freedombone-utils-gpg 14KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370
  1. #!/bin/bash
  2. # _____ _ _
  3. # | __|___ ___ ___ _| |___ _____| |_ ___ ___ ___
  4. # | __| _| -_| -_| . | . | | . | . | | -_|
  5. # |__| |_| |___|___|___|___|_|_|_|___|___|_|_|___|
  6. #
  7. # Freedom in the Cloud
  8. #
  9. # gpg functions
  10. #
  11. # License
  12. # =======
  13. #
  14. # Copyright (C) 2016-2018 Bob Mottram <bob@freedombone.net>
  15. #
  16. # This program is free software: you can redistribute it and/or modify
  17. # it under the terms of the GNU Affero General Public License as published by
  18. # the Free Software Foundation, either version 3 of the License, or
  19. # (at your option) any later version.
  20. #
  21. # This program is distributed in the hope that it will be useful,
  22. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  23. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  24. # GNU Affero General Public License for more details.
  25. #
  26. # You should have received a copy of the GNU Affero General Public License
  27. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  28. function gpg_update_mutt {
  29. key_username="$1"
  30. if [ ! -f "/home/$key_username/.muttrc" ]; then
  31. return
  32. fi
  33. CURR_EMAIL_ADDRESS=$key_username@$HOSTNAME
  34. CURR_GPG_ID=$(gpg --homedir="/home/$key_username/.gnupg" --list-keys "$CURR_EMAIL_ADDRESS" | sed -n '2p' | sed 's/^[ \t]*//')
  35. # If the default key is specified within gpg.conf
  36. if [ -f "/home/$key_username/gpg.conf" ]; then
  37. if grep -q "default-key" "/home/$key_username/gpg.conf"; then
  38. default_gpg_key=$(grep "default-key" "/home/$key_username/gpg.conf")
  39. if [[ "$default_gpg_key" != *'#'* ]]; then
  40. default_gpg_key=$(grep "default-key" "/home/$key_username/gpg.conf" | awk -F ' ' '{print $2}')
  41. if [ ${#default_gpg_key} -gt 3 ]; then
  42. CURR_GPG_ID=$(gpg --homedir="/home/$key_username/.gnupg" --list-keys "$default_gpg_key" | sed -n '2p' | sed 's/^[ \t]*//')
  43. fi
  44. fi
  45. fi
  46. fi
  47. sed -i "s|set pgp_encrypt_only_command.*|set pgp_encrypt_only_command=\"/usr/lib/mutt/pgpewrap gpg --batch --quiet --no-verbose --output - --encrypt --textmode --armor --trust-model always --encrypt-to $CURR_GPG_ID -- -r %r -- %f\"|g" "/home/$key_username/.muttrc"
  48. sed -i "s|set pgp_encrypt_sign_command.*|set pgp_encrypt_sign_command=\"/usr/lib/mutt/pgpewrap gpg %?p?--passphrase-fd 0? --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --trust-model always --encrypt-to $CURR_GPG_ID -- -r %r -- %f\"|g" "/home/$key_username/.muttrc"
  49. chown "$key_username":"$key_username" "/home/$key_username/.muttrc"
  50. }
  51. function gpg_import_public_key {
  52. key_username="$1"
  53. key_filename="$2"
  54. gpg --homedir="/home/$key_username/.gnupg" --import "$key_filename"
  55. gpg_set_permissions "$key_username"
  56. }
  57. function gpg_import_private_key {
  58. key_username="$1"
  59. key_filename="$2"
  60. gpg --homedir="/home/$key_username/.gnupg" --allow-secret-key-import --import "$key_filename"
  61. gpg_set_permissions "$key_username"
  62. }
  63. function gpg_export_public_key {
  64. key_username="$1"
  65. key_id="$2"
  66. key_filename="$3"
  67. chown -R "$key_username":"$key_username" "/home/$key_username/.gnupg"
  68. su -m root -c "gpg --homedir /home/$key_username/.gnupg --output $key_filename --armor --export $key_id" - "$key_username"
  69. }
  70. function gpg_export_private_key {
  71. key_username=$1
  72. key_id=$2
  73. key_filename=$3
  74. chown -R "$key_username":"$key_username" "/home/$key_username/.gnupg"
