Compare commits
3 Commits
083eb16b39
...
723194fdd7
Author | SHA1 | Date |
---|---|---|
|
723194fdd7 | |
|
db19b30bfe | |
|
0243212c80 |
|
@ -87,6 +87,7 @@ impl From<&SeedSize> for usize {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Clone, Debug, thiserror::Error)]
|
#[derive(Clone, Debug, thiserror::Error)]
|
||||||
pub enum MnemonicSeedSourceParseError {
|
pub enum MnemonicSeedSourceParseError {
|
||||||
#[error("Expected one of system, playing, tarot, dice")]
|
#[error("Expected one of system, playing, tarot, dice")]
|
||||||
|
@ -143,6 +144,18 @@ impl MnemonicSeedSource {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// An error occurred while performing an operation.
|
||||||
|
#[derive(thiserror::Error, Debug)]
|
||||||
|
pub enum Error {
|
||||||
|
/// An error occurred when interacting iwth a file.
|
||||||
|
#[error("Error while performing IO operation on: {1}")]
|
||||||
|
IOContext(#[source] std::io::Error, PathBuf),
|
||||||
|
}
|
||||||
|
|
||||||
|
fn context_stub<'a>(path: &'a Path) -> impl Fn(std::io::Error) -> Error + 'a {
|
||||||
|
|e| Error::IOContext(e, path.to_path_buf())
|
||||||
|
}
|
||||||
|
|
||||||
#[derive(Subcommand, Clone, Debug)]
|
#[derive(Subcommand, Clone, Debug)]
|
||||||
pub enum MnemonicSubcommands {
|
pub enum MnemonicSubcommands {
|
||||||
/// Generate a mnemonic using a given entropy source.
|
/// Generate a mnemonic using a given entropy source.
|
||||||
|
@ -206,19 +219,23 @@ pub enum MnemonicSubcommands {
|
||||||
/// `--provision openpgp-card` or another relevant provisioner, to ensure the newly
|
/// `--provision openpgp-card` or another relevant provisioner, to ensure the newly
|
||||||
/// generated mnemonic would be decryptable by some form of provisioned hardware.
|
/// generated mnemonic would be decryptable by some form of provisioned hardware.
|
||||||
///
|
///
|
||||||
/// When given arguments in the format `--encrypt-to-self output.asc,output=encrypted.asc`,
|
/// When given arguments in the format `--encrypt-to-self encrypted.asc,output=cert.asc`,
|
||||||
/// the output of the OpenPGP certificate will be written to `output.asc`, while the output
|
/// the output of the OpenPGP certificate will be written to `cert.asc`, while the output
|
||||||
/// of the encryption will be written to `encrypted.asc`. Otherwise, the
|
/// of the encryption will be written to `encrypted.asc`. Otherwise, the
|
||||||
/// default behavior is to write the encrypted mnemonic to `output.enc.asc`. If either
|
/// default behavior is to write the certificate to a file named after the certificate's
|
||||||
/// output file already exists, it will not be overwritten, and the command will exit
|
/// fingerprint. If either output file already exists, it will not be overwritten, and the
|
||||||
/// unsuccessfully.
|
/// command will exit unsuccessfully. This functionality must happen regardless if a
|
||||||
|
/// provisioner output is specified, as the certificate is then used to encrypt the
|
||||||
|
/// mnemonic.
|
||||||
///
|
///
|
||||||
/// Additionally, when given the `account=` option (which must match the `account=` option
|
/// Additionally, when given the `account=` option (which must match the `account=` option
|
||||||
/// of the relevant provisioner), the given account will be used instead of the default
|
/// of the relevant provisioner), the given account will be used instead of the default
|
||||||
/// account of 0.
|
/// account of 0.
|
||||||
///
|
///
|
||||||
/// Because a new OpenPGP key needs to be created, a User ID can also be supplied, using
|
/// Because a new OpenPGP cert needs to be created, a User ID can also be supplied, using
|
||||||
/// the option `userid=<your User ID>`. It can contain any characters that are not a comma.
