2015-07-04 17:24:18 +02:00
|
|
|
#!/bin/bash
|
|
|
|
#
|
|
|
|
# .---. . .
|
|
|
|
# | | |
|
|
|
|
# |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
|
|
|
|
# | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
|
|
|
|
# ' ' --' --' -' - -' ' ' -' -' -' ' - --'
|
|
|
|
#
|
|
|
|
# Freedom in the Cloud
|
|
|
|
#
|
|
|
|
# Makes a USB drive containing a gpg key fragment
|
|
|
|
#
|
|
|
|
# License
|
|
|
|
# =======
|
|
|
|
#
|
2017-06-23 19:44:54 +02:00
|
|
|
# Copyright (C) 2015-2017 Bob Mottram <bob@freedombone.net>
|
2015-07-04 17:24:18 +02:00
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
2016-02-13 23:09:27 +01:00
|
|
|
# it under the terms of the GNU Affero General Public License as published by
|
2015-07-04 17:24:18 +02:00
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2016-02-13 23:09:27 +01:00
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU Affero General Public License for more details.
|
2015-07-04 17:24:18 +02:00
|
|
|
#
|
2016-02-13 23:09:27 +01:00
|
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2015-07-04 17:24:18 +02:00
|
|
|
|
2015-11-27 12:42:16 +01:00
|
|
|
PROJECT_NAME='freedombone'
|
|
|
|
|
2015-11-27 17:52:23 +01:00
|
|
|
export TEXTDOMAIN=${PROJECT_NAME}-keydrive
|
2015-11-27 12:42:16 +01:00
|
|
|
export TEXTDOMAINDIR="/usr/share/locale"
|
2015-07-04 17:24:18 +02:00
|
|
|
|
|
|
|
USB_DRIVE=/dev/sdb1
|
|
|
|
USB_MOUNT=/mnt/usb
|
2015-09-29 13:37:02 +02:00
|
|
|
KEY_FRAGMENTS=3
|
2015-07-04 17:24:18 +02:00
|
|
|
FRAGMENTS_DIR=$USB_MOUNT/.gnupg_fragments
|
|
|
|
MY_USERNAME=$USER
|
|
|
|
MASTER_DRIVE="no"
|
2015-11-04 20:58:47 +01:00
|
|
|
FORMAT="no"
|
2015-07-04 17:24:18 +02:00
|
|
|
|
|
|
|
function show_help {
|
|
|
|
echo ''
|
2015-12-08 17:22:48 +01:00
|
|
|
echo $"${PROJECT_NAME}-keydrive -u [username] -d [device, eg. sdb] --master [yes/no] -n [no of fragments] --format [yes/no]"
|
2015-07-04 17:24:18 +02:00
|
|
|
echo ''
|
|
|
|
exit 0
|
|
|
|
}
|
|
|
|
|
|
|
|
while [[ $# > 1 ]]
|
|
|
|
do
|
2017-06-23 19:44:54 +02:00
|
|
|
key="$1"
|
2015-07-04 17:24:18 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
case $key in
|
|
|
|
-h|--help)
|
|
|
|
show_help
|
|
|
|
;;
|
|
|
|
-u|--user)
|
|
|
|
shift
|
|
|
|
MY_USERNAME="$1"
|
|
|
|
;;
|
|
|
|
-d|--dev)
|
|
|
|
shift
|
|
|
|
if [[ "${1}" != '/dev/'* ]]; then
|
|
|
|
USB_DRIVE=/dev/${1}1
|
|
|
|
else
|
|
|
|
USB_DRIVE=${1}
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
-m|--master)
|
|
|
|
shift
|
|
|
|
MASTER_DRIVE="$1"
|
|
|
|
;;
|
|
|
|
-n|--fragments)
|
|
|
|
shift
|
|
|
|
KEY_FRAGMENTS=$1
|
|
|
|
;;
|
|
|
|
-f|--format)
|
|
|
|
shift
|
|
|
|
FORMAT="yes"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
# unknown option
|
|
|
|
;;
|
|
|
|
esac
|
2015-07-04 17:24:18 +02:00
|
|
|
shift
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ ! $MY_USERNAME ]; then
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $'No username given'
|
2015-07-04 17:24:18 +02:00
|
|
|
exit 69350
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! -d /home/$MY_USERNAME ]; then
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $"Home directory for $MY_USERNAME not found. This user may not exist on the system"
|
2015-07-04 17:24:18 +02:00
|
|
|
exit 72378
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ! -b $USB_DRIVE ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
