2016-06-21 13:20:29 +02:00
|
|
|
#!/usr/bin/env gpgscm
|
|
|
|
|
|
|
|
;; Copyright (C) 2016 g10 Code GmbH
|
|
|
|
;;
|
|
|
|
;; This file is part of GnuPG.
|
|
|
|
;;
|
|
|
|
;; GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
;; it under the terms of the GNU General Public License as published by
|
|
|
|
;; the Free Software Foundation; either version 3 of the License, or
|
|
|
|
;; (at your option) any later version.
|
|
|
|
;;
|
|
|
|
;; GnuPG is distributed in the hope that it will be useful,
|
|
|
|
;; but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
;; GNU General Public License for more details.
|
|
|
|
;;
|
|
|
|
;; You should have received a copy of the GNU General Public License
|
|
|
|
;; along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
(load (with-path "defs.scm"))
|
|
|
|
|
2016-06-23 17:24:23 +02:00
|
|
|
;; Redefine GPG without --always-trust and a fixed time.
|
|
|
|
(define GPG `(,(tool 'gpg) --no-permission-warning
|
|
|
|
--faked-system-time=1466684990))
|
2016-06-21 13:20:29 +02:00
|
|
|
(define GNUPGHOME (getenv "GNUPGHOME"))
|
|
|
|
(if (string=? "" GNUPGHOME)
|
|
|
|
(error "GNUPGHOME not set"))
|
|
|
|
|
|
|
|
(catch (skip "Tofu not supported")
|
|
|
|
(call-check `(,@GPG --trust-model=tofu --list-config)))
|
|
|
|
|
|
|
|
(define KEYS '("2183839A" "BC15C85A" "EE37CF96"))
|
|
|
|
|
|
|
|
;; Import the test keys.
|
|
|
|
(call-check `(,@GPG --import ,(in-srcdir "tofu-keys.asc")))
|
|
|
|
|
|
|
|
;; Make sure the keys are imported.
|
|
|
|
(for-each (lambda (keyid)
|
|
|
|
(catch (error "Missing key" keyid)
|
|
|
|
(call-check `(,@GPG --list-keys ,keyid))))
|
|
|
|
KEYS)
|
|
|
|
|
|
|
|
;; Get tofu policy for KEYID. Any remaining arguments are simply
|
|
|
|
;; passed to GPG.
|
|
|
|
;;
|
|
|
|
;; This function only supports keys with a single user id.
|
2016-09-07 11:02:51 +02:00
|
|
|
(define (getpolicy keyid . args)
|
2016-06-21 13:20:29 +02:00
|
|
|
(let ((policy
|
2016-08-25 09:26:36 +02:00
|
|
|
(list-ref (assoc "tfs" (gpg-with-colons
|
2016-09-07 11:02:51 +02:00
|
|
|
`(--trust-model=tofu --with-tofu-info
|
2016-06-21 13:20:29 +02:00
|
|
|
,@args
|
2016-08-25 09:26:36 +02:00
|
|
|
--list-keys ,keyid))) 5)))
|
2016-06-21 13:20:29 +02:00
|
|
|
(unless (member policy '("auto" "good" "unknown" "bad" "ask"))
|
|
|
|
(error "Bad policy:" policy))
|
|
|
|
policy))
|
|
|
|
|
|
|
|
;; Check that KEYID's tofu policy matches EXPECTED-POLICY. Any
|
|
|
|
;; remaining arguments are simply passed to GPG.
|
|
|
|
;;
|
|
|
|
;; This function only supports keys with a single user id.
|
2016-09-07 11:02:51 +02:00
|
|
|
(define (checkpolicy keyid expected-policy . args)
|
|
|
|
(let ((policy (apply getpolicy `(,keyid ,@args))))
|
2016-06-21 13:20:29 +02:00
|
|
|
(unless (string=? policy expected-policy)
|
|
|
|
(error keyid ": Expected policy to be" expected-policy
|
|
|
|
"but got" policy))))
|
|
|
|
|
|
|
|
;; Get the trust level for KEYID. Any remaining arguments are simply
|
|
|
|
;; passed to GPG.
|
|
|
|
;;
|
|
|
|
;; This function only supports keys with a single user id.