|
/// the option `userid=<your User ID>`. It can contain any characters that are not a comma.
|
||||||
|
/// If any other operation generating an OpenPGP key has a `userid=` field, and this
|
||||||
|
/// operation doesn't, that User ID will be used instead.
|
||||||
#[arg(long)]
|
#[arg(long)]
|
||||||
encrypt_to_self: Option<ValueWithOptions<PathBuf>>,
|
encrypt_to_self: Option<ValueWithOptions<PathBuf>>,
|
||||||
|
|
||||||
|
@ -228,6 +245,17 @@ pub enum MnemonicSubcommands {
|
||||||
/// Additional arguments, such as the amount of hardware to provision and the
|
/// Additional arguments, such as the amount of hardware to provision and the
|
||||||
/// account to use when deriving, can be specified by using (for example)
|
/// account to use when deriving, can be specified by using (for example)
|
||||||
/// `--provision openpgp-card,count=2,account=1`.
|
/// `--provision openpgp-card,count=2,account=1`.
|
||||||
|
///
|
||||||
|
/// Provisioners may output their public key, if necessary. The file path may be chosen
|
||||||
|
/// based on the provided `output` field, or automatically determined based on the content
|
||||||
|
/// of the key, such as an OpenPGP fingerprint or a public key hash. If automatically
|
||||||
|
/// generated, the filename will be printed.
|
||||||
|
///
|
||||||
|
/// If the OpenPGP Card provisioner is selected, because a new OpenPGP cert needs to be
|
||||||
|
/// created, a User ID can also be supplied, using the option `userid=<your User ID>`. It
|
||||||
|
/// can contain any characters that are not a comma. If any other operation generating an
|
||||||
|
/// OpenPGP key has a `userid=` field, and this operation doesn't, that User ID will be
|
||||||
|
/// used instead.
|
||||||
#[arg(long)]
|
#[arg(long)]
|
||||||
provision: Option<ValueWithOptions<provision::Provisioner>>,
|
provision: Option<ValueWithOptions<provision::Provisioner>>,
|
||||||
},
|
},
|
||||||
|
@ -296,7 +324,7 @@ fn do_encrypt_to(
|
||||||
literal_message.write_all(b"\n")?;
|
literal_message.write_all(b"\n")?;
|
||||||
literal_message.finalize()?;
|
literal_message.finalize()?;
|
||||||
|
|
||||||
let mut file = File::create_new(&output_file)?;
|
let mut file = File::create_new(&output_file).map_err(context_stub(&output_file))?;
|
||||||
if is_armored {
|
if is_armored {
|
||||||
let mut writer = Writer::new(file, Kind::Message)?;
|
let mut writer = Writer::new(file, Kind::Message)?;
|
||||||
writer.write_all(&output)?;
|
writer.write_all(&output)?;
|
||||||
|
@ -313,11 +341,6 @@ fn do_encrypt_to_self(
|
||||||
path: &Path,
|
path: &Path,
|
||||||
options: &StringMap,
|
options: &StringMap,
|
||||||
) -> Result<(), Box<dyn std::error::Error>> {
|
) -> Result<(), Box<dyn std::error::Error>> {
|
||||||
let output_file = determine_valid_output_path(path, "enc", options.get("output"));
|
|
||||||
|
|
||||||
let is_armored =
|
|
||||||
options.get("armor").is_some_and(|a| a == "true") || is_extension_armored(&output_file);
|
|
||||||
|
|
||||||
let account = options
|
let account = options
|
||||||
.get("account")
|
.get("account")
|
||||||
.map(|account| u32::from_str(account))
|
.map(|account| u32::from_str(account))
|
||||||
|
@ -350,23 +373,28 @@ fn do_encrypt_to_self(
|
||||||
&userid.unwrap_or(UserID::from("Keyfork-Generated Key")),
|
