| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330 | 
							- #!/bin/bash
 - #  _____               _           _
 - # |   __|___ ___ ___ _| |___ _____| |_ ___ ___ ___
 - # |   __|  _| -_| -_| . | . |     | . | . |   | -_|
 - # |__|  |_| |___|___|___|___|_|_|_|___|___|_|_|___|
 - #
 - #                              Freedom in the Cloud
 - #
 - # It's useful to be able to store user passwords, but not a good
 - # idea to do that in plain text. This implements a simple password
 - # store. It gpg symmetric encrypts passwords using the backups
 - # private key as the passphrase.
 - #
 - # In order for an adversary to obtain the passwords they must have
 - # the backups GPG key, which is not obtainable from local or remote
 - # backups and can only happen if they get root access to the system
 - # (in which case it's game over anyhow) or if they can decrypt
 - # a master keydrive or obtain sufficient keydrive fragments.
 - #
 - # License
 - # =======
 - #
 - # Copyright (C) 2016-2018 Bob Mottram <bob@freedombone.net>
 - #
 - # This program is free software: you can redistribute it and/or modify
 - # it under the terms of the GNU Affero General Public License as published by
 - # the Free Software Foundation, either version 3 of the License, or
 - # (at your option) any later version.
 - #
 - # This program is distributed in the hope that it will be useful,
 - # but WITHOUT ANY WARRANTY; without even the implied warranty of
 - # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 - # GNU Affero General Public License for more details.
 - #
 - # You should have received a copy of the GNU Affero General Public License
 - # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 - 
 - PROJECT_NAME='freedombone'
 - 
 - export TEXTDOMAIN=${PROJECT_NAME}-pass
 - export TEXTDOMAINDIR="/usr/share/locale"
 - 
 - MY_BACKUP_KEY_ID=
 - CURR_USERNAME=
 - REMOVE_USERNAME=
 - CURR_APP=
 - REMOVE_APP=
 - CURR_PASSWORD=""
 - TESTS=
 - EXPORT_FILENAME=
 - 
 - MASTER_PASSWORD=''
 - 
 - # If this file is present then don't store passwords
 - NO_PASSWORD_STORE_FILE=~/.nostore
 - 
 - function get_backup_key_id {
 -     MY_BACKUP_KEY_ID=$(gpg --list-keys "(backup key)" | sed -n '2p' | sed 's/^[ \t]*//')
 -     if [ ${#MY_BACKUP_KEY_ID} -lt 4 ]; then
 -         echo $"Error: gpg backup key was not found"
 -         exit 58213
 -     fi
 - }
 - 
 - function pass_show_help {
 -     echo ''
 -     echo $"${PROJECT_NAME}-pass"
 -     echo ''
 -     echo $'Password store using gpg'
 -     echo ''
 -     echo $'  -h --help                        Show help'
 -     echo $'  -u --user [name]                 Username'
 -     echo $'  -a --app [name]                  Name of the application'
 -     echo $'  -p --pass [password]             The password to store'
 -     echo $'     --export [filename]           Export to KeepassX XML'
 -     echo ''
 -     echo $'To encrypt a password:'
 -     echo ''
 -     echo $"  ${PROJECT_NAME}-pass -u [username] -a [app] -p [password]"
 -     echo ''
 -     echo $'To retrieve a password:'
 -     echo $''
 -     echo $"  ${PROJECT_NAME}-pass -u [username] -a [app]"
 -     echo ''
 -     echo $'To remove passwords for a user:'
 -     echo $''
 -     echo $"  ${PROJECT_NAME}-pass -r [username]"
 -     echo ''
 -     echo $'To remove an application password for a user:'
 -     echo $''
 -     echo $"  ${PROJECT_NAME}-pass --u [username] --rmapp [name]"
 -     echo ''
 -     exit 0
 - }
 - 
 - function pad_string {
 -     pass_string="$1"
 -     str_length=${#pass_string}
