2 # This should be sourced by bash (though we welcome changes to make it POSIX sh compliant)
4 # Monkeysphere authentication add-certifier subcommand
6 # This function adds a certifier whose signatures will be used to
7 # calculate validity of keys used to connect to user accounts on the
8 # server. The specified certifier key is first retrieved from the Web
9 # of Trust with the monkeysphere-user-controlled gpg_sphere keyring.
10 # Once then new key is retrieved, it is imported into the core
11 # keyring. The gpg_core then ltsigns the key with the desired trust
12 # level, and then the key is exported back to the gpg_sphere keyring.
13 # The gpg_sphere has ultimate owner trust of the core key, so the core
14 # ltsigs on the new certifier key can then be used by gpg_sphere
15 # calculate validity for keys inserted in the authorized_keys file.
17 # This is all to keep the monkeysphere user that connects to the
18 # keyservers from accessing the core secret key.
20 # The monkeysphere scripts are written by:
21 # Jameson Rollins <jrollins@finestructure.net>
22 # Jamie McClelland <jm@mayfirst.org>
23 # Daniel Kahn Gillmor <dkg@fifthhorseman.net>
25 # They are Copyright 2008-2009, and are all released under the GPL,
55 if [ "$(echo "$1" | cut -c 1)" = '-' ] ; then
56 failure "Unknown option '$1'.
57 Type '$PGRM help' for usage."
65 if [ -z "$keyID" ] ; then
66 failure "You must specify the key ID of a key to add, or specify a file to read the key from."
68 if [ -f "$keyID" ] ; then
69 log info "Reading key from file '$keyID':"
71 fingerprints=$(su_monkeysphere_user \
72 ". ${SYSSHAREDIR}/common; list_primary_fingerprints" < "$keyID")
74 if [ $(printf "%s" "$fingerprints" | egrep -c '^[A-F0-9]{40}$') -ne 1 ] ; then
75 failure "There was not exactly one gpg key in the file."
78 gpg_sphere "--import" < "$keyID" || failure "could not read key from '$keyID'"
82 # get the key from the key server
83 log debug "retrieving key from keyserver..."
84 gpg_sphere "--keyserver $KEYSERVER --recv-key '0x${keyID}!'" || failure "Could not receive a key with this ID from the '$KEYSERVER' keyserver."
89 # get the full fingerprint of new certifier key
90 log debug "getting fingerprint of certifier key..."
91 fingerprint=$(gpg_sphere "--list-key --with-colons --with-fingerprint 0x${keyID}!" \
92 | grep '^fpr:' | grep "$keyID" | cut -d: -f10)
94 if [ -z "$fingerprint" ] ; then
95 failure "Key '$keyID' not found."
99 gpg_sphere "--fingerprint 0x${fingerprint}!"
101 if [ "$PROMPT" = "true" ] ; then
102 echo "Are you sure you want to add the above key as a"
103 read -p "certifier of users on this system? (Y/n) " OK; OK=${OK:-Y}
104 if [ "${OK/y/Y}" != 'Y' ] ; then
105 failure "Identity certifier not added."
108 log debug "adding key without prompting."
111 # export the key to the core keyring so that the core can sign the
113 log debug "exporting retrieved certifier key to core keyring..."
114 gpg_sphere "--export 0x${fingerprint}!" | gpg_core --import
124 failure "Trust value requested ('$trust') was unclear (only 'marginal' or 'full' are supported)."
128 # edit-key script to ltsign key
129 # NOTE: *all* user IDs will be ltsigned
130 ltsignCommand=$(cat <<EOF
141 # core ltsigns the newly imported certifier key
142 log debug "executing core ltsign script..."
143 if echo "$ltsignCommand" | \
144 gpg_core --command-fd 0 --edit-key "0x${fingerprint}!" ; then
146 # transfer the new sigs back to the sphere keyring
147 gpg_core_sphere_sig_transfer
149 # update the sphere trustdb
150 log debug "updating sphere trustdb..."
151 gpg_sphere "--check-trustdb" 2>&1 | log debug
153 log info "Identity certifier added."
155 failure "Problem adding identify certifier."