freedombone-splitkey 5.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201
  1. #!/bin/bash
  2. # _____ _ _
  3. # | __|___ ___ ___ _| |___ _____| |_ ___ ___ ___
  4. # | __| _| -_| -_| . | . | | . | . | | -_|
  5. # |__| |_| |___|___|___|___|_|_|_|___|___|_|_|___|
  6. #
  7. # Freedom in the Cloud
  8. #
  9. # A script which splits a user's gpg key into fragments which
  10. # may then be shared
  11. #
  12. # To get a random fragment
  13. # get a random fragment
  14. # fragment_files=($FRAGMENTS_DIR/*)
  15. # FRAGMENT_FILE="${files[RANDOM % ${#files[@]}]}"
  16. #
  17. # License
  18. # =======
  19. #
  20. # Copyright (C) 2015-2018 Bob Mottram <bob@freedombone.net>
  21. #
  22. # This program is free software: you can redistribute it and/or modify
  23. # it under the terms of the GNU Affero General Public License as published by
  24. # the Free Software Foundation, either version 3 of the License, or
  25. # (at your option) any later version.
  26. #
  27. # This program is distributed in the hope that it will be useful,
  28. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  29. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  30. # GNU Affero General Public License for more details.
  31. #
  32. # You should have received a copy of the GNU Affero General Public License
  33. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  34. PROJECT_NAME='freedombone'
  35. export TEXTDOMAIN=${PROJECT_NAME}-splitkey
  36. export TEXTDOMAINDIR="/usr/share/locale"
  37. # Dummy password to get around not being able to create a key without passphrase
  38. BACKUP_DUMMY_PASSWORD='backup'
  39. KEY_FRAGMENTS=3
  40. MY_USERNAME=
  41. MY_EMAIL_ADDRESS=
  42. MY_NAME=
  43. PASSWORD_FILE=
  44. function show_help {
  45. echo ''
  46. echo $"${PROJECT_NAME}-splitkey -u [username] -n [number of fragments] -e [email address] --fullname [Full name]"
  47. echo ''
  48. exit 0
  49. }
  50. while [ $# -gt 1 ]
  51. do
  52. key="$1"
  53. case $key in
  54. -h|--help)
  55. show_help
  56. ;;
  57. -u|--user)
  58. shift
  59. MY_USERNAME="$1"
  60. ;;
  61. -n|--fragments)
  62. shift
  63. KEY_FRAGMENTS=$1
  64. ;;
  65. -e|--email)
  66. shift
  67. MY_EMAIL_ADDRESS=$1
  68. ;;
  69. --fullname)
  70. shift
  71. MY_NAME=$1
  72. ;;
  73. --passwordfile)
  74. shift
  75. PASSWORD_FILE=$1
  76. ;;
  77. *)
  78. # unknown option
  79. ;;
  80. esac
  81. shift
  82. done
  83. if [ ! "$MY_USERNAME" ]; then
  84. show_help
  85. fi
  86. if [ ! -d "/home/$MY_USERNAME" ]; then
  87. echo $"User $MY_USERNAME does not exist on the system"
  88. exit 7270
  89. fi
  90. if [ ! -d "/home/$MY_USERNAME/.gnupg" ]; then
  91. echo $'No gpg key found'
  92. exit 5393
  93. fi
  94. if [ "$PASSWORD_FILE" ]; then
  95. if [ ! -f "$PASSWORD_FILE" ]; then
  96. echo $'Password file not found'
  97. exit 62952
  98. fi
  99. fi
  100. FRAGMENTS_DIR=/home/$MY_USERNAME/.gnupg_fragments
  101. if [ -d "$FRAGMENTS_DIR" ]; then
  102. exit 0
  103. fi
  104. # get the gpg key ID
  105. if [ ! "$MY_EMAIL_ADDRESS" ]; then