|
2016-09-07 11:02:51 +02:00
|
|
|
(define (gettrust keyid . args)
|
2016-06-21 13:20:29 +02:00
|
|
|
(let ((trust
|
|
|
|
(list-ref (assoc "pub" (gpg-with-colons
|
2016-09-07 11:02:51 +02:00
|
|
|
`(--trust-model=tofu
|
2016-06-21 13:20:29 +02:00
|
|
|
,@args
|
|
|
|
--list-keys ,keyid))) 1)))
|
|
|
|
(unless (and (= 1 (string-length trust))
|
|
|
|
(member (string-ref trust 0) (string->list "oidreqnmfuws-")))
|
|
|
|
(error "Bad trust value:" trust))
|
|
|
|
trust))
|
|
|
|
|
|
|
|
;; Check that KEYID's trust level matches EXPECTED-TRUST. Any
|
|
|
|
;; remaining arguments are simply passed to GPG.
|
|
|
|
;;
|
|
|
|
;; This function only supports keys with a single user id.
|
2016-09-07 11:02:51 +02:00
|
|
|
(define (checktrust keyid expected-trust . args)
|
|
|
|
(let ((trust (apply gettrust `(,keyid ,@args))))
|
2016-06-21 13:20:29 +02:00
|
|
|
(unless (string=? trust expected-trust)
|
|
|
|
(error keyid ": Expected trust to be" expected-trust
|
|
|
|
"but got" trust))))
|
|
|
|
|
|
|
|
;; Set key KEYID's policy to POLICY. Any remaining arguments are
|
|
|
|
;; passed as options to gpg.
|
2016-09-07 11:02:51 +02:00
|
|
|
(define (setpolicy keyid policy . args)
|
|
|
|
(call-check `(,@GPG --trust-model=tofu ,@args
|
2016-06-21 13:20:29 +02:00
|
|
|
--tofu-policy ,policy ,keyid)))
|
|
|
|
|
2016-09-12 11:07:48 +02:00
|
|
|
(info "Checking tofu policies and trust...")
|
|
|
|
|
|
|
|
;; Carefully remove the TOFU db.
|
|
|
|
(catch '() (unlink (string-append GNUPGHOME "/tofu.db")))
|
|
|
|
|
|
|
|
;; Verify a message. There should be no conflict and the trust
|
|
|
|
;; policy should be set to auto.
|
|
|
|
(call-check `(,@GPG --trust-model=tofu
|
|
|
|
--verify ,(in-srcdir "tofu-2183839A-1.txt")))
|
|
|
|
|
|
|
|
(checkpolicy "2183839A" "auto")
|
|
|
|
;; Check default trust.
|
|
|
|
(checktrust "2183839A" "m")
|
|
|
|
|
|
|
|
;; Trust should be derived lazily. Thus, if the policy is set to
|
|
|
|
;; auto and we change --tofu-default-policy, then the trust should
|
|
|
|
;; change as well. Try it.
|
|
|
|
(checktrust "2183839A" "f" '--tofu-default-policy=good)
|
|
|
|
(checktrust "2183839A" "-" '--tofu-default-policy=unknown)
|
|
|
|
(checktrust "2183839A" "n" '--tofu-default-policy=bad)
|
|
|
|
|
|
|
|
;; Change the policy to something other than auto and make sure the
|
|
|
|
;; policy and the trust are correct.
|
2016-06-21 13:20:29 +02:00
|
|
|
(for-each-p
|
2016-09-12 11:07:48 +02:00
|
|
|
"Setting a fixed policy..."
|
|
|
|
(lambda (policy)
|
|
|
|
(let ((expected-trust
|
|
|
|
(cond
|
|
|
|
((string=? "good" policy) "f")
|
|
|
|
((string=? "unknown" policy) "-")
|
|
|
|
(else "n"))))
|
|
|
|
(setpolicy "2183839A" policy)
|
|
|
|
|
|
|
|
;; Since we have a fixed policy, the trust level shouldn't
|
|
|
|
;; change if we change the default policy.
|
|
|
|
(for-each-p
|
|
|
|
""
|
|
|
|
(lambda (default-policy)
|
|
|
|
(checkpolicy "2183839A" policy
|
|
|
|
'--tofu-default-policy default-policy)
|
|
|
|
(checktrust "2183839A" expected-trust
|
|
|
|
'--tofu-default-policy default-policy))
|
|
|
|
'("auto" "good" "unknown" "bad" "ask"))))
|
|
|
|
'("good" "unknown" "bad"))
|
|
|
|
|
|
|
|
;; BC15C85A conflicts with 2183839A. On conflict, this will set
|
|
|
|
;; BC15C85A to ask. If 2183839A is auto (it's not, it's bad), then
|
|
|
|
;; it will be set to ask.
|
|
|
|
(call-check `(,@GPG --trust-model=tofu
|
|
|
|
--verify ,(in-srcdir "tofu-BC15C85A-1.txt")))
|
|
|
|
(checkpolicy "BC15C85A" "ask")
|
|
|
|
(checkpolicy "2183839A" "bad")
|
|
|
|
|
|
|
|
;; EE37CF96 conflicts with 2183839A and BC15C85A. We change
|
|
|
|
;; BC15C85A's policy to auto and leave 2183839A's policy at bad.