echo $'Please attach a USB drive'
|
|
|
|
exit 65743
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
umount -f $USB_MOUNT
|
|
|
|
if [ ! -d $USB_MOUNT ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
mkdir $USB_MOUNT
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
if [ -f /dev/mapper/encrypted_usb ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
rm -rf /dev/mapper/encrypted_usb
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
cryptsetup luksClose encrypted_usb
|
2015-11-04 20:58:47 +01:00
|
|
|
|
|
|
|
# optionally format the drive
|
|
|
|
if [[ $FORMAT == "yes" ]]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
${PROJECT_NAME}-format ${USB_DRIVE::-1}
|
|
|
|
if [ ! "$?" = "0" ]; then
|
|
|
|
exit 36823
|
|
|
|
fi
|
2015-11-04 20:58:47 +01:00
|
|
|
fi
|
|
|
|
|
2015-07-04 17:24:18 +02:00
|
|
|
cryptsetup luksOpen $USB_DRIVE encrypted_usb
|
|
|
|
if [ "$?" = "0" ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
USB_DRIVE=/dev/mapper/encrypted_usb
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
2015-07-04 17:31:59 +02:00
|
|
|
mount $USB_DRIVE $USB_MOUNT
|
2015-07-04 17:24:18 +02:00
|
|
|
if [ ! "$?" = "0" ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
echo $"There was a problem mounting the USB drive to $USB_MOUNT"
|
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 78543
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
# optionally create a master drive which contains the full GPG keyring
|
|
|
|
if [[ $MASTER_DRIVE == "yes" || $MASTER_DRIVE == "y" || $MASTER_DRIVE == "1" ]]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
if [ ! -d /home/$MY_USERNAME/.gnupg ]; then
|
|
|
|
echo $"No .gnupg directory was found for $MY_USERNAME"
|
|
|
|
umount -f $USB_MOUNT
|
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 73025
|
|
|
|
fi
|
2017-06-23 16:17:49 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
# export the gpg key and backup key as text
|
|
|
|
# so that it may be imported at the beginning of new installs
|
|
|
|
GPG_TTY=$(tty)
|
|
|
|
export GPG_TTY
|
2017-06-23 18:01:55 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
USER_EMAIL_ADDRESS=$MY_USERNAME@$HOSTNAME
|
|
|
|
GPG_ID=$(su -m root -c "gpg --list-keys $USER_EMAIL_ADDRESS | sed -n '2p' | sed 's/^[ \t]*//'" - $MY_USERNAME)
|
|
|
|
GPG_BACKUP_ID=$(su -m root -c "gpg --list-keys \"(backup key)\" | sed -n '2p' | sed 's/^[ \t]*//'" - $MY_USERNAME)
|
2017-06-23 16:17:49 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
gpgerrstr=$'error'
|
|
|
|
gpgkey=$(gpg --homedir=/home/$MY_USERNAME/.gnupg --armor --export $GPG_ID)
|
|
|
|
if [[ "$gpgkey" == *"$gpgerrstr"* ]]; then
|
|
|
|
echo $'Problem exporting public gpg key'
|
|
|
|
echo "$gpgkey"
|
|
|
|
exit 735282
|
|
|
|
fi
|
|
|
|
echo ''
|
|
|
|
echo $'Enter your gpg private key passphrase:'
|
|
|
|
gpgprivkey=$(gpg --homedir=/home/$MY_USERNAME/.gnupg --armor --export-secret-key $GPG_ID)
|
|
|
|
if [[ "$gpgprivkey" == *"$gpgerrstr"* ]]; then
|
|
|
|
echo $'Problem exporting private gpg key'
|
|
|
|
echo "$gpgprivkey"
|
|
|
|
gpgprivkey=
|
|
|
|
exit 629362
|
|
|
|
fi
|
2017-06-23 16:17:49 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
# Dummy password to get around not being able to create a key without passphrase
|
|
|
|
BACKUP_DUMMY_PASSWORD='backup'
|
