freedombone-utils-gpg 15KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # gpg functions
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2016-2018 Bob Mottram <bob@freedombone.net>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. function gpg_update_mutt {
  31. key_username=$1
  32. if [ ! -f /home/$key_username/.muttrc ]; then
  33. return
  34. fi
  35. CURR_EMAIL_ADDRESS=$key_username@$HOSTNAME
  36. CURR_GPG_ID=$(gpg --homedir=/home/$key_username/.gnupg --list-keys $CURR_EMAIL_ADDRESS | sed -n '2p' | sed 's/^[ \t]*//')
  37. # If the default key is specified within gpg.conf
  38. if [ -f /home/$key_username/gpg.conf ]; then
  39. if grep -q "default-key" /home/$key_username/gpg.conf; then
  40. default_gpg_key=$(cat /home/$key_username/gpg.conf | grep "default-key")
  41. if [[ "$default_gpg_key" != *'#'* ]]; then
  42. default_gpg_key=$(cat /home/$key_username/gpg.conf | grep "default-key" | awk -F ' ' '{print $2}')
  43. if [ ${#default_gpg_key} -gt 3 ]; then
  44. CURR_GPG_ID=$(gpg --homedir=/home/$key_username/.gnupg --list-keys $default_gpg_key | sed -n '2p' | sed 's/^[ \t]*//')
  45. fi
  46. fi
  47. fi
  48. fi
  49. sed -i "s|set pgp_encrypt_only_command.*|set pgp_encrypt_only_command=\"/usr/lib/mutt/pgpewrap gpg --batch --quiet --no-verbose --output - --encrypt --textmode --armor --trust-model always --encrypt-to $CURR_GPG_ID -- -r %r -- %f\"|g" /home/$key_username/.muttrc
  50. sed -i "s|set pgp_encrypt_sign_command.*|set pgp_encrypt_sign_command=\"/usr/lib/mutt/pgpewrap gpg %?p?--passphrase-fd 0? --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --trust-model always --encrypt-to $CURR_GPG_ID -- -r %r -- %f\"|g" /home/$key_username/.muttrc
  51. chown $key_username:$key_username /home/$key_username/.muttrc
  52. }
  53. function gpg_import_public_key {
  54. key_username=$1
  55. key_filename=$2
  56. gpg --homedir=/home/$key_username/.gnupg --import $key_filename
  57. gpg_set_permissions $key_username
  58. }
  59. function gpg_import_private_key {
  60. key_username=$1
  61. key_filename=$2
  62. gpg --homedir=/home/$key_username/.gnupg --allow-secret-key-import --import $key_filename
  63. gpg_set_permissions $key_username
  64. }
  65. function gpg_export_public_key {
  66. key_username=$1
  67. key_id=$2
  68. key_filename=$3
  69. chown -R $key_username:$key_username /home/$key_username/.gnupg
  70. su -m root -c "gpg --homedir /home/$key_username/.gnupg --output $key_filename --armor --export $key_id" - $key_username
  71. }
  72. function gpg_export_private_key {
  73. key_username=$1
  74. key_id=$2
  75. key_filename=$3
  76. chown -R $key_username:$key_username /home/$key_username/.gnupg
  77. su -m root -c "gpg --homedir=/home/$key_username/.gnupg --armor --output $key_filename --export-secret-key $key_id" - $key_username
  78. }
  79. function gpg_create_key {
  80. key_username=$1
  81. key_passphrase=$2
  82. gpg_dir=/home/$key_username/.gnupg
  83. echo 'Key-Type: eddsa' > /home/$key_username/gpg-genkey.conf
  84. echo 'Key-Curve: Ed25519' >> /home/$key_username/gpg-genkey.conf
  85. echo 'Subkey-Type: eddsa' >> /home/$key_username/gpg-genkey.conf
  86. echo 'Subkey-Curve: Ed25519' >> /home/$key_username/gpg-genkey.conf
  87. echo "Name-Real: $MY_NAME" >> /home/$key_username/gpg-genkey.conf
  88. echo "Name-Email: $MY_EMAIL_ADDRESS" >> /home/$key_username/gpg-genkey.conf
  89. echo 'Expire-Date: 0' >> /home/$key_username/gpg-genkey.conf
