use std::path::PathBuf; use std::io::Write; use std::process::{Stdio, Command}; use anyhow::{bail, format_err, Error}; use serde::{Deserialize, Serialize}; use proxmox::api::api; use proxmox::api::cli::{CliCommand, CliCommandMap}; use proxmox::sys::linux::tty; use proxmox::tools::fs::{file_get_contents, replace_file, CreateOptions}; use proxmox_backup::backup::{ encrypt_key_with_passphrase, load_and_decrypt_key, store_key_config, KeyConfig, }; use proxmox_backup::tools; pub const DEFAULT_ENCRYPTION_KEY_FILE_NAME: &str = "encryption-key.json"; pub const MASTER_PUBKEY_FILE_NAME: &str = "master-public.pem"; pub fn find_master_pubkey() -> Result, Error> { super::find_xdg_file(MASTER_PUBKEY_FILE_NAME, "main public key file") } pub fn place_master_pubkey() -> Result { super::place_xdg_file(MASTER_PUBKEY_FILE_NAME, "main public key file") } pub fn find_default_encryption_key() -> Result, Error> { super::find_xdg_file(DEFAULT_ENCRYPTION_KEY_FILE_NAME, "default encryption key file") } pub fn place_default_encryption_key() -> Result { super::place_xdg_file(DEFAULT_ENCRYPTION_KEY_FILE_NAME, "default encryption key file") } pub fn read_optional_default_encryption_key() -> Result>, Error> { find_default_encryption_key()? .map(file_get_contents) .transpose() } pub fn get_encryption_key_password() -> Result, Error> { // fixme: implement other input methods use std::env::VarError::*; match std::env::var("PBS_ENCRYPTION_PASSWORD") { Ok(p) => return Ok(p.as_bytes().to_vec()), Err(NotUnicode(_)) => bail!("PBS_ENCRYPTION_PASSWORD contains bad characters"), Err(NotPresent) => { // Try another method } } // If we're on a TTY, query the user for a password if tty::stdin_isatty() { return Ok(tty::read_password("Encryption Key Password: ")?); } bail!("no password input mechanism available"); } #[api( default: "scrypt", )] #[derive(Clone, Copy, Debug, Deserialize, Serialize)] #[serde(rename_all = "kebab-case")] /// Key derivation function for password protected encryption keys. pub enum Kdf { /// Do not encrypt the key. None, /// Encrypt they key with a password using SCrypt. Scrypt, } impl Default for Kdf { #[inline] fn default() -> Self { Kdf::Scrypt } } #[api( input: { properties: { kdf: { type: Kdf, optional: true, }, path: { description: "Output file. Without this the key will become the new default encryption key.", optional: true, } }, }, )] /// Create a new encryption key. fn create(kdf: Option, path: Option) -> Result<(), Error> { let path = match path { Some(path) => PathBuf::from(path), None => { let path = place_default_encryption_key()?; println!("creating default key at: {:?}", path); path } }; let kdf = kdf.unwrap_or_default(); let key = proxmox::sys::linux::random_data(32)?; match kdf { Kdf::None => { let created = proxmox::tools::time::epoch_i64(); store_key_config( &path, false, KeyConfig { kdf: None, created, modified: created, data: key, }, )?; } Kdf::Scrypt => { // always read passphrase from tty if !tty::stdin_isatty() { bail!("unable to read passphrase - no tty"); } let password = tty::read_and_verify_password("Encryption Key Password: ")?; let key_config = encrypt_key_with_passphrase(&key, &password)?; store_key_config(&path, false, key_config)?; } } Ok(()) } #[api( input: { properties: { kdf: { type: Kdf, optional: true, }, path: { description: "Key file. Without this the default key's password will be changed.", optional: true, } }, }, )] /// Change the encryption key's password. fn change_passphrase(kdf: Option, path: Option) -> Result<(), Error> { let path = match path { Some(path) => PathBuf::from(path), None => { let path = find_default_encryption_key()? .ok_or_else(|| { format_err!("no encryption file provided and no default file found") })?; println!("updating default key at: {:?}", path); path } }; let kdf = kdf.unwrap_or_default(); if !tty::stdin_isatty() { bail!("unable to change passphrase - no tty"); } let (key, created) = load_and_decrypt_key(&path, &get_encryption_key_password)?; match kdf { Kdf::None => { let modified = proxmox::tools::time::epoch_i64(); store_key_config( &path, true, KeyConfig { kdf: None, created, // keep original value modified, data: key.to_vec(), }, )?; } Kdf::Scrypt => { let password = tty::read_and_verify_password("New Password: ")?; let mut new_key_config = encrypt_key_with_passphrase(&key, &password)?; new_key_config.created = created; // keep original value store_key_config(&path, true, new_key_config)?; } } Ok(()) } #[api( input: { properties: { path: { description: "Path to the PEM formatted RSA public key.", }, }, }, )] /// Import an RSA public key used to put an encrypted version of the symmetric backup encryption /// key onto the backup server along with each backup. fn import_master_pubkey(path: String) -> Result<(), Error> { let pem_data = file_get_contents(&path)?; if let Err(err) = openssl::pkey::PKey::public_key_from_pem(&pem_data) { bail!