domain=$(<$data)
  613. register_website "$domain"
  614. if [ ! "$?" = "0" ]; then
  615. dialog --title $"Register a website with monkeysphere" \
  616. --msgbox "$?" 6 40
  617. else
  618. dialog --title $"Register a website with monkeysphere" \
  619. --msgbox $"$domain has been registered" 6 40
  620. fi
  621. ;;
  622. esac
  623. }
  624. function pin_all_tls_certs {
  625. ${PROJECT_NAME}-pin-cert all
  626. }
  627. function remove_pinning {
  628. data=$(tempfile 2>/dev/null)
  629. trap "rm -f $data" 0 1 2 5 15
  630. dialog --title $"Remove pinning for a domain" \
  631. --backtitle $"Freedombone Security Settings" \
  632. --inputbox $"Enter the website domain name (without https://)" 8 60 2>$data
  633. sel=$?
  634. case $sel in
  635. 0)
  636. domain=$(<$data)
  637. ${PROJECT_NAME}-pin-cert "$domain" remove
  638. if [ ! "$?" = "0" ]; then
  639. dialog --title $"Removed pinning from $domain" \
  640. --msgbox "$?" 6 40
  641. fi
  642. ;;
  643. esac
  644. }
  645. function housekeeping {
  646. cmd=(dialog --separate-output \
  647. --backtitle "Freedombone Security Configuration" \
  648. --title "Housekeeping options" \
  649. --checklist "If you don't need to do any of these things then just press Enter:" 17 76 17)
  650. options=(1 "Regenerate ssh host keys" off
  651. 2 "Regenerate Diffie-Hellman keys" off
  652. 3 "Update cipersuite" off
  653. 4 "Create a new Let's Encrypt certificate" off
  654. 5 "Renew Let's Encrypt certificate" off
  655. 6 "Enable GPG based authentication (monkeysphere)" off
  656. 7 "Register a website with monkeysphere" off
  657. 8 "Pin all TLS certificates" off
  658. 9 "Remove pinning for a domain" off
  659. 10 "Go Back/Exit" on)
  660. choices=$("${cmd[@]}" "${options[@]}" 2>&1 >/dev/tty)
  661. clear
  662. for choice in $choices
  663. do
  664. case $choice in
  665. 1)
  666. REGENERATE_SSH_HOST_KEYS="yes"
  667. ;;
  668. 2)
  669. REGENERATE_DH_KEYS="yes"
  670. ;;
  671. 3)
  672. update_ciphersuite
  673. ;;
  674. 4)
  675. create_letsencrypt
  676. ;;
  677. 5)
  678. renew_letsencrypt
  679. ;;
  680. 6)
  681. enable_monkeysphere
  682. ;;
  683. 7)
  684. register_website
  685. ;;
  686. 8)
  687. pin_all_tls_certs
  688. ;;
  689. 9)
  690. remove_pinning
  691. ;;
  692. 10)
  693. exit 0
  694. ;;
  695. esac
  696. done
  697. }
  698. function import_settings {
  699. cd $CURRENT_DIR
  700. if [ ! $IMPORT_FILE ]; then
  701. return
  702. fi
  703. if [ ! -f $IMPORT_FILE ]; then
  704. echo $"Import file $IMPORT_FILE not found"
  705. exit 6393
  706. fi
  707. if grep -q "SSL_PROTOCOLS" $IMPORT_FILE; then
  708. TEMP_VALUE=$(grep "SSL_PROTOCOLS" $IMPORT_FILE | awk -F '=' '{print $2}')
  709. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  710. SSL_PROTOCOLS=$TEMP_VALUE
  711. fi
  712. fi
  713. if grep -q "SSL_CIPHERS" $IMPORT_FILE; then
  714. TEMP_VALUE=$(grep "SSL_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  715. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  716. SSL_CIPHERS=$TEMP_VALUE