  90. cat /home/$key_username/gpg-genkey.conf
  91. if [ $key_passphrase ]; then
  92. echo "Passphrase: $key_passphrase" >> /home/$key_username/gpg-genkey.conf
  93. else
  94. echo "Passphrase: $PROJECT_NAME" >> /home/$key_username/gpg-genkey.conf
  95. fi
  96. chown $key_username:$key_username /home/$key_username/gpg-genkey.conf
  97. echo $'Generating a new GPG key'
  98. su -m root -c "gpg --homedir /home/$key_username/.gnupg --batch --full-gen-key /home/$key_username/gpg-genkey.conf" - $key_username
  99. chown -R $key_username:$key_username /home/$key_username/.gnupg
  100. KEY_EXISTS=$(gpg_key_exists "$key_username" "$MY_EMAIL_ADDRESS")
  101. if [[ $KEY_EXISTS == "no" ]]; then
  102. echo $"A GPG key for $MY_EMAIL_ADDRESS could not be created"
  103. exit 63621
  104. fi
  105. shred -zu /home/$key_username/gpg-genkey.conf
  106. CURR_GPG_PUBLIC_KEY_ID=$(gpg_pubkey_from_email "$key_username" "$MY_EMAIL_ADDRESS")
  107. if [ ${#CURR_GPG_PUBLIC_KEY_ID} -lt 4 ]; then
  108. echo $"GPG public key ID could not be obtained for $MY_EMAIL_ADDRESS"
  109. exit 825292
  110. fi
  111. gpg_set_permissions $key_username
  112. }
  113. function gpg_delete_key {
  114. key_username=$1
  115. key_id=$2
  116. chown -R $key_username:$key_username /home/$key_username/.gnupg
  117. su -c "gpg --batch --quiet --homedir=/home/$key_username/.gnupg --delete-secret-key $key_id" - $key_username
  118. su -c "gpg --batch --quiet --homedir=/home/$key_username/.gnupg --delete-key $key_id" - $key_username
  119. }
  120. function gpg_set_permissions {
  121. key_username=$1
  122. if [[ "$key_username" != 'root' ]]; then
  123. chmod 700 /home/$key_username/.gnupg
  124. chmod -R 600 /home/$key_username/.gnupg/*
  125. printf '%%Assuan%%\nsocket=/dev/shm/S.dirmngr\n' > /home/$key_username/.gnupg/S.dirmngr
  126. if [ -d /home/$key_username/.gnupg/crls.d ]; then
  127. chmod +x /home/$key_username/.gnupg/crls.d
  128. fi
  129. chown -R $key_username:$key_username /home/$key_username/.gnupg
  130. else
  131. chmod 700 /root/.gnupg
  132. chmod -R 600 /root/.gnupg/*
  133. printf '%%Assuan%%\nsocket=/dev/shm/S.dirmngr\n' > /root/.gnupg/S.dirmngr
  134. if [ -d /root/.gnupg/crls.d ]; then
  135. chmod +x /root/.gnupg/crls.d
  136. fi
  137. chown -R $key_username:$key_username /root/.gnupg
  138. fi
  139. }
  140. function gpg_reconstruct_key {
  141. key_username=$1
  142. key_interactive=$2
  143. if [ ! -d /home/$key_username/.gnupg_fragments ]; then
  144. return
  145. fi
  146. cd /home/$key_username/.gnupg_fragments
  147. no_of_shares=$(ls -afq keyshare.asc.* | wc -l)
  148. if (( no_of_shares < 4 )); then
  149. if [ $key_interactive ]; then
  150. dialog --title $"Recover Encryption Keys" --msgbox $'Not enough fragments to reconstruct the key' 6 70
  151. else
  152. echo $'Not enough fragments to reconstruct the key'
  153. fi
  154. exit 7348
  155. fi
  156. gfcombine /home/$key_username/.gnupg_fragments/keyshare*
  157. if [ ! "$?" = "0" ]; then
  158. if [ $key_interactive ]; then
  159. dialog --title $"Recover Encryption Keys" --msgbox $'Unable to reconstruct the key' 6 70
  160. else
  161. echo $'Unable to reconstruct the key'
  162. fi
  163. exit 7348
  164. fi
  165. KEYS_FILE=/home/$key_username/.gnupg_fragments/keyshare.asc
  166. if [ ! -f $KEYS_FILE ]; then
  167. if [ $key_interactive ]; then
  168. dialog --title $"Recover Encryption Keys" --msgbox $'Unable to reconstruct the key' 6 70
  169. else