&userid.unwrap_or(UserID::from("Keyfork-Generated Key")),
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
let mut file = File::create_new(path)?;
|
let cert_path = match options.get("output") {
|
||||||
if is_armored {
|
Some(path) => PathBuf::from(path),
|
||||||
let mut writer = Writer::new(file, Kind::PublicKey)?;
|
None => {
|
||||||
cert.serialize(&mut writer)?;
|
let path = PathBuf::from(cert.fingerprint().to_string()).with_extension("asc");
|
||||||
writer.finalize()?;
|
eprintln!(
|
||||||
} else {
|
"Writing OpenPGP certificate to default path: {path}",
|
||||||
cert.serialize(&mut file)?;
|
path = path.display()
|
||||||
}
|
);
|
||||||
|
path
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let file = File::create_new(&cert_path).map_err(context_stub(&cert_path))?;
|
||||||
|
let mut writer = Writer::new(file, Kind::PublicKey)?;
|
||||||
|
cert.serialize(&mut writer)?;
|
||||||
|
writer.finalize()?;
|
||||||
|
|
||||||
// a sneaky bit of DRY
|
// a sneaky bit of DRY
|
||||||
do_encrypt_to(
|
do_encrypt_to(
|
||||||
mnemonic,
|
mnemonic,
|
||||||
path,
|
&cert_path,
|
||||||
&StringMap::from([(
|
&StringMap::from([(String::from("output"), path.to_string_lossy().to_string())]),
|
||||||
String::from("output"),
|
|
||||||
output_file.to_string_lossy().to_string(),
|
|
||||||
)]),
|
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
Ok(())
|
Ok(())
|
||||||
|
@ -421,7 +449,7 @@ fn do_shard(
|
||||||
let mut output = vec![];
|
let mut output = vec![];
|
||||||
openpgp.shard_and_encrypt(threshold, max, mnemonic.as_bytes(), &certs[..], &mut output)?;
|
openpgp.shard_and_encrypt(threshold, max, mnemonic.as_bytes(), &certs[..], &mut output)?;
|
||||||
|
|
||||||
let mut file = File::create_new(&output_file)?;
|
let mut file = File::create_new(&output_file).map_err(context_stub(&output_file))?;
|
||||||
if is_armored {
|
if is_armored {
|
||||||
file.write_all(&output)?;
|
file.write_all(&output)?;
|
||||||
} else {
|
} else {
|
||||||
|
@ -466,7 +494,7 @@ fn do_shard_to(
|
||||||
&mut output,
|
&mut output,
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
let mut file = File::create_new(&output_file)?;
|
let mut file = File::create_new(&output_file).map_err(context_stub(&output_file))?;
|
||||||
if is_armored {
|
if is_armored {
|
||||||
file.write_all(&output)?;
|
file.write_all(&output)?;
|
||||||
} else {
|
} else {
|
||||||
|
@ -482,10 +510,6 @@ fn do_shard_to(
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(thiserror::Error, Debug)]
|
|
||||||
#[error("missing key: {0}")]
|
|
||||||
struct MissingKey(&'static str);
|
|
||||||
|
|
||||||
fn do_provision(
|
fn do_provision(
|
||||||
mnemonic: &keyfork_mnemonic::Mnemonic,
|
mnemonic: &keyfork_mnemonic::Mnemonic,
|
||||||
provisioner: &provision::Provisioner,
|
provisioner: &provision::Provisioner,
|
||||||
|
@ -499,16 +523,27 @@ fn do_provision(
|
||||||
.unwrap_or(0);
|
.unwrap_or(0);
|
||||||
let identifier = options
|
let identifier = options
|
||||||
.remove("identifier")
|
.remove("identifier")
|
||||||
.ok_or(MissingKey("identifier"))?
|
.map(|s| s.split('.').map(String::from).collect::<Vec<_>>())
|
||||||
.split(',')
|
.map(Result::<_, Box<dyn std::error::Error>>::Ok)
|
||||||
.map(String::from)
|
.unwrap_or_else(|| {
|
||||||
.collect::<Vec<_>>();
|
Ok(provisioner
|
||||||
|
.discover()?