 -     total_padding=$((128 - str_length))
 -     leading_padding=$((1 + RANDOM % total_padding))
 -     trailing_padding=$((total_padding - leading_padding))
 -     leading=$(printf "%-${leading_padding}s")
 -     trailing=$(printf "%-${trailing_padding}s")
 -     echo "${leading}${pass_string}${trailing}"
 - }
 - 
 - function remove_padding {
 -     padded_string="$1"
 -     echo -e "${padded_string}" | tr -d '[:space:]'
 - }
 - 
 - function run_tests {
 -     pass="SuperSecretPassword"
 -     padded=$(pad_string "$pass")
 -     if [ ${#padded} -ne 128 ]; then
 -         echo $'Incorrect padded length'
 -         exit 78352
 -     fi
 -     if ! "${PROJECT_NAME}-pass" -u root -a tests -p "$pass"; then
 -         echo $'Unable to encrypt password'
 -         exit 72725
 -     fi
 -     echo $'Password encrypted'
 -     returned_pass=$(${PROJECT_NAME}-pass -u root -a tests)
 -     if [[ "$pass" != "$returned_pass" ]]; then
 -         echo "pass     :${pass}:"
 -         echo "padded   :${padded}:"
 -         echo "returned :${returned_pass}:"
 -         exit 73825
 -     fi
 -     echo $'Password decrypted'
 -     ${PROJECT_NAME}-pass -u root --rmapp tests
 -     echo "Tests passed"
 - }
 - 
 - function clear_passwords {
 -     # remove all passwords except for the root one, which is needed
 -     # for automatic database backups
 -     for d in /root/.passwords/*/ ; do
 -         USERNAME=$(echo "$d" | awk -F '/' '{print $4}')
 -         if [[ "$USERNAME" != 'root' ]]; then
 -             shred -zu "/root/.passwords/$USERNAME/"*
 -             rm -rf "/root/.passwords/$USERNAME"
 -         fi
 -     done
 -     if [ ! -f $NO_PASSWORD_STORE_FILE ]; then
 -         touch $NO_PASSWORD_STORE_FILE
 -     fi
 -     echo $'Passwords cleared. Future passwords will not be stored.'
 -     exit 0
 - }
 - 
 - function export_to_keepass {
 -     filename="$1"
 - 
 -     { echo '<database>';
 -       echo '  <group>';
 -       echo "    <title>${PROJECT_NAME}</title>";
 -       echo '    <icon>48</icon>'; } > "$filename"
 - 
 -     for d in /root/.passwords/*/ ; do
 -         USERNAME=$(echo "$d" | awk -F '/' '{print $4}')
 -         { echo '    <group>';
 -           echo "      <title>$USERNAME</title>";
 -           echo '      <icon>0</icon>'; } >> "$filename"
 -         for a in /root/.passwords/$USERNAME/* ; do
 -             APP_NAME=$(basename "$a")
 -             app_password=$("${PROJECT_NAME}-pass" -u "$USERNAME" -a "$APP_NAME")
 -             { echo '      <entry>';
 -               echo "        <title>$APP_NAME</title>";
 -               echo "        <username>$USERNAME</username>";
 -               echo "        <password>$app_password</password>";
 -               echo '        <url/>';
 -               echo '        <comment/>';
 -               echo '        <icon>0</icon>';
 -               echo '        <expire>Never</expire>';
 -               echo '      </entry>'; } >> "$filename"
 -         done
 -         echo '    </group>' >> "$filename"
 -     done
 - 
 -     echo '  </group>' >> "$filename"
 -     echo '</database>' >> "$filename"
 - 
 -     echo $"Exported $filename"
 - }
 - 
 - while [ $# -gt 1 ]
 - do
 -     key="$1"
 - 
 -     case $key in
 -         -h|--help)
 -             pass_show_help
 -             ;;
 -         -t|--test)
 -             shift
 -             TESTS=1
 -             ;;
 -         -c|--clear|--erase)
 -             clear_passwords
 -             ;;
 -         -e|--enable)
 -             shift
 -             if [ -f $NO_PASSWORD_STORE_FILE ]; then
