2 # This should be sourced by bash (though we welcome changes to make it POSIX sh compliant)
4 # Monkeysphere authentication setup subcommand
6 # The monkeysphere scripts are written by:
7 # Jameson Rollins <jrollins@finestructure.net>
8 # Jamie McClelland <jm@mayfirst.org>
9 # Daniel Kahn Gillmor <dkg@fifthhorseman.net>
11 # They are Copyright 2009, and are all released under the GPL,
15 # make all needed directories
16 mkdir -p "${MADATADIR}"
17 mkdir -p "${MATMPDIR}"
18 mkdir -p "${GNUPGHOME_CORE}"
19 chmod 700 "${GNUPGHOME_CORE}"
20 mkdir -p "${GNUPGHOME_SPHERE}"
21 chmod 700 "${GNUPGHOME_SPHERE}"
22 mkdir -p "${MADATADIR}"/authorized_keys
24 # deliberately replace the config files via truncation
25 # FIXME: should we be dumping to tmp files and then moving atomically?
26 log debug "writing core gpg.conf..."
27 cat >"${GNUPGHOME_CORE}"/gpg.conf <<EOF
28 # Monkeysphere trust core GnuPG configuration
29 # This file is maintained by the Monkeysphere software.
30 # Edits will be overwritten.
32 list-options show-uid-validity
35 log debug "writing sphere gpg.conf..."
36 cat >"${GNUPGHOME_SPHERE}"/gpg.conf <<EOF
37 # Monkeysphere trust sphere GnuPG configuration
38 # This file is maintained by the Monkeysphere software.
39 # Edits will be overwritten.
41 list-options show-uid-validity
44 # make sure the monkeysphere user owns everything in the sphere
46 log debuf "fixing sphere gnupg home ownership..."
47 chown -R "$MONKEYSPHERE_USER" "${GNUPGHOME_SPHERE}"
48 chgrp -R "$MONKEYSPHERE_USER" "${GNUPGHOME_SPHERE}"
50 # get fingerprint of core key. this should be empty on unconfigured systems.
51 local CORE_FPR=$(core_fingerprint)
52 log debug "core fingerprint: $CORE_FPR"
54 if [ -z "$CORE_FPR" ] ; then
55 log info "setting up Monkeysphere authentication trust core..."
57 local CORE_UID=$(printf "Monkeysphere authentication trust core UID (random string: %s)" $(head -c21 </dev/urandom | base64))
59 log debug "generating monkeysphere authentication trust core key ($CORE_KEYLENGTH bits)..."
60 PEM2OPENPGP_USAGE_FLAGS=certify \
61 PEM2OPENPGP_NEWKEY=$CORE_KEYLENGTH pem2openpgp "$CORE_UID" \
63 || failure "Could not import new key for Monkeysphere authentication trust core"
65 # get fingerprint of core key. should definitely not be empty at this point
66 CORE_FPR=$(core_fingerprint)
67 log debug "core fingerprint: $CORE_FPR"
68 if [ -z "$CORE_FPR" ] ; then
69 failure "Failed to create Monkeysphere authentication trust core!"
73 log verbose "Monkeysphere authentication trust core already exists."
76 # export the core key to the sphere keyring
77 log debug "exporting core pub key to sphere keyring..."
78 gpg_core --export | gpg_sphere --import
80 # ensure that the authentication sphere checker has absolute ownertrust on the expected key.
81 log debug "setting ultimate owner trust on core key in gpg_sphere..."
82 printf "%s:6:\n" "$CORE_FPR" | gpg_sphere --import-ownertrust
83 gpg_sphere --export-ownertrust | log debug
85 # check the owner trust
86 log debug "checking gpg_sphere owner trust set properly..."
88 if ORIG_TRUST=$(gpg_sphere --export-ownertrust | grep '^[^#]') ; then
89 if [ "${CORE_FPR}:6:" != "$ORIG_TRUST" ] ; then
90 failure "Monkeysphere authentication trust sphere should explicitly trust the core. It does not have proper ownertrust settings."
93 failure "Could not get monkeysphere-authentication trust guidelines."
94 # FIXME: what does this mean? should we suggest how to fix?
97 # ensure that we're using the extended trust model (1), and that
98 # our preferences are reasonable (i.e. 3 marginal OR 1 fully
99 # trusted certifications are sufficient to grant full validity.
100 log debug "checking trust model for authentication ..."
101 local TRUST_MODEL=$(gpg_sphere "--with-colons --fixed-list-mode --list-keys" \
102 | head -n1 | grep "^tru:" | cut -d: -f3,6,7)
103 log debug "sphere trust model: $TRUST_MODEL"
104 if [ "$TRUST_MODEL" != '1:3:1' ] ; then
105 failure "monkeysphere-authentication does not have the expected trust model settings."
106 # FIXME: what does this mean? should we suggest how to fix?