ckeygen.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400
  1. # -*- test-case-name: twisted.conch.test.test_ckeygen -*-
  2. # Copyright (c) Twisted Matrix Laboratories.
  3. # See LICENSE for details.
  4. """
  5. Implementation module for the `ckeygen` command.
  6. """
  7. from __future__ import annotations
  8. import getpass
  9. import os
  10. import platform
  11. import socket
  12. import sys
  13. from collections.abc import Callable
  14. from functools import wraps
  15. from importlib import reload
  16. from typing import Any, Dict, Optional
  17. from twisted.conch.ssh import keys
  18. from twisted.python import failure, filepath, log, usage
  19. if getpass.getpass == getpass.unix_getpass: # type: ignore[attr-defined]
  20. try:
  21. import termios # hack around broken termios
  22. termios.tcgetattr, termios.tcsetattr
  23. except (ImportError, AttributeError):
  24. sys.modules["termios"] = None # type: ignore[assignment]
  25. reload(getpass)
  26. supportedKeyTypes = dict()
  27. def _keyGenerator(keyType):
  28. def assignkeygenerator(keygenerator):
  29. @wraps(keygenerator)
  30. def wrapper(*args, **kwargs):
  31. return keygenerator(*args, **kwargs)
  32. supportedKeyTypes[keyType] = wrapper
  33. return wrapper
  34. return assignkeygenerator
  35. class GeneralOptions(usage.Options):
  36. synopsis = """Usage: ckeygen [options]
  37. """
  38. longdesc = "ckeygen manipulates public/private keys in various ways."
  39. optParameters = [
  40. ["bits", "b", None, "Number of bits in the key to create."],
  41. ["filename", "f", None, "Filename of the key file."],
  42. ["type", "t", None, "Specify type of key to create."],
  43. ["comment", "C", None, "Provide new comment."],
  44. ["newpass", "N", None, "Provide new passphrase."],
  45. ["pass", "P", None, "Provide old passphrase."],
  46. ["format", "o", "sha256-base64", "Fingerprint format of key file."],
  47. [
  48. "private-key-subtype",
  49. None,
  50. None,
  51. 'OpenSSH private key subtype to write ("PEM" or "v1").',
  52. ],
  53. ]
  54. optFlags = [
  55. ["fingerprint", "l", "Show fingerprint of key file."],
  56. ["changepass", "p", "Change passphrase of private key file."],
  57. ["quiet", "q", "Quiet."],
  58. ["no-passphrase", None, "Create the key with no passphrase."],
  59. ["showpub", "y", "Read private key file and print public key."],
  60. ]
  61. compData = usage.Completions(
  62. optActions={
  63. "type": usage.CompleteList(list(supportedKeyTypes.keys())),
  64. "private-key-subtype": usage.CompleteList(["PEM", "v1"]),
  65. }
  66. )
  67. def run():
  68. options = GeneralOptions()
  69. try:
  70. options.parseOptions(sys.argv[1:])
  71. except usage.UsageError as u:
  72. print("ERROR: %s" % u)
  73. options.opt_help()
  74. sys.exit(1)
  75. log.discardLogs()
  76. log.deferr = handleError # HACK
  77. if options["type"]:
  78. if options["type"].lower() in supportedKeyTypes:
  79. print("Generating public/private %s key pair." % (options["type"]))
  80. supportedKeyTypes[options["type"].lower()](options)
  81. else:
  82. sys.exit(
  83. "Key type was %s, must be one of %s"
  84. % (options["type"], ", ".join(supportedKeyTypes.keys()))
  85. )
  86. elif options["fingerprint"]:
  87. printFingerprint(options)
  88. elif options["changepass"]:
  89. changePassPhrase(options)
  90. elif options["showpub"]:
  91. displayPublicKey(options)
  92. else:
  93. options.opt_help()
  94. sys.exit(1)
  95. def enumrepresentation(options):
  96. if options["format"] == "md5-hex":
  97. options["format"] = keys.FingerprintFormats.MD5_HEX
  98. return options
  99. elif options["format"] == "sha256-base64":
  100. options["format"] = keys.FingerprintFormats.SHA256_BASE64
  101. return options
  102. else:
  103. raise keys.BadFingerPrintFormat(
  104. f"Unsupported fingerprint format: {options['format']}"
  105. )
  106. def handleError():
  107. global exitStatus
  108. exitStatus = 2
  109. log.err(failure.Failure())
  110. raise
  111. @_keyGenerator("rsa")
  112. def generateRSAkey(options):
  113. from cryptography.hazmat.backends import default_backend
  114. from cryptography.hazmat.primitives.asymmetric import rsa
  115. if not options["bits"]:
  116. options["bits"] = 2048
  117. keyPrimitive = rsa.generate_private_key(
  118. key_size=int(options["bits"]),
  119. public_exponent=65537,
  120. backend=default_backend(),
  121. )
  122. key = keys.Key(keyPrimitive)
  123. _saveKey(key, options)
  124. @_keyGenerator("dsa")
  125. def generateDSAkey(options):
  126. from cryptography.hazmat.backends import default_backend
  127. from cryptography.hazmat.primitives.asymmetric import dsa
  128. if not options["bits"]:
  129. options["bits"] = 1024
  130. keyPrimitive = dsa.generate_private_key(
  131. key_size=int(options["bits"]),
  132. backend=default_backend(),
  133. )
  134. key = keys.Key(keyPrimitive)
  135. _saveKey(key, options)
  136. @_keyGenerator("ecdsa")
  137. def generateECDSAkey(options):
  138. from cryptography.hazmat.backends import default_backend
  139. from cryptography.hazmat.primitives.asymmetric import ec
  140. if not options["bits"]:
  141. options["bits"] = 256
  142. # OpenSSH supports only mandatory sections of RFC5656.
