2 # This should be sourced by bash (though we welcome changes to make it POSIX sh compliant)
4 # Monkeysphere authentication setup subcommand
6 # The monkeysphere scripts are written by:
7 # Jameson Rollins <jrollins@finestructure.net>
8 # Jamie McClelland <jm@mayfirst.org>
9 # Daniel Kahn Gillmor <dkg@fifthhorseman.net>
11 # They are Copyright 2009, and are all released under the GPL,
15 # make all needed directories
16 mkdir -p "${MADATADIR}"
17 mkdir -p "${MATMPDIR}"
18 mkdir -p "${GNUPGHOME_CORE}"
19 chmod 700 "${GNUPGHOME_CORE}"
20 mkdir -p "${GNUPGHOME_SPHERE}"
21 chmod 700 "${GNUPGHOME_SPHERE}"
22 mkdir -p "${SYSDATADIR}"/authorized_keys
24 # deliberately replace the config files via truncation
25 # FIXME: should we be dumping to tmp files and then moving atomically?
26 log debug "writing core gpg.conf..."
27 cat >"${GNUPGHOME_CORE}"/gpg.conf <<EOF
28 # Monkeysphere trust core GnuPG configuration
29 # This file is maintained by the Monkeysphere software.
30 # Edits will be overwritten.
34 log debug "writing sphere gpg.conf..."
35 cat >"${GNUPGHOME_SPHERE}"/gpg.conf <<EOF
36 # Monkeysphere trust sphere GnuPG configuration
37 # This file is maintained by the Monkeysphere software.
38 # Edits will be overwritten.
40 list-options show-uid-validity
43 # make sure the monkeysphere user owns everything in the sphere
45 log debug "fixing sphere gnupg home ownership..."
46 chown "$MONKEYSPHERE_USER:$MONKEYSPHERE_USER" "${GNUPGHOME_SPHERE}" "${GNUPGHOME_SPHERE}"/gpg.conf
48 # get fingerprint of core key. this should be empty on unconfigured systems.
49 local CORE_FPR=$(core_fingerprint)
50 log debug "core fingerprint: $CORE_FPR"
52 if [ -z "$CORE_FPR" ] ; then
53 log info "setting up Monkeysphere authentication trust core..."
55 local CORE_UID=$(printf "Monkeysphere authentication trust core UID (random string: %s)" $(head -c21 </dev/urandom | base64))
57 log debug "generating monkeysphere authentication trust core key ($CORE_KEYLENGTH bits)..."
58 PEM2OPENPGP_USAGE_FLAGS=certify \
59 PEM2OPENPGP_NEWKEY=$CORE_KEYLENGTH pem2openpgp "$CORE_UID" \
61 || failure "Could not import new key for Monkeysphere authentication trust core"
63 # get fingerprint of core key. should definitely not be empty at this point
64 CORE_FPR=$(core_fingerprint)
65 log debug "core fingerprint: $CORE_FPR"
66 if [ -z "$CORE_FPR" ] ; then
67 failure "Failed to create Monkeysphere authentication trust core!"
71 log verbose "Monkeysphere authentication trust core already exists."
74 # export the core key to the sphere keyring
75 log debug "exporting core pub key to sphere keyring..."
76 gpg_core --export | gpg_sphere "--import"
78 # ensure that the authentication sphere checker has absolute ownertrust on the expected key.
79 log debug "setting ultimate owner trust on core key in gpg_sphere..."
80 printf "%s:6:\n" "$CORE_FPR" | gpg_sphere "--import-ownertrust"
81 gpg_sphere "--export-ownertrust" 2>&1 | log debug
83 # check the owner trust
84 log debug "checking gpg_sphere owner trust set properly..."
86 if ORIG_TRUST=$(gpg_sphere "--export-ownertrust" | grep '^[^#]') ; then
87 if [ "${CORE_FPR}:6:" != "$ORIG_TRUST" ] ; then
88 failure "Monkeysphere authentication trust sphere should explicitly trust the core. It does not have proper ownertrust settings."
91 failure "Could not get monkeysphere-authentication trust guidelines."
92 # FIXME: what does this mean? should we suggest how to fix?
95 # ensure that we're using the extended trust model (1), and that
96 # our preferences are reasonable (i.e. 3 marginal OR 1 fully
97 # trusted certifications are sufficient to grant full validity.
98 log debug "checking trust model for authentication ..."
99 local TRUST_MODEL=$(gpg_sphere "--with-colons --fixed-list-mode --list-keys" \
100 | head -n1 | grep "^tru:" | cut -d: -f3,6,7)
101 log debug "sphere trust model: $TRUST_MODEL"
102 if [ "$TRUST_MODEL" != '1:3:1' ] ; then
103 failure "monkeysphere-authentication does not have the expected trust model settings."
104 # FIXME: what does this mean? should we suggest how to fix?