2017-06-23 19:18:08 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
backupgpgkey=$(gpg --homedir=/home/$MY_USERNAME/.gnupg --armor --export $GPG_BACKUP_ID)
|
|
|
|
if [[ "$backupgpgkey" == *"$gpgerrstr"* ]]; then
|
|
|
|
echo $'Problem exporting public gpg backup key'
|
|
|
|
echo "$backupgpgkey"
|
|
|
|
exit 735282
|
|
|
|
fi
|
|
|
|
backupgpgprivkey=$(echo "$BACKUP_DUMMY_PASSWORD" | gpg --batch --passphrase-fd 0 --homedir=/home/$MY_USERNAME/.gnupg --armor --export-secret-key $GPG_BACKUP_ID)
|
|
|
|
if [[ "$backupgpgprivkey" == *"$gpgerrstr"* ]]; then
|
|
|
|
echo $'Problem exporting private gpg backup key'
|
|
|
|
echo "$backupgpgprivkey"
|
|
|
|
backupgpgprivkey=
|
|
|
|
exit 629362
|
|
|
|
fi
|
2017-06-23 16:17:49 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
echo "$gpgkey" > $USB_MOUNT/.mastergpgkey
|
|
|
|
echo "$gpgprivkey" >> $USB_MOUNT/.mastergpgkey
|
|
|
|
echo "$backupgpgkey" > $USB_MOUNT/.backupgpgkey
|
|
|
|
echo "$backupgpgprivkey" >> $USB_MOUNT/.backupgpgkey
|
2017-06-23 16:17:49 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
cp -rf /home/$MY_USERNAME/.gnupg $USB_MOUNT
|
2017-06-23 16:17:49 +02:00
|
|
|
|
2017-06-23 19:44:54 +02:00
|
|
|
if [ -d /etc/letsencrypt ]; then
|
|
|
|
cp -rf /etc/letsencrypt $USB_MOUNT
|
|
|
|
echo $"LetsEncrypt keys copied to $USB_DRIVE"
|
|
|
|
fi
|
|
|
|
if [ -d $USB_MOUNT/.gnupg ]; then
|
|
|
|
echo $"GPG Keyring copied to $USB_DRIVE. You may now remove the drive."
|
|
|
|
else
|
|
|
|
echo $"Unable to copy gpg keyring to $USB_DRIVE"
|
|
|
|
fi
|
|
|
|
umount -f $USB_MOUNT
|
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 0
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
|
2015-09-29 13:59:09 +02:00
|
|
|
# Don't use the USB drive if it already contains a full keyring
|
|
|
|
if [ -d $USB_MOUNT/.gnupg ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
echo $'A full GPG keyring already exists on the USB drive.'
|
|
|
|
echo $'Either reformat the USB drive or use a different drive.'
|
|
|
|
umount -f $USB_MOUNT
|
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 3392
|
2015-09-29 13:59:09 +02:00
|
|
|
fi
|
|
|
|
|
2015-07-04 17:24:18 +02:00
|
|
|
# Append the username as a subdirectory.
|
|
|
|
# This has a down side in that it does identify a given fragment
|
|
|
|
# as belonging to a given user, but has the convenience upside
|
|
|
|
# of being able to carry key fragments for multiple friends on
|
|
|
|
# the same USB drive
|
|
|
|
FRAGMENTS_DIR=$FRAGMENTS_DIR/$MY_USERNAME
|
|
|
|
|
|
|
|
# make a directory to contain the fragments
|
|
|
|
if [ ! -d $FRAGMENTS_DIR ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
mkdir -p $FRAGMENTS_DIR
|
|
|
|
echo $"Made directory $FRAGMENTS_DIR"
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
if [ ! -d $FRAGMENTS_DIR ]; then
|
2017-06-23 19:44:54 +02:00
|
|
|
echo $"There was a problem making the directory $FRAGMENTS_DIR"
|
|
|
|
umount -f $USB_MOUNT
|
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 6843
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
|
2015-07-04 18:20:44 +02:00
|
|
|
cd $FRAGMENTS_DIR
|
|
|
|
no_of_usb_shares=$(ls -afq keyshare.asc.* | wc -l)
|
2015-07-04 17:49:22 +02:00
|
|
|
if [ ! "$?" = "0" ]; then
|
|
|
|
no_of_usb_shares=0
|
|
|
|
fi
|
2015-07-04 17:56:03 +02:00
|
|
|
if (( no_of_usb_shares > 0 )); then