  170. echo $'Unable to reconstruct the key'
  171. fi
  172. exit 52852
  173. fi
  174. gpg --homedir=/home/$key_username/.gnupg --allow-secret-key-import --import $KEYS_FILE
  175. if [ ! "$?" = "0" ]; then
  176. shred -zu $KEYS_FILE
  177. rm -rf /home/$key_username/.tempgnupg
  178. if [ $key_interactive ]; then
  179. dialog --title $"Recover Encryption Keys" --msgbox $'Unable to import gpg key' 6 70
  180. else
  181. echo $'Unable to import gpg key'
  182. fi
  183. exit 96547
  184. fi
  185. shred -zu $KEYS_FILE
  186. gpg_set_permissions $key_username
  187. if [ $key_interactive ]; then
  188. dialog --title $"Recover Encryption Keys" --msgbox $'Key has been reconstructed' 6 70
  189. else
  190. echo $'Key has been reconstructed'
  191. fi
  192. }
  193. function gpg_agent_setup {
  194. gpg_username=$1
  195. if [[ $gpg_username == 'root' ]]; then
  196. if ! grep -q 'GPG_TTY' /root/.bashrc; then
  197. echo '' >> /root/.bashrc
  198. echo 'GPG_TTY=$(tty)' >> /root/.bashrc
  199. echo 'export GPG_TTY' >> /root/.bashrc
  200. fi
  201. if grep -q '# use-agent' /root/.gnupg/gpg.conf; then
  202. sed -i 's|# use-agent|use-agent|g' /root/.gnupg/gpg.conf
  203. fi
  204. if ! grep -q 'use-agent' /root/.gnupg/gpg.conf; then
  205. echo 'use-agent' >> /root/.gnupg/gpg.conf
  206. fi
  207. echo 'default-cache-ttl 300' > /root/.gnupg/gpg-agent.conf
  208. echo 'max-cache-ttl 999999' >> /root/.gnupg/gpg-agent.conf
  209. echo 'allow-loopback-pinentry' >> /root/.gnupg/gpg-agent.conf
  210. if [ -f /root/.gnupg/S.dirmngr ]; then
  211. rm /root/.gnupg/S.dirmngr
  212. fi
  213. echo RELOADAGENT | gpg-connect-agent
  214. else
  215. if ! grep -q 'GPG_TTY' /home/$gpg_username/.bashrc; then
  216. echo '' >> /home/$gpg_username/.bashrc
  217. echo 'GPG_TTY=$(tty)' >> /home/$gpg_username/.bashrc
  218. echo 'export GPG_TTY' >> /home/$gpg_username/.bashrc
  219. chown $gpg_username:$gpg_username /home/$gpg_username/.bashrc
  220. fi
  221. if grep -q '# use-agent' /home/$gpg_username/.gnupg/gpg.conf; then
  222. sed -i 's|# use-agent|use-agent|g' /home/$gpg_username/.gnupg/gpg.conf
  223. fi
  224. if ! grep -q 'use-agent' /home/$gpg_username/.gnupg/gpg.conf; then
  225. echo 'use-agent' >> /home/$gpg_username/.gnupg/gpg.conf
  226. fi
  227. if ! grep -q 'pinentry-mode loopback' /home/$gpg_username/.gnupg/gpg.conf; then
  228. echo 'pinentry-mode loopback' >> /home/$gpg_username/.gnupg/gpg.conf
  229. fi
  230. echo 'default-cache-ttl 300' > /home/$gpg_username/.gnupg/gpg-agent.conf
  231. echo 'max-cache-ttl 999999' >> /home/$gpg_username/.gnupg/gpg-agent.conf
  232. echo 'allow-loopback-pinentry' >> /home/$gpg_username/.gnupg/gpg-agent.conf
  233. if [ -f /home/$gpg_username/.gnupg/S.dirmngr ]; then
  234. rm /home/$gpg_username/.gnupg/S.dirmngr
  235. fi
  236. if [[ "$gpg_username" != "$USER" ]]; then
  237. su -c "echo RELOADAGENT | gpg-connect-agent" - $gpg_username
  238. else
  239. echo RELOADAGENT | gpg-connect-agent
  240. fi
  241. fi
  242. }
  243. function gpg_agent_enable {
  244. gpg_username=$1
  245. if [[ $gpg_username == 'root' ]]; then
  246. return
  247. else
  248. if grep -q 'GPG_TTY' /home/$gpg_username/.bashrc; then
  249. sed -i '/GPG_TTY/d' /home/$gpg_username/.bashrc
  250. chown $gpg_username:$gpg_username /home/$gpg_username/.bashrc
  251. fi
  252. if grep -q 'use-agent' /home/$gpg_username/.gnupg/gpg.conf; then
  253. sed -i '/use-agent/d' /home/$gpg_username/.gnupg/gpg.conf
  254. fi