  143. # See https://www.openssh.com/txt/release-5.7
  144. curve = b"ecdsa-sha2-nistp" + str(options["bits"]).encode("ascii")
  145. keyPrimitive = ec.generate_private_key(
  146. curve=keys._curveTable[curve], backend=default_backend()
  147. )
  148. key = keys.Key(keyPrimitive)
  149. _saveKey(key, options)
  150. @_keyGenerator("ed25519")
  151. def generateEd25519key(options):
  152. keyPrimitive = keys.Ed25519PrivateKey.generate()
  153. key = keys.Key(keyPrimitive)
  154. _saveKey(key, options)
  155. def _defaultPrivateKeySubtype(keyType):
  156. """
  157. Return a reasonable default private key subtype for a given key type.
  158. @type keyType: L{str}
  159. @param keyType: A key type, as returned by
  160. L{twisted.conch.ssh.keys.Key.type}.
  161. @rtype: L{str}
  162. @return: A private OpenSSH key subtype (C{'PEM'} or C{'v1'}).
  163. """
  164. if keyType == "Ed25519":
  165. # No PEM format is defined for Ed25519 keys.
  166. return "v1"
  167. else:
  168. return "PEM"
  169. def _getKeyOrDefault(
  170. options: Dict[Any, Any],
  171. inputCollector: Optional[Callable[[str], str]] = None,
  172. keyTypeName: str = "rsa",
  173. ) -> str:
  174. """
  175. If C{options["filename"]} is None, prompt the user to enter a path
  176. or attempt to set it to .ssh/id_rsa
  177. @param options: command line options
  178. @param inputCollector: dependency injection for testing
  179. @param keyTypeName: key type or "rsa"
  180. """
  181. if inputCollector is None:
  182. inputCollector = input
  183. filename = options["filename"]
  184. if not filename:
  185. filename = os.path.expanduser(f"~/.ssh/id_{keyTypeName}")
  186. if platform.system() == "Windows":
  187. filename = os.path.expanduser(Rf"%HOMEPATH %\.ssh\id_{keyTypeName}")
  188. filename = (
  189. inputCollector("Enter file in which the key is (%s): " % filename)
  190. or filename
  191. )
  192. return str(filename)
  193. def printFingerprint(options: Dict[Any, Any]) -> None:
  194. filename = _getKeyOrDefault(options)
  195. if os.path.exists(filename + ".pub"):
  196. filename += ".pub"
  197. options = enumrepresentation(options)
  198. try:
  199. key = keys.Key.fromFile(filename)
  200. print(
  201. "%s %s %s"
  202. % (
  203. key.size(),
  204. key.fingerprint(options["format"]),
  205. os.path.basename(filename),
  206. )
  207. )
  208. except keys.BadKeyError:
  209. sys.exit("bad key")
  210. except FileNotFoundError:
  211. sys.exit(f"{filename} could not be opened, please specify a file.")
  212. def changePassPhrase(options):
  213. filename = _getKeyOrDefault(options)
  214. try:
  215. key = keys.Key.fromFile(filename)
  216. except keys.EncryptedKeyError:
  217. # Raised if password not supplied for an encrypted key
  218. if not options.get("pass"):
  219. options["pass"] = getpass.getpass("Enter old passphrase: ")
  220. try:
  221. key = keys.Key.fromFile(filename, passphrase=options["pass"])
  222. except keys.BadKeyError:
  223. sys.exit("Could not change passphrase: old passphrase error")
  224. except keys.EncryptedKeyError as e:
  225. sys.exit(f"Could not change passphrase: {e}")
  226. except keys.BadKeyError as e:
  227. sys.exit(f"Could not change passphrase: {e}")
  228. except FileNotFoundError:
  229. sys.exit(f"{filename} could not be opened, please specify a file.")