|
||||||
|
.into_iter()
|
||||||
|
.map(|(identifier, _)| identifier)
|
||||||
|
.collect())
|
||||||
|
})?;
|
||||||
let count = options
|
let count = options
|
||||||
.remove("count")
|
.remove("count")
|
||||||
.map(|count| usize::from_str(&count))
|
.map(|count| usize::from_str(&count))
|
||||||
.transpose()?
|
.transpose()?
|
||||||
.unwrap_or(identifier.len());
|
.unwrap_or(identifier.len());
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
count,
|
||||||
|
identifier.len(),
|
||||||
|
"amount of identifiers discovered or provided did not match provisioner count"
|
||||||
|
);
|
||||||
|
|
||||||
for (_, identifier) in (0..count).zip(identifier.into_iter()) {
|
for (_, identifier) in (0..count).zip(identifier.into_iter()) {
|
||||||
let provisioner_config = config::Provisioner {
|
let provisioner_config = config::Provisioner {
|
||||||
account,
|
account,
|
||||||
|
@ -558,11 +593,46 @@ impl MnemonicSubcommands {
|
||||||
}
|
}
|
||||||
|
|
||||||
if let Some(encrypt_to_self) = encrypt_to_self {
|
if let Some(encrypt_to_self) = encrypt_to_self {
|
||||||
do_encrypt_to_self(&mnemonic, &encrypt_to_self.inner, &encrypt_to_self.values)?;
|
let mut values = encrypt_to_self.values.clone();
|
||||||
|
// If we have a userid from `provision` but not one here, use that one.
|
||||||
|
if let Some(provision) = provision {
|
||||||
|
if matches!(&provision.inner, provision::Provisioner::OpenPGPCard(_))
|
||||||
|
&& !values.contains_key("userid")
|
||||||
|
{
|
||||||
|
if let Some(userid) = provision.values.get("userid") {
|
||||||
|
values.insert(String::from("userid"), userid.clone());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
do_encrypt_to_self(&mnemonic, &encrypt_to_self.inner, &values)?;
|
||||||
}
|
}
|
||||||
|
|
||||||
if let Some(provisioner) = provision {
|
if let Some(provisioner) = provision {
|
||||||
do_provision(&mnemonic, &provisioner.inner, &provisioner.values)?;
|
// NOTE: If we have encrypt_to_self, we likely also have the certificate
|
||||||
|
// already generated. Therefore, we can skip generating it in the provisioner.
|
||||||
|
// However, if we don't have encrypt_to_self, we might not have the
|
||||||
|
// certificate, therefore the provisioner - by default - generates the public
|
||||||
|
// key output.
|
||||||
|
//
|
||||||
|
// We use the atypical `_skip_cert_output` field here to denote an automatic
|
||||||
|
// marking to skip the cert output. However, the `output` field will take
|
||||||
|
// priority, since it can only be manually set by the user.
|
||||||
|
let mut values = provisioner.values.clone();
|
||||||
|
if let Some(encrypt_to_self) = encrypt_to_self {
|
||||||
|
if !values.contains_key("output") {
|
||||||
|
values.insert(String::from("_skip_cert_output"), String::from("1"));
|
||||||
|
}
|
||||||
|
// If we have a userid from `encrypt_to_self` but not one here, use that
|
||||||
|
// one.