  255. if grep -q 'pinentry-mode loopback' /home/$gpg_username/.gnupg/gpg.conf; then
  256. sed -i '/pinentry-mode loopback/d' /home/$gpg_username/.gnupg/gpg.conf
  257. fi
  258. if [ -f /home/$gpg_username/.gnupg/gpg-agent.conf ]; then
  259. rm /home/$gpg_username/.gnupg/gpg-agent.conf
  260. fi
  261. if [[ "$gpg_username" != "$USER" ]]; then
  262. su -c "echo RELOADAGENT | gpg-connect-agent" - $gpg_username
  263. else
  264. echo RELOADAGENT | gpg-connect-agent
  265. fi
  266. fi
  267. }
  268. function gpg_pubkey_from_email {
  269. key_owner_username=$1
  270. key_email_address=$2
  271. key_id=
  272. if [[ $key_owner_username != "root" ]]; then
  273. key_id=$(su -c "gpg --list-keys $key_email_address" - $key_owner_username | sed -n '2p' | sed 's/^[ \t]*//')
  274. # If the default key is specified within gpg.conf
  275. if [ -f /home/$key_owner_username/gpg.conf ]; then
  276. if grep -q "default-key" /home/$key_owner_username/gpg.conf; then
  277. default_gpg_key=$(cat /home/$key_owner_username/gpg.conf | grep "default-key")
  278. if [[ "$default_gpg_key" != *'#'* ]]; then
  279. default_gpg_key=$(cat /home/$key_owner_username/gpg.conf | grep "default-key" | awk -F ' ' '{print $2}')
  280. if [ ${#default_gpg_key} -gt 3 ]; then
  281. key_id=$(su -c "gpg --list-keys $default_gpg_key" - $key_owner_username | sed -n '2p' | sed 's/^[ \t]*//')
  282. fi
  283. fi
  284. fi
  285. fi
  286. else
  287. key_id=$(gpg --list-keys $key_email_address | sed -n '2p' | sed 's/^[ \t]*//')
  288. # If the default key is specified within gpg.conf
  289. if [ -f /root/gpg.conf ]; then
  290. if grep -q "default-key" /root/gpg.conf; then
  291. default_gpg_key=$(cat /root/gpg.conf | grep "default-key")
  292. if [[ "$default_gpg_key" != *'#'* ]]; then
  293. default_gpg_key=$(cat /root/gpg.conf | grep "default-key" | awk -F ' ' '{print $2}')
  294. if [ ${#default_gpg_key} -gt 3 ]; then
  295. key_id=$(gpg --list-keys $default_gpg_key | sed -n '2p' | sed 's/^[ \t]*//')
  296. fi
  297. fi
  298. fi
  299. fi
  300. fi
  301. echo $key_id
  302. }
  303. function enable_email_encryption_at_rest {
  304. for d in /home/*/ ; do
  305. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  306. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  307. if grep -q '#| /usr/bin/gpgit.pl' /home/$USERNAME/.procmailrc; then
  308. sed -i 's@#| /usr/bin/gpgit.pl@| /usr/bin/gpgit.pl@g' /home/$USERNAME/.procmailrc
  309. sed -i 's|#:0 f|:0 f|g' /home/$USERNAME/.procmailrc
  310. fi
  311. fi
  312. done
  313. if grep -q '#| /usr/bin/gpgit.pl' /etc/skel/.procmailrc; then
  314. sed -i 's@#| /usr/bin/gpgit.pl@| /usr/bin/gpgit.pl@g' /etc/skel/.procmailrc
  315. sed -i 's|#:0 f|:0 f|g' /etc/skel/.procmailrc
  316. fi
  317. }
  318. function disable_email_encryption_at_rest {
  319. for d in /home/*/ ; do
  320. USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
  321. if [[ $(is_valid_user "$USERNAME") == "1" ]]; then
  322. if ! grep -q '#| /usr/bin/gpgit.pl' /home/$USERNAME/.procmailrc; then
  323. sed -i 's@| /usr/bin/gpgit.pl@#| /usr/bin/gpgit.pl@g' /home/$USERNAME/.procmailrc
  324. sed -i 's|:0 f|#:0 f|g' /home/$USERNAME/.procmailrc
  325. fi
  326. fi
  327. done
  328. if ! grep -q '#| /usr/bin/gpgit.pl' /etc/skel/.procmailrc; then
  329. sed -i 's@| /usr/bin/gpgit.pl@#| /usr/bin/gpgit.pl@g' /etc/skel/.procmailrc
  330. sed -i 's|:0 f|#:0 f|g' /etc/skel/.procmailrc
  331. fi
  332. }
  333. # NOTE: deliberately no exit 0