  75. su -m root -c "gpg --homedir=/home/$key_username/.gnupg --armor --output $key_filename --export-secret-key $key_id" - "$key_username"
  76. }
  77. function gpg_create_key {
  78. key_username="$1"
  79. key_passphrase="$2"
  80. gpg_dir="/home/$key_username/.gnupg"
  81. { echo 'Key-Type: eddsa';
  82. echo 'Key-Curve: Ed25519';
  83. echo 'Subkey-Type: eddsa';
  84. echo 'Subkey-Curve: Ed25519';
  85. echo "Name-Real: $MY_NAME";
  86. echo "Name-Email: $MY_EMAIL_ADDRESS";
  87. echo 'Expire-Date: 0'; } > "/home/$key_username/gpg-genkey.conf"
  88. cat "/home/$key_username/gpg-genkey.conf"
  89. if [ "$key_passphrase" ]; then
  90. echo "Passphrase: $key_passphrase" >> "/home/$key_username/gpg-genkey.conf"
  91. else
  92. echo "Passphrase: $PROJECT_NAME" >> "/home/$key_username/gpg-genkey.conf"
  93. fi
  94. chown "$key_username":"$key_username" "/home/$key_username/gpg-genkey.conf"
  95. echo $'Generating a new GPG key'
  96. su -m root -c "gpg --homedir /home/$key_username/.gnupg --batch --full-gen-key /home/$key_username/gpg-genkey.conf" - "$key_username"
  97. chown -R "$key_username":"$key_username" "/home/$key_username/.gnupg"
  98. KEY_EXISTS=$(gpg_key_exists "$key_username" "$MY_EMAIL_ADDRESS")
  99. if [[ $KEY_EXISTS == "no" ]]; then
  100. echo $"A GPG key for $MY_EMAIL_ADDRESS could not be created"
  101. exit 63621
  102. fi
  103. rm "/home/$key_username/gpg-genkey.conf"
  104. CURR_GPG_PUBLIC_KEY_ID=$(gpg_pubkey_from_email "$key_username" "$MY_EMAIL_ADDRESS")
  105. if [ ${#CURR_GPG_PUBLIC_KEY_ID} -lt 4 ]; then
  106. echo $"GPG public key ID could not be obtained for $MY_EMAIL_ADDRESS"
  107. exit 825292
  108. fi
  109. gpg_set_permissions "$key_username"
  110. }
  111. function gpg_delete_key {
  112. key_username="$1"
  113. key_id="$2"
  114. chown -R "$key_username":"$key_username" "/home/$key_username/.gnupg"
  115. su -c "gpg --batch --quiet --homedir=/home/$key_username/.gnupg --delete-secret-key $key_id" - "$key_username"
  116. su -c "gpg --batch --quiet --homedir=/home/$key_username/.gnupg --delete-key $key_id" - "$key_username"
  117. }
  118. function gpg_set_permissions {
  119. key_username=$1
  120. if [[ "$key_username" != 'root' ]]; then
  121. chmod 700 "/home/$key_username/.gnupg"
  122. chmod -R 600 "/home/$key_username/.gnupg/"*
  123. printf '%%Assuan%%\nsocket=/dev/shm/S.dirmngr\n' > "/home/$key_username/.gnupg/S.dirmngr"
  124. if [ -d "/home/$key_username/.gnupg/crls.d" ]; then
  125. chmod +x "/home/$key_username/.gnupg/crls.d"
  126. fi
  127. chown -R "$key_username":"$key_username" "/home/$key_username/.gnupg"
  128. else
  129. chmod 700 /root/.gnupg
  130. chmod -R 600 /root/.gnupg/*
  131. printf '%%Assuan%%\nsocket=/dev/shm/S.dirmngr\n' > /root/.gnupg/S.dirmngr
  132. if [ -d /root/.gnupg/crls.d ]; then
  133. chmod +x /root/.gnupg/crls.d
  134. fi
  135. chown -R "$key_username":"$key_username" /root/.gnupg
  136. fi
  137. }
  138. function gpg_reconstruct_key {
  139. key_username=$1
  140. key_interactive=$2
  141. if [ ! -d "/home/$key_username/.gnupg_fragments" ]; then
  142. return
  143. fi
  144. cd "/home/$key_username/.gnupg_fragments" || exit 3468346
  145. # shellcheck disable=SC2012
  146. no_of_shares=$(ls -afq keyshare.asc.* | wc -l)
  147. if (( no_of_shares < 4 )); then
  148. if [ "$key_interactive" ]; then
  149. dialog --title $"Recover Encryption Keys" --msgbox $'Not enough fragments to reconstruct the key' 6 70
  150. else
  151. echo $'Not enough fragments to reconstruct the key'
  152. fi
  153. exit 7348
  154. fi
  155. if ! gfcombine "/home/$key_username/.gnupg_fragments/keyshare*"; then
  156. if [ "$key_interactive" ]; then