|
|
|
|
;; This conflict should cause BC15C85A's policy to be changed to
|
|
|
|
;; ask (since it is auto), but not affect 2183839A's policy.
|
|
|
|
(setpolicy "BC15C85A" "auto")
|
|
|
|
(checkpolicy "BC15C85A" "auto")
|
|
|
|
(call-check `(,@GPG --trust-model=tofu
|
|
|
|
--verify ,(in-srcdir "tofu-EE37CF96-1.txt")))
|
|
|
|
(checkpolicy "BC15C85A" "ask")
|
|
|
|
(checkpolicy "2183839A" "bad")
|
|
|
|
(checkpolicy "EE37CF96" "ask")
|
2016-10-13 12:44:59 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
;; Check that we detect the following attack:
|
|
|
|
;;
|
|
|
|
;; Alice and Bob each have a key and cross sign them. Bob then adds a
|
|
|
|
;; new user id, "Alice". TOFU should now detect a conflict, because
|
|
|
|
;; Alice only signed Bob's "Bob" user id.
|
|
|
|
|
|
|
|
(display "Checking cross sigs...\n")
|
|
|
|
(define GPG `(,(tool 'gpg) --no-permission-warning
|
|
|
|
--faked-system-time=1476304861))
|
|
|
|
|
|
|
|
;; Carefully remove the TOFU db.
|
|
|
|
(catch '() (unlink (string-append GNUPGHOME "/tofu.db")))
|
|
|
|
|
|
|
|
(define DIR "tofu/cross-sigs")
|
|
|
|
;; The test keys.
|
|
|
|
(define KEYA "1938C3A0E4674B6C217AC0B987DB2814EC38277E")
|
|
|
|
(define KEYB "DC463A16E42F03240D76E8BA8B48C6BD871C2247")
|
2016-10-13 21:38:50 +02:00
|
|
|
(define KEYIDA (substring KEYA (- (string-length KEYA) 8)))
|
|
|
|
(define KEYIDB (substring KEYB (- (string-length KEYB) 8)))
|
2016-10-13 12:44:59 +02:00
|
|
|
|
|
|
|
(define (verify-messages)
|
|
|
|
(for-each
|
|
|
|
(lambda (key)
|
|
|
|
(for-each
|
|
|
|
(lambda (i)
|
|
|
|
(let ((fn (in-srcdir DIR (string-append key "-" i ".txt"))))
|
|
|
|
(call-check `(,@GPG --trust-model=tofu --verify ,fn))))
|
|
|
|
(list "1" "2")))
|
2016-10-13 21:38:50 +02:00
|
|
|
(list KEYIDA KEYIDB)))
|
2016-10-13 12:44:59 +02:00
|
|
|
|
|
|
|
;; Import the public keys.
|
|
|
|
(display " > Two keys. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDA "-1.gpg"))))
|
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-1.gpg"))))
|
2016-10-13 12:44:59 +02:00
|
|
|
;; Make sure the tofu engine registers the keys.
|
|
|
|
(verify-messages)
|
|
|
|
(display "<\n")
|
|
|
|
|
2016-10-13 20:54:06 +02:00
|
|
|
;; Since there is no conflict, the policy should be auto.
|
2016-10-13 12:44:59 +02:00
|
|
|
(checkpolicy KEYA "auto")
|
|
|
|
(checkpolicy KEYB "auto")
|
|
|
|
|
|
|
|
;; Import the cross sigs.
|
|
|
|
(display " > Adding cross signatures. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDA "-2.gpg"))))
|
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-2.gpg"))))
|
2016-10-13 12:44:59 +02:00
|
|
|
(verify-messages)
|
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
;; There is still no conflict, so the policy shouldn't have changed.
|
|
|
|
(checkpolicy KEYA "auto")
|
|
|
|
(checkpolicy KEYB "auto")
|
|
|
|
|
|
|
|
;; Import the conflicting user id.
|
|
|
|
(display " > Adding conflicting user id. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-3.gpg"))))
|
2016-10-13 12:44:59 +02:00
|
|
|
(verify-messages)
|
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
(checkpolicy KEYA "ask")
|
|
|
|
(checkpolicy KEYB "ask")
|
|
|
|
|
|
|
|
;; Import Alice's signature on the conflicting user id.