  717. fi
  718. fi
  719. if grep -q "SSH_CIPHERS" $IMPORT_FILE; then
  720. TEMP_VALUE=$(grep "SSH_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  721. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  722. SSH_CIPHERS=$TEMP_VALUE
  723. fi
  724. fi
  725. if grep -q "SSH_MACS" $IMPORT_FILE; then
  726. TEMP_VALUE=$(grep "SSH_MACS" $IMPORT_FILE | awk -F '=' '{print $2}')
  727. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  728. SSH_MACS=$TEMP_VALUE
  729. fi
  730. fi
  731. if grep -q "SSH_KEX" $IMPORT_FILE; then
  732. TEMP_VALUE=$(grep "SSH_KEX" $IMPORT_FILE | awk -F '=' '{print $2}')
  733. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  734. SSH_KEX=$TEMP_VALUE
  735. fi
  736. fi
  737. if grep -q "SSH_HOST_KEY_ALGORITHMS" $IMPORT_FILE; then
  738. TEMP_VALUE=$(grep "SSH_HOST_KEY_ALGORITHMS" $IMPORT_FILE | awk -F '=' '{print $2}')
  739. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  740. SSH_HOST_KEY_ALGORITHMS=$TEMP_VALUE
  741. fi
  742. fi
  743. if grep -q "SSH_PASSWORDS" $IMPORT_FILE; then
  744. TEMP_VALUE=$(grep "SSH_PASSWORDS" $IMPORT_FILE | awk -F '=' '{print $2}')
  745. if [[ $TEMP_VALUE == "yes" || $TEMP_VALUE == "no" ]]; then
  746. SSH_PASSWORDS=$TEMP_VALUE
  747. fi
  748. fi
  749. if grep -q "XMPP_CIPHERS" $IMPORT_FILE; then
  750. TEMP_VALUE=$(grep "XMPP_CIPHERS" $IMPORT_FILE | awk -F '=' '{print $2}')
  751. if [ ${#TEMP_VALUE} -gt $MINIMUM_LENGTH ]; then
  752. XMPP_CIPHERS=$TEMP_VALUE
  753. fi
  754. fi
  755. if grep -q "XMPP_ECC_CURVE" $IMPORT_FILE; then
  756. TEMP_VALUE=$(grep "XMPP_ECC_CURVE" $IMPORT_FILE | awk -F '=' '{print $2}')
  757. if [ ${#TEMP_VALUE} -gt 3 ]; then
  758. XMPP_ECC_CURVE=$TEMP_VALUE
  759. fi
  760. fi
  761. }
  762. function export_settings {
  763. if [ ! $EXPORT_FILE ]; then
  764. return
  765. fi
  766. cd $CURRENT_DIR
  767. if [ ! -f $EXPORT_FILE ]; then
  768. if [ "$SSL_PROTOCOLS" ]; then
  769. echo "SSL_PROTOCOLS=$SSL_PROTOCOLS" >> $EXPORT_FILE
  770. fi
  771. if [ $SSL_CIPHERS ]; then
  772. echo "SSL_CIPHERS=$SSL_CIPHERS" >> $EXPORT_FILE
  773. fi
  774. if [ $SSH_CIPHERS ]; then
  775. echo "SSH_CIPHERS=$SSH_CIPHERS" >> $EXPORT_FILE
  776. fi
  777. if [ $SSH_MACS ]; then
  778. echo "SSH_MACS=$SSH_MACS" >> $EXPORT_FILE
  779. fi
  780. if [ $SSH_KEX ]; then
  781. echo "SSH_KEX=$SSH_KEX" >> $EXPORT_FILE
  782. fi
  783. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  784. echo "SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS" >> $EXPORT_FILE
  785. fi
  786. if [ $SSH_PASSWORDS ]; then
  787. echo "SSH_PASSWORDS=$SSH_PASSWORDS" >> $EXPORT_FILE
  788. fi
  789. if [ $XMPP_CIPHERS ]; then
  790. echo "XMPP_CIPHERS=$XMPP_CIPHERS" >> $EXPORT_FILE
  791. fi
  792. if [ $XMPP_ECC_CURVE ]; then
  793. echo "XMPP_ECC_CURVE=$XMPP_ECC_CURVE" >> $EXPORT_FILE
  794. fi
  795. echo "Security settings exported to $EXPORT_FILE"