  157. dialog --title $"Recover Encryption Keys" --msgbox $'Unable to reconstruct the key' 6 70
  158. else
  159. echo $'Unable to reconstruct the key'
  160. fi
  161. exit 7348
  162. fi
  163. KEYS_FILE=/home/$key_username/.gnupg_fragments/keyshare.asc
  164. if [ ! -f "$KEYS_FILE" ]; then
  165. if [ "$key_interactive" ]; then
  166. dialog --title $"Recover Encryption Keys" --msgbox $'Unable to reconstruct the key' 6 70
  167. else
  168. echo $'Unable to reconstruct the key'
  169. fi
  170. exit 52852
  171. fi
  172. if ! gpg --homedir="/home/$key_username/.gnupg" --allow-secret-key-import --import "$KEYS_FILE"; then
  173. rm "$KEYS_FILE"
  174. rm -rf "/home/$key_username/.tempgnupg"
  175. if [ "$key_interactive" ]; then
  176. dialog --title $"Recover Encryption Keys" --msgbox $'Unable to import gpg key' 6 70
  177. else
  178. echo $'Unable to import gpg key'
  179. fi
  180. exit 96547
  181. fi
  182. rm "$KEYS_FILE"
  183. gpg_set_permissions "$key_username"
  184. if [ "$key_interactive" ]; then
  185. dialog --title $"Recover Encryption Keys" --msgbox $'Key has been reconstructed' 6 70
  186. else
  187. echo $'Key has been reconstructed'
  188. fi
  189. }
  190. function gpg_agent_setup {
  191. gpg_username=$1
  192. if [[ $gpg_username == 'root' ]]; then
  193. if ! grep -q 'GPG_TTY' /root/.bashrc; then
  194. { echo '';
  195. echo "GPG_TTY=\$(tty)";
  196. echo 'export GPG_TTY'; } >> /root/.bashrc
  197. fi
  198. if grep -q '# use-agent' /root/.gnupg/gpg.conf; then
  199. sed -i 's|# use-agent|use-agent|g' /root/.gnupg/gpg.conf
  200. fi
  201. if ! grep -q 'use-agent' /root/.gnupg/gpg.conf; then
  202. echo 'use-agent' >> /root/.gnupg/gpg.conf
  203. fi
  204. { echo 'default-cache-ttl 300';
  205. echo 'max-cache-ttl 999999';
  206. echo 'allow-loopback-pinentry'; } > /root/.gnupg/gpg-agent.conf
  207. if [ -f /root/.gnupg/S.dirmngr ]; then
  208. rm /root/.gnupg/S.dirmngr
  209. fi
  210. echo RELOADAGENT | gpg-connect-agent
  211. else
  212. if ! grep -q 'GPG_TTY' "/home/$gpg_username/.bashrc"; then
  213. { echo '';
  214. echo "GPG_TTY=\$(tty)";
  215. echo 'export GPG_TTY'; } >> "/home/$gpg_username/.bashrc"
  216. chown "$gpg_username":"$gpg_username" "/home/$gpg_username/.bashrc"
  217. fi
  218. if grep -q '# use-agent' "/home/$gpg_username/.gnupg/gpg.conf"; then
  219. sed -i 's|# use-agent|use-agent|g' "/home/$gpg_username/.gnupg/gpg.conf"
  220. fi
  221. if ! grep -q 'use-agent' "/home/$gpg_username/.gnupg/gpg.conf"; then
  222. echo 'use-agent' >> "/home/$gpg_username/.gnupg/gpg.conf"
  223. fi
  224. if ! grep -q 'pinentry-mode loopback' "/home/$gpg_username/.gnupg/gpg.conf"; then
  225. echo 'pinentry-mode loopback' >> "/home/$gpg_username/.gnupg/gpg.conf"
  226. fi
  227. echo 'default-cache-ttl 300' > "/home/$gpg_username/.gnupg/gpg-agent.conf"
  228. echo 'max-cache-ttl 999999' >> "/home/$gpg_username/.gnupg/gpg-agent.conf"
  229. echo 'allow-loopback-pinentry' >> "/home/$gpg_username/.gnupg/gpg-agent.conf"
  230. if [ -f "/home/$gpg_username/.gnupg/S.dirmngr" ]; then
  231. rm "/home/$gpg_username/.gnupg/S.dirmngr"
  232. fi
  233. if [[ "$gpg_username" != "$USER" ]]; then
  234. su -c "echo RELOADAGENT | gpg-connect-agent" - "$gpg_username"
  235. else
  236. echo RELOADAGENT | gpg-connect-agent
  237. fi
  238. fi
  239. }
  240. function gpg_agent_enable {
  241. gpg_username=$1
  242. if [[ $gpg_username == 'root' ]]; then
  243. return
  244. else
  245. if grep -q 'GPG_TTY' "/home/$gpg_username/.bashrc"; then
  246. sed -i '/GPG_TTY/d' "/home/$gpg_username/.bashrc"
  247. chown "$gpg_username":"$gpg_username" "/home/$gpg_username/.bashrc"