  106. MY_EMAIL_ADDRESS=$MY_USERNAME@$HOSTNAME
  107. fi
  108. KEYID=$(su -c "gpg --list-keys $MY_EMAIL_ADDRESS" - "$MY_USERNAME" | sed -n '2p' | sed 's/^[ \t]*//')
  109. if [ ${#KEYID} -lt 4 ]; then
  110. echo $"gpg key for $MY_EMAIL_ADDRESS was not found"
  111. exit 3682
  112. fi
  113. MY_BACKUP_KEY_ID=$(gpg --list-keys "$MY_NAME (backup key)" | sed -n '2p' | sed 's/^[ \t]*//')
  114. if [ ${#MY_BACKUP_KEY_ID} -lt 4 ]; then
  115. echo $"gpg backup key for '$MY_NAME' was not found"
  116. exit 58213
  117. fi
  118. # create the key file
  119. mkdir -p "$FRAGMENTS_DIR"
  120. chown "$MY_USERNAME":"$MY_USERNAME" "$FRAGMENTS_DIR"
  121. KEYS_FILE="$FRAGMENTS_DIR/keyshare.asc"
  122. if ! gpg --output "$FRAGMENTS_DIR/pubkey.txt" --armor --export "$KEYID"; then
  123. echo $"Unable to extract public key for $KEYID"
  124. exit 7835
  125. fi
  126. if [ ! "$PASSWORD_FILE" ]; then
  127. gpg --output "$FRAGMENTS_DIR/privkey.txt" \
  128. --armor --export-secret-key "$KEYID"
  129. else
  130. # shellcheck disable=SC2005
  131. echo "$(printf "%s" "$(cat "$PASSWORD_FILE")")" | \
  132. gpg --batch --passphrase-fd 0 \
  133. --output "$FRAGMENTS_DIR/privkey.txt" \
  134. --armor --export-secret-key "$KEYID"
  135. fi
  136. # shellcheck disable=SC2181
  137. if [ ! "$?" = "0" ]; then
  138. echo $"Unable to extract private key for $KEYID"
  139. exit 7823
  140. fi
  141. if ! gpg --output "$FRAGMENTS_DIR/backup_pubkey.txt" \
  142. --armor --export "$MY_BACKUP_KEY_ID"; then
  143. shred -zu "$FRAGMENTS_DIR/privkey.txt"
  144. echo $"Unable to extract backup public key for $MY_BACKUP_KEY_ID"
  145. exit 62928
  146. fi
  147. echo "$BACKUP_DUMMY_PASSWORD" | \
  148. if ! gpg --output "$FRAGMENTS_DIR/backup_privkey.txt" \
  149. --batch --passphrase-fd 0 \
  150. --armor --export-secret-key "$MY_BACKUP_KEY_ID"; then
  151. shred -zu "$FRAGMENTS_DIR/privkey.txt"
  152. echo $"Unable to extract backup private key for $MY_BACKUP_KEY_ID"
  153. exit 13783
  154. fi
  155. # Ensure there aren't any permissions problems when running cat
  156. chmod +r "$FRAGMENTS_DIR/privkey.txt"
  157. chmod +r "$FRAGMENTS_DIR/backup_privkey.txt"
  158. cat "$FRAGMENTS_DIR/pubkey.txt" \
  159. "$FRAGMENTS_DIR/privkey.txt" \
  160. "$FRAGMENTS_DIR/backup_pubkey.txt" \
  161. "$FRAGMENTS_DIR/backup_privkey.txt" > "$KEYS_FILE"
  162. shred -zu "$FRAGMENTS_DIR/privkey.txt"
  163. shred -zu "$FRAGMENTS_DIR/pubkey.txt"
  164. shred -zu "$FRAGMENTS_DIR/backup_privkey.txt"
  165. shred -zu "$FRAGMENTS_DIR/backup_pubkey.txt"
  166. KEY_SHARES=$((KEY_FRAGMENTS * 2))
  167. if ! gfsplit -n "$KEY_FRAGMENTS" -m $KEY_SHARES "$KEYS_FILE"; then
  168. echo $"Unable to split the gpg key"
  169. rm -rf "$FRAGMENTS_DIR"
  170. if [ -f "$KEYS_FILE" ]; then
  171. shred -zu "$KEYS_FILE"
  172. fi
  173. exit 63028
  174. fi
  175. shred -zu "$KEYS_FILE"
  176. # set permissions
  177. chown -R "$MY_USERNAME":"$MY_USERNAME" "$FRAGMENTS_DIR"
  178. chmod -R 600 "$FRAGMENTS_DIR"
  179. echo $"$KEY_SHARES key shares created"
  180. exit 0