  796. exit 0
  797. fi
  798. if [ "$SSL_PROTOCOLS" ]; then
  799. if grep -q "SSL_PROTOCOLS" $EXPORT_FILE; then
  800. sed -i "s|SSL_PROTOCOLS=.*|SSL_PROTOCOLS=$SSL_PROTOCOLS|g" $EXPORT_FILE
  801. else
  802. echo "SSL_PROTOCOLS=$SSL_PROTOCOLS" >> $EXPORT_FILE
  803. fi
  804. fi
  805. if [ $SSL_CIPHERS ]; then
  806. if grep -q "SSL_CIPHERS" $EXPORT_FILE; then
  807. sed -i "s|SSL_CIPHERS=.*|SSL_CIPHERS=$SSL_CIPHERS|g" $EXPORT_FILE
  808. else
  809. echo "SSL_CIPHERS=$SSL_CIPHERS" >> $EXPORT_FILE
  810. fi
  811. fi
  812. if [ $SSH_CIPHERS ]; then
  813. if grep -q "SSH_CIPHERS" $EXPORT_FILE; then
  814. sed -i "s|SSH_CIPHERS=.*|SSH_CIPHERS=$SSH_CIPHERS|g" $EXPORT_FILE
  815. else
  816. echo "SSH_CIPHERS=$SSH_CIPHERS" >> $EXPORT_FILE
  817. fi
  818. fi
  819. if [ $SSH_MACS ]; then
  820. if grep -q "SSH_MACS" $EXPORT_FILE; then
  821. sed -i "s|SSH_MACS=.*|SSH_MACS=$SSH_MACS|g" $EXPORT_FILE
  822. else
  823. echo "SSH_MACS=$SSH_MACS" >> $EXPORT_FILE
  824. fi
  825. fi
  826. if [ $SSH_KEX ]; then
  827. if grep -q "SSH_KEX" $EXPORT_FILE; then
  828. sed -i "s|SSH_KEX=.*|SSH_KEX=$SSH_KEX|g" $EXPORT_FILE
  829. else
  830. echo "SSH_KEX=$SSH_KEX" >> $EXPORT_FILE
  831. fi
  832. fi
  833. if [ $SSH_HOST_KEY_ALGORITHMS ]; then
  834. if grep -q "SSH_HOST_KEY_ALGORITHMS" $EXPORT_FILE; then
  835. sed -i "s|SSH_HOST_KEY_ALGORITHMS=.*|SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS|g" $EXPORT_FILE
  836. else
  837. echo "SSH_HOST_KEY_ALGORITHMS=$SSH_HOST_KEY_ALGORITHMS" >> $EXPORT_FILE
  838. fi
  839. fi
  840. if [ $SSH_PASSWORDS ]; then
  841. if grep -q "SSH_PASSWORDS" $EXPORT_FILE; then
  842. sed -i "s|SSH_PASSWORDS=.*|SSH_PASSWORDS=$SSH_PASSWORDS|g" $EXPORT_FILE
  843. else
  844. echo "SSH_PASSWORDS=$SSH_PASSWORDS" >> $EXPORT_FILE
  845. fi
  846. fi
  847. if [ $XMPP_CIPHERS ]; then
  848. if grep -q "XMPP_CIPHERS" $EXPORT_FILE; then
  849. sed -i "s|XMPP_CIPHERS=.*|XMPP_CIPHERS=$XMPP_CIPHERS|g" $EXPORT_FILE
  850. else
  851. echo "XMPP_CIPHERS=$XMPP_CIPHERS" >> $EXPORT_FILE
  852. fi
  853. fi
  854. if [ $XMPP_ECC_CURVE ]; then
  855. if grep -q "XMPP_ECC_CURVE" $EXPORT_FILE; then
  856. sed -i "s|XMPP_ECC_CURVE=.*|XMPP_ECC_CURVE=$XMPP_ECC_CURVE|g" $EXPORT_FILE
  857. else
  858. echo "XMPP_ECC_CURVE=$XMPP_ECC_CURVE" >> $EXPORT_FILE
  859. fi
  860. fi
  861. echo $"Security settings exported to $EXPORT_FILE"
  862. exit 0
  863. }
  864. function refresh_gpg_keys {
  865. for d in /home/*/ ; do
  866. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  867. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  868. su -c 'gpg --refresh-keys' - $USERNAME
  869. fi
  870. done
  871. exit 0
  872. }
  873. function monkeysphere_sign_server_keys {
  874. server_keys_file=/home/$USER/.monkeysphere/server_keys
  875. if [ ! -f $server_keys_file ]; then
  876. exit 0
  877. fi
  878. keys_signed=
  879. while read line; do
  880. echo $line
  881. if [ ${#line} -gt 2 ]; then
