| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174 | #!/bin/bash
#
# .---.                  .              .
# |                      |              |
# |--- .--. .-.  .-.  .-.|  .-. .--.--. |.-.  .-. .--.  .-.
# |    |   (.-' (.-' (   | (   )|  |  | |   )(   )|  | (.-'
# '    '     --'  --'  -' -  -' '  '   -' -'   -' '   -  --'
#
#                    Freedom in the Cloud
#
# Generates an email client cert for use with IMAP clients
# See:
#   http://strange.systems/certificate-based-auth-with-dovecot-sendmail
#   http://help.fabasoftfolio.com/index.php?topic=doc/Installation-and-Configuration-of-Fabasoft-Folio-IMAP-Service/client-certificate-authentication.htm
# License
# =======
#
# Copyright (C) 2015-2018 Bob Mottram <bob@freedombone.net>
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
PROJECT_NAME='freedombone'
export TEXTDOMAIN=${PROJECT_NAME}-clientcert
export TEXTDOMAINDIR="/usr/share/locale"
USERNAME=
COUNTRY_CODE="US"
AREA="Free Speech Zone"
LOCATION="Freedomville"
ORGANISATION="Freedombone"
UNIT="Freedombone Unit"
EXTENSIONS=""
function show_help {
    echo ''
    echo $"${PROJECT_NAME}-clientcert -u [username]"
    echo ''
    echo $'Creates email certificates for use with IMAP clients'
    echo ''
    echo $'     --help                  Show help'
    echo $'  -u --username [name]       Username'
    echo ''
    exit 0
}
while [ $# -gt 1 ]
do
    key="$1"
    case $key in
        --help)
            show_help
            ;;
        -u|--username)
            shift
            USERNAME="$1"
            ;;
        *)
            # unknown option
            ;;
    esac
    shift
done
if [ ! "$USERNAME" ]; then
    echo $'No username specified'
    exit 5748
fi
if [ ! -d "/home/$USERNAME" ]; then
    echo $"User $USERNAME not found"
    exit 76239
fi
if [ -d "/home/$USERNAME/emailcert" ]; then
    echo $'Client certs were already for created'
    exit 2953
fi
if [ ! -f /etc/dovecot/passwd-file ]; then
    touch /etc/dovecot/passwd-file
fi
# Add a user password
if ! grep -q "$USERNAME:{plain}" /etc/dovecot/passwd-file; then
    echo "$USERNAME:{plain}::::::nopassword" >> /etc/dovecot/passwd-file
fi
chmod 600 /etc/dovecot/passwd-file
# create a user cert
"${PROJECT_NAME}-addcert" -h "$USERNAME" --nodh ""
if [ ! -f "/etc/ssl/private/$USERNAME.key" ]; then
    echo $'User certificates were not created'
    rm -rf "/home/$USERNAME/emailcert"
    exit 74835
fi
# create a certificate request
openssl req -new -sha256 -subj \
        "/O=$ORGANISATION/OU=$UNIT/C=$COUNTRY_CODE/ST=$AREA/L=$LOCATION/CN=$USERNAME" \
        -key "/etc/ssl/private/$USERNAME.key" \
        -out "/etc/ssl/requests/$USERNAME.csr"
if [ ! -f "/etc/ssl/requests/$USERNAME.csr" ]; then
    echo $'Certificate request was not created'
    rm -rf "/home/$USERNAME/emailcert"
    exit 83520
fi
# sign the certificate request
cd /etc/ssl || exit 742742542
openssl ca -config /etc/ssl/dovecot-ca.cnf \
        -in "/etc/ssl/requests/$USERNAME.csr" \
        -out "/etc/ssl/certs/$USERNAME.cer"
if [ ! -f "/etc/ssl/certs/$USERNAME.cer" ]; then
    echo $'Authentication certificate was not created'
    rm -rf "/home/$USERNAME/emailcert"
    exit 343569
fi
# move the cert to the user's home
mkdir "/home/$USERNAME/emailcert"
# shellcheck disable=SC2086
mv /etc/ssl/certs/$USERNAME.cer /home/$USERNAME/emailcert
cp "/etc/ssl/certs/dovecot.crt" "/home/$USERNAME/emailcert"
cp "/etc/ssl/certs/ca-$HOSTNAME.crt" "/home/$USERNAME/emailcert"
# shellcheck disable=SC2086
mv /etc/ssl/private/$USERNAME.key /home/$USERNAME/emailcert
# shellcheck disable=SC2086
mv /etc/ssl/certs/$USERNAME.crt /home/$USERNAME/emailcert
openssl pkcs12 -export -in "/home/$USERNAME/emailcert/$USERNAME.cer" \
        -out "/home/$USERNAME/emailcert/$USERNAME.p12" \
        -inkey "/home/$USERNAME/emailcert/$USERNAME.key" \
        -certfile "/home/$USERNAME/emailcert/ca-$HOSTNAME.crt" \
        -password pass:""
# make an install script
{ echo '#!/bin/bash';
  echo "sudo mv ca-$HOSTNAME.crt /etc/ssl/certs";
  echo "sudo mv $USERNAME.crt /etc/ssl/certs";
  echo "sudo mv dovecot.crt /etc/ssl/certs";
  echo "sudo mv $USERNAME.key /etc/ssl/private";
  echo 'exit 0'; } > "/home/$USERNAME/emailcert/install.sh"
# set permissions for the user
chmod -R 755 "/home/$USERNAME/emailcert"
chown -R "$USERNAME":"$USERNAME" "/home/$USERNAME/emailcert"
chmod +x "/home/$USERNAME/emailcert/install.sh"
shred -zu "/etc/ssl/requests/$USERNAME.csr"
echo $'Email authentication certificate created. You can obtain it on the client with:'
echo ''
echo "      scp -P 2222 -r $USERNAME@$HOSTNAME:/home/$USERNAME/emailcert ~/"
echo ''
exit 0
 |