|
|
|
|
(display " > Adding cross signature on user id. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-4.gpg"))))
|
2016-10-13 12:44:59 +02:00
|
|
|
(verify-messages)
|
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
(checkpolicy KEYA "auto")
|
|
|
|
(checkpolicy KEYB "auto")
|
2016-10-13 20:54:06 +02:00
|
|
|
|
|
|
|
;; Remove the keys.
|
|
|
|
(call-check `(,@GPG --delete-key ,KEYA))
|
|
|
|
(call-check `(,@GPG --delete-key ,KEYB))
|
|
|
|
|
|
|
|
|
|
|
|
;; Check that we detect the following attack:
|
|
|
|
;;
|
|
|
|
;; Alice has an ultimately trusted key and she signs Bob's key. Then
|
|
|
|
;; Bob adds a new user id, "Alice". TOFU should now detect a
|
|
|
|
;; conflict, because Alice only signed Bob's "Bob" user id.
|
|
|
|
|
|
|
|
(display "Checking UTK sigs...\n")
|
|
|
|
(define GPG `(,(tool 'gpg) --no-permission-warning
|
|
|
|
--faked-system-time=1476304861))
|
|
|
|
|
|
|
|
;; Carefully remove the TOFU db.
|
|
|
|
(catch '() (unlink (string-append GNUPGHOME "/tofu.db")))
|
|
|
|
|
|
|
|
(define DIR "tofu/cross-sigs")
|
|
|
|
;; The test keys.
|
|
|
|
(define KEYA "1938C3A0E4674B6C217AC0B987DB2814EC38277E")
|
|
|
|
(define KEYB "DC463A16E42F03240D76E8BA8B48C6BD871C2247")
|
2016-10-13 21:38:50 +02:00
|
|
|
(define KEYIDA (substring KEYA (- (string-length KEYA) 8)))
|
|
|
|
(define KEYIDB (substring KEYB (- (string-length KEYB) 8)))
|
2016-10-13 20:54:06 +02:00
|
|
|
|
|
|
|
(define (verify-messages)
|
|
|
|
(for-each
|
|
|
|
(lambda (key)
|
|
|
|
(for-each
|
|
|
|
(lambda (i)
|
|
|
|
(let ((fn (in-srcdir DIR (string-append key "-" i ".txt"))))
|
|
|
|
(call-check `(,@GPG --trust-model=tofu --verify ,fn))))
|
|
|
|
(list "1" "2")))
|
2016-10-13 21:38:50 +02:00
|
|
|
(list KEYIDA KEYIDB)))
|
2016-10-13 20:54:06 +02:00
|
|
|
|
|
|
|
;; Import the public keys.
|
|
|
|
(display " > Two keys. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDA "-1.gpg"))))
|
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-1.gpg"))))
|
2016-10-13 20:54:06 +02:00
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
;; Import the cross sigs.
|
|
|
|
(display " > Adding cross signatures. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDA "-2.gpg"))))
|
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-2.gpg"))))
|
2016-10-13 20:54:06 +02:00
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
;; Make KEYA ultimately trusted.
|
|
|
|
(display (string-append " > Marking " KEYA " as ultimately trusted. "))
|
|
|
|
(pipe:do
|
|
|
|
(pipe:echo (string-append KEYA ":6:\n"))
|
|
|
|
(pipe:gpg `(--import-ownertrust)))
|
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
;; An ultimately trusted key's policy is good.
|
|
|
|
(checkpolicy KEYA "good")
|
|
|
|
;; A key signed by a UTK for which there is no policy gets the default
|
|
|
|
;; policy of good.
|
|
|
|
(checkpolicy KEYB "good")
|
|
|
|
|
|
|
|
;; Import the conflicting user id.
|
|
|
|
(display " > Adding conflicting user id. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-3.gpg"))))
|
2016-10-13 20:54:06 +02:00
|
|
|
(verify-messages)
|
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
(checkpolicy KEYA "good")
|
|
|
|
(checkpolicy KEYB "ask")
|
|
|
|
|
|
|
|
;; Import Alice's signature on the conflicting user id.
|
|
|
|
(display " > Adding cross signature on user id. ")
|
2016-10-13 21:38:50 +02:00
|
|
|
(call-check `(,@GPG --import ,(in-srcdir DIR (string-append KEYIDB "-4.gpg"))))
|
2016-10-13 20:54:06 +02:00
|
|
|
(verify-messages)
|
|
|
|
(display "<\n")
|
|
|
|
|
|
|
|
(checkpolicy KEYA "good")
|
|
|
|
(checkpolicy KEYB "good")
|
|
|
|
|
|
|
|
;; Remove the keys.
|
|
|
|
(call-check `(,@GPG --delete-key ,KEYA))
|
|
|
|
(call-check `(,@GPG --delete-key ,KEYB))
|