 -                 rm $NO_PASSWORD_STORE_FILE
 -                 echo $'Password storage has been enabled'
 -             fi
 -             ;;
 -         -u|--user|--username)
 -             shift
 -             CURR_USERNAME="${1}"
 -             ;;
 -         -r|--rm|--remove)
 -             shift
 -             REMOVE_USERNAME="${1}"
 -             ;;
 -         --rmapp|--removeapp)
 -             shift
 -             REMOVE_APP="${1}"
 -             ;;
 -         -a|--app|--application)
 -             shift
 -             CURR_APP="${1}"
 -             ;;
 -         --export)
 -             shift
 -             EXPORT_FILENAME="${1}"
 -             ;;
 -         --master)
 -             shift
 -             MASTER_PASSWORD="${1}"
 -             ;;
 -         -p|--pass|--password|--passphrase)
 -             shift
 -             CURR_PASSWORD="${1}"
 -             ;;
 -         *)
 -             # unknown option
 -             ;;
 -     esac
 -     shift
 - done
 - 
 - if [ "${REMOVE_USERNAME}" ]; then
 -     if [ -d "${HOME}/.passwords/${REMOVE_USERNAME}" ]; then
 -         rm -rf "${HOME}/.passwords/${REMOVE_USERNAME}"
 -     fi
 -     exit 0
 - fi
 - 
 - get_backup_key_id
 - 
 - if [ ${#MASTER_PASSWORD} -eq 0 ]; then
 -     if [ ! -d /root/.passwords/root ]; then
 -         mkdir -p /root/.passwords/root
 -     fi
 -     if [ ! -f /root/.passwords/root/master ]; then
 -         newpass=$(openssl rand -base64 64 | tr -dc A-Za-z0-9 | head -c 30)
 -         echo "$newpass" > /root/.passwords/root/master
 -         chmod 700 /root/.passwords/root/master
 -     fi
 -     MASTER_PASSWORD=$(cat /root/.passwords/root/master)
 - fi
 - 
 - if [ $TESTS ]; then
 -     run_tests
 -     exit 0
 - fi
 - 
 - if [ "$EXPORT_FILENAME" ]; then
 -     export_to_keepass "$EXPORT_FILENAME"
 -     exit 0
 - fi
 - 
 - if [ ! "$CURR_USERNAME" ]; then
 -     echo $'Error: No username given'
 -     exit 1
 - fi
 - 
 - if [ ! -d "/home/$CURR_USERNAME" ]; then
 -     if [[ "$CURR_USERNAME" != "root" ]]; then
 -         echo $"Error: User $CURR_USERNAME does not exist"
 -         exit 2
 -     fi
 - fi
 - 
 - if [ "${REMOVE_APP}" ]; then
 -     if [ -d "${HOME}/.passwords/${CURR_USERNAME}/${REMOVE_APP}" ]; then
 -         shred -zu "${HOME}/.passwords/${CURR_USERNAME}/${REMOVE_APP}"
 -     fi
 -     exit 0
 - fi
 - 
 - if [ ! "$CURR_APP" ]; then
 -     echo $'Error: No app name given'
 -     exit 3
 - fi
 - 
 - if [ ${#CURR_PASSWORD} -eq 0 ]; then
 -     # retrieve password
 -     if [ ! -f "${HOME}/.passwords/$CURR_USERNAME/$CURR_APP" ]; then
 -         MASTER_PASSWORD=
 -         echo ""
 -         exit 4
 -     else
 -         pass=$(gpg --batch -dq --passphrase "$MASTER_PASSWORD" "${HOME}/.passwords/$CURR_USERNAME/$CURR_APP")
 -         remove_padding "${pass}"
 -     fi
 - else
 -     # store password
 -     if [ -f $NO_PASSWORD_STORE_FILE ]; then
 -         if [[ "$CURR_USERNAME" != 'root' ]]; then
 -             MASTER_PASSWORD=
 -             exit 0
 -         fi
 -     fi
 -     if [ ! -d "${HOME}/.passwords/$CURR_USERNAME" ]; then
 -         mkdir -p "${HOME}/.passwords/$CURR_USERNAME"
 -     fi
 -     # padding helps to ensure than nothing can be learned from the length of the cyphertext
 -     pad_string "${CURR_PASSWORD}" | gpg --batch -ca --cipher-algo AES256 --passphrase "$MASTER_PASSWORD" > "${HOME}/.passwords/$CURR_USERNAME/$CURR_APP"
 -     if [ ! -f "${HOME}/.passwords/$CURR_USERNAME/$CURR_APP" ]; then
 -         MASTER_PASSWORD=
 -         exit 5
 -     fi
 - fi
 - 
 - MASTER_PASSWORD=
 - exit 0
 
 
  |