  230. if not options.get("newpass"):
  231. while 1:
  232. p1 = getpass.getpass("Enter new passphrase (empty for no passphrase): ")
  233. p2 = getpass.getpass("Enter same passphrase again: ")
  234. if p1 == p2:
  235. break
  236. print("Passphrases do not match. Try again.")
  237. options["newpass"] = p1
  238. if options.get("private-key-subtype") is None:
  239. options["private-key-subtype"] = _defaultPrivateKeySubtype(key.type())
  240. try:
  241. newkeydata = key.toString(
  242. "openssh",
  243. subtype=options["private-key-subtype"],
  244. passphrase=options["newpass"],
  245. )
  246. except Exception as e:
  247. sys.exit(f"Could not change passphrase: {e}")
  248. try:
  249. keys.Key.fromString(newkeydata, passphrase=options["newpass"])
  250. except (keys.EncryptedKeyError, keys.BadKeyError) as e:
  251. sys.exit(f"Could not change passphrase: {e}")
  252. with open(filename, "wb") as fd:
  253. fd.write(newkeydata)
  254. print("Your identification has been saved with the new passphrase.")
  255. def displayPublicKey(options):
  256. filename = _getKeyOrDefault(options)
  257. try:
  258. key = keys.Key.fromFile(filename)
  259. except FileNotFoundError:
  260. sys.exit(f"{filename} could not be opened, please specify a file.")
  261. except keys.EncryptedKeyError:
  262. if not options.get("pass"):
  263. options["pass"] = getpass.getpass("Enter passphrase: ")
  264. key = keys.Key.fromFile(filename, passphrase=options["pass"])
  265. displayKey = key.public().toString("openssh").decode("ascii")
  266. print(displayKey)
  267. def _inputSaveFile(prompt: str) -> str:
  268. """
  269. Ask the user where to save the key.
  270. This needs to be a separate function so the unit test can patch it.
  271. """
  272. return input(prompt)
  273. def _saveKey(
  274. key: keys.Key,
  275. options: Dict[Any, Any],
  276. inputCollector: Optional[Callable[[str], str]] = None,
  277. ) -> None:
  278. """
  279. Persist a SSH key on local filesystem.
  280. @param key: Key which is persisted on local filesystem.
  281. @param options:
  282. @param inputCollector: Dependency injection for testing.
  283. """
  284. if inputCollector is None:
  285. inputCollector = input
  286. KeyTypeMapping = {"EC": "ecdsa", "Ed25519": "ed25519", "RSA": "rsa", "DSA": "dsa"}
  287. keyTypeName = KeyTypeMapping[key.type()]
  288. filename = options["filename"]
  289. if not filename:
  290. defaultPath = _getKeyOrDefault(options, inputCollector, keyTypeName)
  291. newPath = _inputSaveFile(
  292. f"Enter file in which to save the key ({defaultPath}): "
  293. )
  294. filename = newPath.strip() or defaultPath
  295. if os.path.exists(filename):
  296. print(f"{filename} already exists.")
  297. yn = inputCollector("Overwrite (y/n)? ")
  298. if yn[0].lower() != "y":
  299. sys.exit()
  300. if options.get("no-passphrase"):
  301. options["pass"] = b""
  302. elif not options["pass"]:
  303. while 1:
  304. p1 = getpass.getpass("Enter passphrase (empty for no passphrase): ")
  305. p2 = getpass.getpass("Enter same passphrase again: ")
  306. if p1 == p2:
  307. break
  308. print("Passphrases do not match. Try again.")
  309. options["pass"] = p1
  310. if options.get("private-key-subtype") is None:
  311. options["private-key-subtype"] = _defaultPrivateKeySubtype(key.type())
  312. comment = f"{getpass.getuser()}@{socket.gethostname()}"
  313. fp = filepath.FilePath(filename)
  314. fp.setContent(
  315. key.toString(
  316. "openssh",
  317. subtype=options["private-key-subtype"],
  318. passphrase=options["pass"],
  319. )
  320. )
  321. fp.chmod(0o100600)
  322. filepath.FilePath(filename + ".pub").setContent(
  323. key.public().toString("openssh", comment=comment)
  324. )
  325. options = enumrepresentation(options)
  326. print(f"Your identification has been saved in {filename}")
  327. print(f"Your public key has been saved in {filename}.pub")
  328. print(f"The key fingerprint in {options['format']} is:")
  329. print(key.fingerprint(options["format"]))
  330. if __name__ == "__main__":
  331. run()