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $"A key fragment already exists on the drive for the user $MY_USERNAME"
|
2015-07-05 11:45:00 +02:00
|
|
|
cd ~/
|
|
|
|
umount -f $USB_MOUNT
|
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 58945
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
# copy a random fragment to the drive
|
|
|
|
LOCAL_FRAGMENTS_DIR=/home/$MY_USERNAME/.gnupg_fragments
|
|
|
|
|
|
|
|
if [ ! -d $LOCAL_FRAGMENTS_DIR ]; then
|
2015-12-08 17:22:48 +01:00
|
|
|
${PROJECT_NAME}-splitkey -u $MY_USERNAME -n $KEY_FRAGMENTS
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
|
2015-07-04 18:20:44 +02:00
|
|
|
cd $LOCAL_FRAGMENTS_DIR
|
|
|
|
no_of_local_shares=$(ls -afq keyshare.asc.* | wc -l)
|
2015-07-04 17:49:22 +02:00
|
|
|
if [ ! "$?" = "0" ]; then
|
|
|
|
no_of_local_shares=0
|
|
|
|
fi
|
2015-07-04 17:56:03 +02:00
|
|
|
if (( no_of_local_shares < 3 )); then
|
2015-12-08 17:22:48 +01:00
|
|
|
${PROJECT_NAME}-splitkey -u $MY_USERNAME -n $KEY_FRAGMENTS
|
2015-07-05 11:23:34 +02:00
|
|
|
cd $LOCAL_FRAGMENTS_DIR
|
2015-07-04 18:20:44 +02:00
|
|
|
no_of_local_shares=$(ls -afq keyshare.asc.* | wc -l)
|
2015-07-04 17:49:22 +02:00
|
|
|
if [ ! "$?" = "0" ]; then
|
|
|
|
no_of_local_shares=0
|
|
|
|
fi
|
2015-07-04 17:24:18 +02:00
|
|
|
fi
|
|
|
|
|
2015-07-04 17:56:03 +02:00
|
|
|
if (( no_of_local_shares < 3 )); then
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $"Not enough key fragments available ${no_of_local_shares}"
|
2015-07-05 11:45:00 +02:00
|
|
|
cd ~/
|
2015-07-04 18:24:56 +02:00
|
|
|
umount -f $USB_MOUNT
|
2015-07-04 17:24:18 +02:00
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 63386
|
|
|
|
fi
|
|
|
|
|
|
|
|
share_files=($LOCAL_FRAGMENTS_DIR/keyshare.asc.*)
|
2015-07-04 18:05:06 +02:00
|
|
|
SHARE_FILENAME=${share_files[RANDOM % ${#share_files[@]}]}
|
2015-07-04 17:24:18 +02:00
|
|
|
|
|
|
|
cp -f $SHARE_FILENAME $FRAGMENTS_DIR
|
2015-07-04 18:20:44 +02:00
|
|
|
cd $FRAGMENTS_DIR
|
|
|
|
no_of_usb_shares=$(ls -afq keyshare.asc.* | wc -l)
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $"Number of fragments on the drive: ${no_of_usb_shares}"
|
2015-07-04 18:20:44 +02:00
|
|
|
if (( no_of_usb_shares > 1 )); then
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $"Too many key fragments exist in $FRAGMENTS_DIR"
|
2015-07-04 18:20:44 +02:00
|
|
|
ls $FRAGMENTS_DIR
|
2015-07-05 11:23:34 +02:00
|
|
|
cd ~/
|
2015-07-04 18:24:56 +02:00
|
|
|
umount -f $USB_MOUNT
|
2015-07-04 18:20:44 +02:00
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 54292
|
|
|
|
fi
|
|
|
|
if (( no_of_usb_shares <= 0 )); then
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $"There was a problem copying the key fragment to $USB_DRIVE"
|
|
|
|
echo $"Files found: ${no_of_usb_shares}"
|
2015-07-04 18:07:17 +02:00
|
|
|
ls $FRAGMENTS_DIR
|
2015-07-05 11:23:34 +02:00
|
|
|
cd ~/
|
2015-07-04 18:24:56 +02:00
|
|
|
umount -f $USB_MOUNT
|
2015-07-04 17:24:18 +02:00
|
|
|
rm -rf $USB_MOUNT
|
|
|
|
exit 54292
|
|
|
|
fi
|
2015-07-05 11:45:00 +02:00
|
|
|
|
2015-07-05 11:23:34 +02:00
|
|
|
cd ~/
|
2015-07-04 18:24:56 +02:00
|
|
|
umount -f $USB_MOUNT
|
2015-07-04 17:24:18 +02:00
|
|
|
rm -rf $USB_MOUNT
|
2015-11-27 16:29:43 +01:00
|
|
|
echo $"Key fragment copied to $USB_DRIVE. You may now remove the drive."
|
2015-07-04 17:24:18 +02:00
|
|
|
|
|
|
|
exit 0
|