  882. fpr=$(gpg --with-colons --fingerprint "$line" | grep fpr | head -n 1 | awk -F ':' '{print $10}')
  883. if [ ${#fpr} -gt 2 ]; then
  884. gpg --sign-key $fpr
  885. if [ "$?" = "0" ]; then
  886. gpg --update-trustdb
  887. keys_signed=1
  888. fi
  889. fi
  890. fi
  891. done <$server_keys_file
  892. if [ $keys_signed ]; then
  893. rm $server_keys_file
  894. fi
  895. exit 0
  896. }
  897. function blog_hash {
  898. # produces a hash corresponding to a blog password
  899. pass="$1"
  900. BLOGHASH_FILENAME=/usr/bin/bloghash
  901. echo '<?php' > $BLOGHASH_FILENAME
  902. echo 'parse_str(implode("&", array_slice($argv, 1)), $_GET);' >> $BLOGHASH_FILENAME
  903. echo '$password = $_GET["password"];' >> $BLOGHASH_FILENAME
  904. echo '$hash = password_hash($password, PASSWORD_BCRYPT);' >> $BLOGHASH_FILENAME
  905. echo 'if (password_verify($password, $hash)) {' >> $BLOGHASH_FILENAME
  906. echo ' echo $hash;' >> $BLOGHASH_FILENAME
  907. echo '}' >> $BLOGHASH_FILENAME
  908. echo '?>' >> $BLOGHASH_FILENAME
  909. php $BLOGHASH_FILENAME password="$pass"
  910. }
  911. function show_help {
  912. echo ''
  913. echo "${PROJECT_NAME}-sec"
  914. echo ''
  915. echo $'Alters the security settings'
  916. echo ''
  917. echo ''
  918. echo $' -h --help Show help'
  919. echo $' -e --export Export security settings to a file'
  920. echo $' -i --import Import security settings from a file'
  921. echo $' -r --refresh Refresh GPG keys for all users'
  922. echo $' -s --sign Sign monkeysphere server keys'
  923. echo $' --register [domain] Register a https domain with monkeysphere'
  924. echo $' -b --bloghash [password] Returns the hash of a password for the blog'
  925. echo ''
  926. exit 0
  927. }
  928. # Get the commandline options
  929. while [[ $# > 1 ]]
  930. do
  931. key="$1"
  932. case $key in
  933. -h|--help)
  934. show_help
  935. ;;
  936. # Export settings
  937. -e|--export)
  938. shift
  939. EXPORT_FILE="$1"
  940. ;;
  941. # Export settings
  942. -i|--import)
  943. shift
  944. IMPORT_FILE="$1"
  945. ;;
  946. # Refresh GPG keys
  947. -r|--refresh)
  948. shift
  949. refresh_gpg_keys
  950. ;;
  951. # register a website
  952. --register|--reg|--site)
  953. shift
  954. register_website "$1"
  955. ;;
  956. # user signs monkeysphere server keys
  957. -s|--sign)
  958. shift
  959. monkeysphere_sign_server_keys
  960. ;;
  961. # get a hash of the given blog password
  962. -b|--bloghash)
  963. shift
  964. blog_hash "$1"
  965. exit 0
  966. ;;
  967. *)
  968. # unknown option
  969. ;;
  970. esac
  971. shift
  972. done
  973. housekeeping
  974. get_website_settings
  975. get_imap_settings
  976. get_ssh_settings
  977. get_xmpp_settings
  978. import_settings
  979. export_settings
  980. interactive_setup
  981. change_website_settings
  982. change_imap_settings
  983. change_ssh_settings
  984. change_xmpp_settings
  985. regenerate_ssh_host_keys
  986. regenerate_dh_keys
  987. exit 0