#!/bin/sh # Copyright (c) 2007-2014 Douglas Barton, dougb@dougbarton.us # All rights reserved # Please see detailed copyright below # # Change these values to something meaningful for you # # The token is the "magic cookie" used to make sure that the message # recipient cannot fake the challenge response. It can be anything. token='' myemail='' myname='' # # Optional # # If not set, will be discovered dynamically #gpg= # In case your key is on the keyring. # Letters must be upper case, leave off the 0x, one per line. #keyids_to_skip='1234ABCD #87654321 #CDEF6789' # OR #keyids_to_skip='0A1B2C3D' # # Nothing below here needs to be changed, but improvements are always welcome # # Assumptions: # You have a keyring file that contains the keys you want to sign # OR # You have a keyid or list of keyids to sign # # The UIDs on each key will contain a valid e-mail address # You have a binary called 'sha256[sum]' that produces a useful hash # You have a binary called 'gpg[2]' from GnuPG -- more recent is better # You have a binary called 'sendmail' that takes the usual arguments # You are running this in a directory where you have write permissions # You are running this script on a "secure" system. That is, there are # some shortcuts taken (like not using mktemp) that one would not take # if running this script in a hostile environment. This may be improved # in a future version. # # There is no need to import the keys before running the script # # The challenges list is always appended to (in case you are doing keys # from more than one ring), so delete it first if you want a clean start. PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin export PATH usage () { cat << EOF >&2 Usage: ${0##*/} [-n] [-u ] [-y] |keyring.gpg -h Display this help message. -n Do not send e-mail, leave files locally for review -u Key Id to sign messages with, if other than the default -y Send messages for all uids of all keys Required input can be an individual key, or a keyring file. If the file is not located in \$GNUPGHOME (usually ~/.gnupg) specify the full path. EOF } fail () { $echo "\nERROR: $*" >&2 ; usage ; exit 1 ; } [ -z "$token" -o -z "$myemail" -o -z "$myname" ] && fail 'You forgot to set the custom values in the script!' if [ -z "$gpg" ]; then for dir in `echo $PATH | sed 's#:# #g'`; do if [ -x "${dir}/gpg2" ]; then gpg="${dir}/gpg2" break fi done fi if [ -z "$gpg" ]; then for dir in `echo $PATH | sed 's#:# #g'`; do if [ -x "${dir}/gpg" ]; then gpg="${dir}/gpg" break fi done fi [ -n "$gpg" ] || fail "I cannot find a gpg[2] binary in $PATH" case `uname -s` in Linux) echo=echo ; alias sha=sha256sum if [ -x /usr/bin/shred ]; then delete='/usr/bin/shred -uz' else delete=/bin/rm fi ;; FreeBSD) echo='echo -e' ; alias sha=sha256 ; delete='/bin/rm -P' ;; Darwin) echo='echo' ; alias sha='shasum -a 256' ; delete='/bin/rm -P' ;; esac while getopts 'hnu:y' cla ; do case "$cla" in h) usage ; exit 0 ;; n) nomail=nomail ;; u) uo='-u' ; uv="0x${OPTARG#0[Xx]}" ; shift ;; y) sign_every_uid=sign_every_uid ;; *) fail 'Unknown option' ;; esac shift done [ -n "$1" ] || fail 'I need a PGP keyring or key ID to work with!' if [ -r "$1" -o -r "${GNUPGHOME}/$1" ]; then ko='--keyring' ; kv="$1" list=`$gpg --no-options --no-default-keyring $ko $kv --fixed-list-mode --with-colons --list-keys` else for key in "$@"; do keylist="$keylist 0x${key#0[Xx]}" done list=`$gpg --fixed-list-mode --with-colons --list-keys $keylist` fi longdate=`date` date=`date +%Y%m%d` challenges_file="challenges-${date}" [ -e "$challenges_file" ] && echo '' >> $challenges_file echo $longdate >> $challenges_file echo "Token: $token" >> $challenges_file echo '' >> $challenges_file # Because uids have spaces IFS=' ' for line in $list; do case "$line" in pub*) unset skip keyid=`echo $line | cut -f5 -d:` skeyid="${keyid#[0-9A-F][0-9A-F][0-9A-F][0-9A-F][0-9A-F][0-9A-F][0-9A-F][0-9A-F]}" for k in $keyids_to_skip; do if [ "$k" = "$skeyid" ]; then $echo "\nKeyid $skeyid is in the list of keys to skip" echo '===============================================' skip=skip ; continue 2 fi done case "$line" in pub:e:*) $echo "\nKeyid $skeyid has expired" echo '===============================================' skip=skip_expired ; continue ;; pub:r:*) $echo "\nKeyid $skeyid has been revoked" echo '===============================================' skip=skip_revoked ; continue ;; esac caps=`echo $line | cut -f12 -d:` $echo "\nKeyid $skeyid has capabilities: $caps" echo '===============================================' ;; uid*) [ -n "$skip" ] && continue # Deal with UIDs that have colons in them uid=`echo $line | cut -f10- -d:` ; uid="${uid%:}" $echo "\n uid: $uid\n" case "$line" in uid:e:*) echo 'EXPIRED -- skipping' continue ;; uid:r:*) echo 'REVOKED -- skipping' continue ;; *\<*@*\>*) ;; # The uid has an e-mail address, Ok to proceed *) echo 'NO E-MAIL ADDRESS -- skipping' continue ;; esac if [ -z "$sign_every_uid" ]; then echo ' Prepare a challenge for this user id? y/n [y] \c' read ANSWER case "$ANSWER" in [Nn]*) echo '' echo "Skipping keyid: $skeyid uid: $uid" echo '' continue ;; esac else echo ' Preparing a challenge for this user id' fi email=${uid##*<} ; email=${email%%>*} challenge=`echo $token $longdate $keyid $uid | sha` [ $? -gt 1 ] && fail 'Generation of challenge failed' echo '' echo "$skeyid $uid ${challenge%% *}" >> $challenges_file body="cm-${skeyid}-${email}-body-$date" head="cm-${skeyid}-${email}-head-$date" cat << EOF > $body PGP Key signing challenge message for: $uid For key with ID 0x$skeyid Challenge String: ${challenge%% *} In order to feel most comfortable signing your key I prefer to first send you a message with a challenge string in it, encrypted if your key supports that, and then ask you to send back a reply signed by the key with the ID mentioned above that includes the challenge string for each PGP UID you would like me to sign. The easiest way to proceed is probably as follows: 1. If you have more than one UID on this key gather the challenge strings sent to each of the UIDs on this key. You can return them all in one message. 2. Sign the reply message using this key (ID 0x${skeyid}). 3. I will then sign your key and send it to you. If you have more than one key that you would like me to sign repeat the process for each of them. That is, please send separate messages, each signed by the relevant key. The reason I like to use this procedure is that in modern PGP (most notably in software that follows the OpenPGP standard, including GnuPG) the encryption and signing subkeys are usually different, and can be separately managed. This is why I prefer to send an encrypted challenge where possible, and ask that you sign the reply. Regards, $myname Source for the script that generated this message can be found at: https://dougbarton.us/PGP/ EOF case "$caps" in *E*) $gpg $ko $kv --armor --sign $uo $uv --encrypt -r $keyid \ --trust-model always $body && eval $delete $body ;; *) $gpg $ko $kv --armor --clearsign $uo $uv $body && eval $delete $body ;; esac [ -n "$nomail" ] && continue cat << EOF > $head To: $email Bcc: $myemail Subject: PGP challenge message for $uid EOF if [ -r "$head" -a -r "${body}.asc" ]; then cat $head ${body}.asc | sendmail -oi -f $myemail -t && eval $delete $head ${body}* echo "Sent mail to: $email" >> $challenges_file echo '' >> $challenges_file else fail 'Creation of the e-mail body and/or headers failed!' fi ;; esac # End of 'case uid*)' done exit 0 # Copyright (c) 2007-2014 Douglas Barton # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # # THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF # SUCH DAMAGE. # $Id: gen_challenges,v 1.28 2014/10/13 08:46:30 doug Exp $