|
||||||
|
if matches!(&provisioner.inner, provision::Provisioner::OpenPGPCard(_))
|
||||||
|
&& !values.contains_key("userid")
|
||||||
|
{
|
||||||
|
if let Some(userid) = encrypt_to_self.values.get("userid") {
|
||||||
|
values.insert(String::from("userid"), userid.clone());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
do_provision(&mnemonic, &provisioner.inner, &values)?;
|
||||||
}
|
}
|
||||||
|
|
||||||
if let Some(shard_to) = shard_to {
|
if let Some(shard_to) = shard_to {
|
||||||
|
|
|
@ -3,7 +3,12 @@ use crate::{config, openpgp_card::factory_reset_current_card};
|
||||||
|
|
||||||
use card_backend_pcsc::PcscBackend;
|
use card_backend_pcsc::PcscBackend;
|
||||||
use keyfork_derive_openpgp::{
|
use keyfork_derive_openpgp::{
|
||||||
openpgp::{packet::UserID, types::KeyFlags},
|
openpgp::{
|
||||||
|
armor::{Kind, Writer},
|
||||||
|
packet::UserID,
|
||||||
|
serialize::Serialize,
|
||||||
|
types::KeyFlags,
|
||||||
|
},
|
||||||
XPrv,
|
XPrv,
|
||||||
};
|
};
|
||||||
use keyfork_prompt::{
|
use keyfork_prompt::{
|
||||||
|
@ -11,6 +16,7 @@ use keyfork_prompt::{
|
||||||
validators::{SecurePinValidator, Validator},
|
validators::{SecurePinValidator, Validator},
|
||||||
};
|
};
|
||||||
use openpgp_card_sequoia::{state::Open, Card};
|
use openpgp_card_sequoia::{state::Open, Card};
|
||||||
|
use std::path::PathBuf;
|
||||||
|
|
||||||
#[derive(Clone, Debug)]
|
#[derive(Clone, Debug)]
|
||||||
pub struct OpenPGPCard;
|
pub struct OpenPGPCard;
|
||||||
|
@ -70,28 +76,55 @@ impl ProvisionExec for OpenPGPCard {
|
||||||
&admin_pin_validator,
|
&admin_pin_validator,
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
|
let subkeys = vec![
|
||||||
|
KeyFlags::empty().set_certification(),
|
||||||
|
KeyFlags::empty().set_signing(),
|
||||||
|
KeyFlags::empty()
|
||||||
|
.set_transport_encryption()
|
||||||
|
.set_storage_encryption(),
|
||||||
|
KeyFlags::empty().set_authentication(),
|
||||||
|
];
|
||||||
|
|
||||||
|
let userid = match provisioner.metadata.as_ref().and_then(|m| m.get("userid")) {
|
||||||
|
Some(userid) => UserID::from(userid.as_str()),
|
||||||
|
None => UserID::from("Keyfork-Provisioned Key"),
|
||||||
|
};
|
||||||
|
let cert = keyfork_derive_openpgp::derive(xprv.clone(), &subkeys, &userid)?;
|
||||||
|
|
||||||
|
if !provisioner
|
||||||
|
.metadata
|
||||||
|
.as_ref()
|
||||||
|
.is_some_and(|m| m.contains_key("_skip_cert_output"))
|
||||||
|
{
|
||||||
|
let cert_output = match provisioner
|
||||||
|
.metadata
|
||||||
|
.as_ref()
|
||||||
|
.and_then(|m| m.get("output"))
|
||||||
|
{
|
||||||
|
Some(cert_output) => PathBuf::from(cert_output),
|
||||||
|
None => {
|
||||||
|
let path = PathBuf::from(cert.fingerprint().to_string()).with_extension("asc");
|
||||||
|
eprintln!(
|
||||||
|
"Writing OpenPGP certificate to: {path}",
|
||||||
|
path = path.display()
|
||||||
|
);
|
||||||
|
path
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let cert_output_file = std::fs::File::create_new(cert_output)?;
|
||||||
|
let mut writer = Writer::new(cert_output_file, Kind::PublicKey)?;
|
||||||
|
cert.serialize(&mut writer)?;
|
||||||
|
writer.finalize()?;
|
||||||
|
}
|
||||||
|
|
||||||
let mut has_provisioned = false;
|
let mut has_provisioned = false;
|
||||||
|
|
||||||
for backend in PcscBackend::cards(None)? {
|
for backend in PcscBackend::cards(None)? {
|
||||||
let backend = backend?;
|
let backend = backend?;
|
||||||
|
|
||||||
let subkeys = vec![
|
|
||||||
KeyFlags::empty().set_certification(),
|
|
||||||
KeyFlags::empty().set_signing(),
|
|
||||||
KeyFlags::empty()
|
|
||||||
.set_transport_encryption()
|
|
||||||
.set_storage_encryption(),
|
|
||||||
KeyFlags::empty().set_authentication(),
|
|
||||||
];
|
|
||||||
|
|
||||||
// NOTE: This User ID doesn't have meaningful context on the card.