  248. fi
  249. if grep -q 'use-agent' "/home/$gpg_username/.gnupg/gpg.conf"; then
  250. sed -i '/use-agent/d' "/home/$gpg_username/.gnupg/gpg.conf"
  251. fi
  252. if grep -q 'pinentry-mode loopback' "/home/$gpg_username/.gnupg/gpg.conf"; then
  253. sed -i '/pinentry-mode loopback/d' "/home/$gpg_username/.gnupg/gpg.conf"
  254. fi
  255. if [ -f "/home/$gpg_username/.gnupg/gpg-agent.conf" ]; then
  256. rm "/home/$gpg_username/.gnupg/gpg-agent.conf"
  257. fi
  258. if [[ "$gpg_username" != "$USER" ]]; then
  259. su -c "echo RELOADAGENT | gpg-connect-agent" - "$gpg_username"
  260. else
  261. echo RELOADAGENT | gpg-connect-agent
  262. fi
  263. fi
  264. }
  265. function gpg_pubkey_from_email {
  266. key_owner_username=$1
  267. key_email_address=$2
  268. key_id=
  269. if [[ $key_owner_username != "root" ]]; then
  270. key_id=$(su -c "gpg --list-keys $key_email_address" - "$key_owner_username" | sed -n '2p' | sed 's/^[ \t]*//')
  271. # If the default key is specified within gpg.conf
  272. if [ -f "/home/$key_owner_username/gpg.conf" ]; then
  273. if grep -q "default-key" "/home/$key_owner_username/gpg.conf"; then
  274. default_gpg_key=$(grep "default-key" "/home/$key_owner_username/gpg.conf")
  275. if [[ "$default_gpg_key" != *'#'* ]]; then
  276. default_gpg_key=$(grep "default-key" "/home/$key_owner_username/gpg.conf" | awk -F ' ' '{print $2}')
  277. if [ ${#default_gpg_key} -gt 3 ]; then
  278. key_id=$(su -c "gpg --list-keys $default_gpg_key" - "$key_owner_username" | sed -n '2p' | sed 's/^[ \t]*//')
  279. fi
  280. fi
  281. fi
  282. fi
  283. else
  284. key_id=$(gpg --list-keys "$key_email_address" | sed -n '2p' | sed 's/^[ \t]*//')
  285. # If the default key is specified within gpg.conf
  286. if [ -f /root/gpg.conf ]; then
  287. if grep -q "default-key" /root/gpg.conf; then
  288. default_gpg_key=$(grep "default-key" /root/gpg.conf)
  289. if [[ "$default_gpg_key" != *'#'* ]]; then
  290. default_gpg_key=$(grep "default-key" /root/gpg.conf | awk -F ' ' '{print $2}')
  291. if [ ${#default_gpg_key} -gt 3 ]; then
  292. key_id=$(gpg --list-keys "$default_gpg_key" | sed -n '2p' | sed 's/^[ \t]*//')
  293. fi
  294. fi
  295. fi
  296. fi
  297. fi
  298. echo "$key_id"
  299. }
  300. function enable_email_encryption_at_rest {
  301. for d in /home/*/ ; do
  302. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  303. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  304. if grep -q '#| /usr/bin/gpgit.pl' "/home/$USERNAME/.procmailrc"; then
  305. sed -i 's@#| /usr/bin/gpgit.pl@| /usr/bin/gpgit.pl@g' "/home/$USERNAME/.procmailrc"
  306. sed -i 's|#:0 f|:0 f|g' "/home/$USERNAME/.procmailrc"
  307. fi
  308. fi
  309. done
  310. if grep -q '#| /usr/bin/gpgit.pl' /etc/skel/.procmailrc; then
  311. sed -i 's@#| /usr/bin/gpgit.pl@| /usr/bin/gpgit.pl@g' /etc/skel/.procmailrc
  312. sed -i 's|#:0 f|:0 f|g' /etc/skel/.procmailrc
  313. fi
  314. }
  315. function disable_email_encryption_at_rest {
  316. for d in /home/*/ ; do
  317. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  318. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  319. if ! grep -q '#| /usr/bin/gpgit.pl' "/home/$USERNAME/.procmailrc"; then
  320. sed -i 's@| /usr/bin/gpgit.pl@#| /usr/bin/gpgit.pl@g' "/home/$USERNAME/.procmailrc"
  321. sed -i 's|:0 f|#:0 f|g' "/home/$USERNAME/.procmailrc"
  322. fi
  323. fi
  324. done
  325. if ! grep -q '#| /usr/bin/gpgit.pl' /etc/skel/.procmailrc; then
  326. sed -i 's@| /usr/bin/gpgit.pl@#| /usr/bin/gpgit.pl@g' /etc/skel/.procmailrc
  327. sed -i 's|:0 f|#:0 f|g' /etc/skel/.procmailrc
  328. fi
  329. }
  330. # NOTE: deliberately no exit 0