2 # This should be sourced by bash (though we welcome changes to make it POSIX sh compliant)
4 # Monkeysphere authentication setup subcommand
6 # The monkeysphere scripts are written by:
7 # Jameson Rollins <jrollins@finestructure.net>
8 # Jamie McClelland <jm@mayfirst.org>
9 # Daniel Kahn Gillmor <dkg@fifthhorseman.net>
11 # They are Copyright 2009, and are all released under the GPL,
15 # make all needed directories
16 mkdir -p "${MADATADIR}"
17 mkdir -p "${MATMPDIR}"
18 mkdir -p "${GNUPGHOME_CORE}"
19 chmod 700 "${GNUPGHOME_CORE}"
20 mkdir -p "${GNUPGHOME_SPHERE}"
21 chmod 700 "${GNUPGHOME_SPHERE}"
22 mkdir -p "${SYSDATADIR}"/authorized_keys
24 # deliberately replace the config files via truncation
25 # FIXME: should we be dumping to tmp files and then moving atomically?
26 log debug "writing core gpg.conf..."
27 cat >"${GNUPGHOME_CORE}"/gpg.conf <<EOF
28 # Monkeysphere trust core GnuPG configuration
29 # This file is maintained by the Monkeysphere software.
30 # Edits will be overwritten.
34 log debug "writing sphere gpg.conf..."
35 cat >"${GNUPGHOME_SPHERE}"/gpg.conf <<EOF
36 # Monkeysphere trust sphere GnuPG configuration
37 # This file is maintained by the Monkeysphere software.
38 # Edits will be overwritten.
40 list-options show-uid-validity
43 # make sure the monkeysphere user owns everything in the sphere
45 log debuf "fixing sphere gnupg home ownership..."
46 chown -R "$MONKEYSPHERE_USER" "${GNUPGHOME_SPHERE}"
47 chgrp -R "$MONKEYSPHERE_USER" "${GNUPGHOME_SPHERE}"
49 # get fingerprint of core key. this should be empty on unconfigured systems.
50 local CORE_FPR=$(core_fingerprint)
51 log debug "core fingerprint: $CORE_FPR"
53 if [ -z "$CORE_FPR" ] ; then
54 log info "setting up Monkeysphere authentication trust core..."
56 local CORE_UID=$(printf "Monkeysphere authentication trust core UID (random string: %s)" $(head -c21 </dev/urandom | base64))
58 log debug "generating monkeysphere authentication trust core key ($CORE_KEYLENGTH bits)..."
59 PEM2OPENPGP_USAGE_FLAGS=certify \
60 PEM2OPENPGP_NEWKEY=$CORE_KEYLENGTH pem2openpgp "$CORE_UID" \
62 || failure "Could not import new key for Monkeysphere authentication trust core"
64 # get fingerprint of core key. should definitely not be empty at this point
65 CORE_FPR=$(core_fingerprint)
66 log debug "core fingerprint: $CORE_FPR"
67 if [ -z "$CORE_FPR" ] ; then
68 failure "Failed to create Monkeysphere authentication trust core!"
72 log verbose "Monkeysphere authentication trust core already exists."
75 # export the core key to the sphere keyring
76 log debug "exporting core pub key to sphere keyring..."
77 gpg_core --export | gpg_sphere "--import"
79 # ensure that the authentication sphere checker has absolute ownertrust on the expected key.
80 log debug "setting ultimate owner trust on core key in gpg_sphere..."
81 printf "%s:6:\n" "$CORE_FPR" | gpg_sphere "--import-ownertrust"
82 gpg_sphere "--export-ownertrust" 2>&1 | log debug
84 # check the owner trust
85 log debug "checking gpg_sphere owner trust set properly..."
87 if ORIG_TRUST=$(gpg_sphere "--export-ownertrust" | grep '^[^#]') ; then
88 if [ "${CORE_FPR}:6:" != "$ORIG_TRUST" ] ; then
89 failure "Monkeysphere authentication trust sphere should explicitly trust the core. It does not have proper ownertrust settings."
92 failure "Could not get monkeysphere-authentication trust guidelines."
93 # FIXME: what does this mean? should we suggest how to fix?
96 # ensure that we're using the extended trust model (1), and that
97 # our preferences are reasonable (i.e. 3 marginal OR 1 fully
98 # trusted certifications are sufficient to grant full validity.
99 log debug "checking trust model for authentication ..."
100 local TRUST_MODEL=$(gpg_sphere "--with-colons --fixed-list-mode --list-keys" \
101 | head -n1 | grep "^tru:" | cut -d: -f3,6,7)
102 log debug "sphere trust model: $TRUST_MODEL"
103 if [ "$TRUST_MODEL" != '1:3:1' ] ; then
104 failure "monkeysphere-authentication does not have the expected trust model settings."
105 # FIXME: what does this mean? should we suggest how to fix?