|
|
||||||
// To give it a reasonable name, use `keyfork derive openpgp` or some other system that
|
|
||||||
// generates the OpenPGP certificate.
|
|
||||||
let userid = UserID::from("Keyfork-Provisioned Key");
|
|
||||||
let cert = keyfork_derive_openpgp::derive(xprv.clone(), &subkeys, &userid)?;
|
|
||||||
|
|
||||||
let result = factory_reset_current_card(
|
let result = factory_reset_current_card(
|
||||||
&mut |identifier| { identifier == provisioner.identifier },
|
&mut |identifier| identifier == provisioner.identifier,
|
||||||
user_pin.trim(),
|
user_pin.trim(),
|
||||||
admin_pin.trim(),
|
admin_pin.trim(),
|
||||||
&cert,
|
&cert,
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
use card_backend_pcsc::PcscBackend;
|
use card_backend_pcsc::PcscBackend;
|
||||||
use openpgp_card_sequoia::{state::Open, types::KeyType, Card};
|
use openpgp_card_sequoia::{state::Open, types::KeyType, Card, types::TouchPolicy};
|
||||||
use keyfork_derive_openpgp::openpgp::{Cert, policy::Policy};
|
use keyfork_derive_openpgp::openpgp::{Cert, policy::Policy};
|
||||||
|
|
||||||
/// Factory reset the current card so long as it does not match the last-used backend.
|
/// Factory reset the current card so long as it does not match the last-used backend.
|
||||||
|
@ -42,8 +42,11 @@ pub fn factory_reset_current_card(
|
||||||
transaction.factory_reset()?;
|
transaction.factory_reset()?;
|
||||||
let mut admin = transaction.to_admin_card("12345678")?;
|
let mut admin = transaction.to_admin_card("12345678")?;
|
||||||
admin.upload_key(signing_key, KeyType::Signing, None)?;
|
admin.upload_key(signing_key, KeyType::Signing, None)?;
|
||||||
|
admin.set_touch_policy(KeyType::Signing, TouchPolicy::On)?;
|
||||||
admin.upload_key(decryption_key, KeyType::Decryption, None)?;
|
admin.upload_key(decryption_key, KeyType::Decryption, None)?;
|
||||||
|
admin.set_touch_policy(KeyType::Decryption, TouchPolicy::On)?;
|
||||||
admin.upload_key(authentication_key, KeyType::Authentication, None)?;
|
admin.upload_key(authentication_key, KeyType::Authentication, None)?;
|
||||||
|
admin.set_touch_policy(KeyType::Authentication, TouchPolicy::On)?;
|
||||||
transaction.change_user_pin("123456", user_pin)?;
|
transaction.change_user_pin("123456", user_pin)?;
|
||||||
transaction.change_admin_pin("12345678", admin_pin)?;
|
transaction.change_admin_pin("12345678", admin_pin)?;
|
||||||
Ok(true)
|
Ok(true)
|
||||||
|
|
|
@ -131,6 +131,13 @@ where
|
||||||
self.write
|
self.write
|
||||||
.execute(DisableBracketedPaste)
|
.execute(DisableBracketedPaste)
|
||||||
.expect(bug!("can't restore bracketed paste"));
|
.expect(bug!("can't restore bracketed paste"));
|
||||||
|
self.write
|
||||||
|
.queue(terminal::Clear(terminal::ClearType::All))
|
||||||
|
.expect(bug!("can't clear screen"))
|
||||||
|
.queue(cursor::MoveTo(0, 0))
|
||||||
|
.expect(bug!("can't move to origin"))
|
||||||
|
.flush()
|
||||||
|
.expect(bug!("can't execute clear+move"));
|
||||||
self.write
|
self.write
|
||||||
.execute(LeaveAlternateScreen)
|
.execute(LeaveAlternateScreen)
|
||||||
.expect(bug!("can't leave alternate screen"));
|
.expect(bug!("can't leave alternate screen"));
|
||||||
|
|
Loading…
Reference in New Issue