("Unable to decode PEM data - {}", err); } let target_path = place_master_pubkey()?; replace_file(&target_path, &pem_data, CreateOptions::new())?; println!("Imported public master key to {:?}", target_path); Ok(()) } #[api] /// Create an RSA public/private key pair used to put an encrypted version of the symmetric backup /// encryption key onto the backup server along with each backup. fn create_master_key() -> Result<(), Error> { // we need a TTY to query the new password if !tty::stdin_isatty() { bail!("unable to create master key - no tty"); } let rsa = openssl::rsa::Rsa::generate(4096)?; let pkey = openssl::pkey::PKey::from_rsa(rsa)?; let password = String::from_utf8(tty::read_and_verify_password("Master Key Password: ")?)?; let pub_key: Vec = pkey.public_key_to_pem()?; let filename_pub = "master-public.pem"; println!("Writing public master key to {}", filename_pub); replace_file(filename_pub, pub_key.as_slice(), CreateOptions::new())?; let cipher = openssl::symm::Cipher::aes_256_cbc(); let priv_key: Vec = pkey.private_key_to_pem_pkcs8_passphrase(cipher, password.as_bytes())?; let filename_priv = "master-private.pem"; println!("Writing private master key to {}", filename_priv); replace_file(filename_priv, priv_key.as_slice(), CreateOptions::new())?; Ok(()) } #[api( input: { properties: { path: { description: "Key file. Without this the default key's will be used.", optional: true, }, subject: { description: "Include the specified subject as titel text.", optional: true, }, }, }, )] /// Generate a printable, human readable text file containing the encryption key. /// /// This also includes a scanable QR code for fast key restore. fn paper_key(path: Option, subject: Option) -> Result<(), Error> { let path = match path { Some(path) => PathBuf::from(path), None => { let path = find_default_encryption_key()? .ok_or_else(|| { format_err!("no encryption file provided and no default file found") })?; path } }; let data = file_get_contents(&path)?; let data = std::str::from_utf8(&data)?; if let Some(subject) = subject { println!("Subject: {}\n", subject); } if data.starts_with("-----BEGIN ENCRYPTED PRIVATE KEY-----\n") { //let rsa = openssl::rsa::Rsa::private_key_from_pem(data.as_bytes())?; let lines: Vec = data.lines() .map(|s| s.trim_end()) .filter(|s| !s.is_empty()) .map(String::from) .collect(); if !lines[lines.len()-1].starts_with("-----END ENCRYPTED PRIVATE KEY-----") { bail!("unexpected key format"); } if lines.len() < 20 { bail!("unexpected key format"); } const BLOCK_SIZE: usize = 5; let blocks = (lines.len() + BLOCK_SIZE -1)/BLOCK_SIZE; for i in 0..blocks { let start = i*BLOCK_SIZE; let mut end = start + BLOCK_SIZE; if end > lines.len() { end = lines.len(); } let data = &lines[start..end]; for l in start..end { println!("LINE {:-2}: {}", l, lines[l]); } let data = data.join("\n"); let qr_code = generate_qr_code("utf8i", data.as_bytes())?; println!("{}", qr_code); println!("{}", char::from(12u8)); // page break } return Ok(()); } let key_config: KeyConfig = serde_json::from_str(&data)?; let key_text = serde_json::to_string_pretty(&key_config)?; println!("-----BEGIN PROXMOX BACKUP KEY-----"); println!("{}", key_text); println!("-----END PROXMOX BACKUP KEY-----"); let qr_code = generate_qr_code("utf8i", key_text.as_bytes())?; println!("{}", qr_code); Ok(()) } pub fn cli() -> CliCommandMap { let key_create_cmd_def = CliCommand::new(&API_METHOD_CREATE) .arg_param(&["path"]) .completion_cb("path", tools::complete_file_name); let key_change_passphrase_cmd_def = CliCommand::new(&API_METHOD_CHANGE_PASSPHRASE) .arg_param(&["path"]) .completion_cb("path", tools::complete_file_name); let key_create_master_key_cmd_def = CliCommand::new(&API_METHOD_CREATE_MASTER_KEY); let key_import_master_pubkey_cmd_def = CliCommand::new(&API_METHOD_IMPORT_MASTER_PUBKEY) .arg_param(&["path"]) .completion_cb("path", tools::complete_file_name); let paper_key_cmd_def = CliCommand::new(&API_METHOD_PAPER_KEY) .arg_param(&["path"]) .completion_cb("path", tools::complete_file_name); CliCommandMap::new() .insert("create", key_create_cmd_def) .insert("create-master-key", key_create_master_key_cmd_def) .insert("import-master-pubkey", key_import_master_pubkey_cmd_def) .insert("change-passphrase", key_change_passphrase_cmd_def) .insert("paper-key", paper_key_cmd_def) } fn generate_qr_code(output_type: &str, data: &[u8]) -> Result { let mut child = Command::new("qrencode") .args(&["-t", output_type, "-lm"]) .stdin(Stdio::piped()) .stdout(Stdio::piped()) .spawn()?; { let stdin = child.stdin.as_mut() .ok_or_else(|| format_err!("Failed to open stdin"))?; stdin.write_all(data) .map_err(|_| format_err!("Failed to write to stdin"))?; } let output = child.wait_with_output() .map_err(|_| format_err!("Failed to read stdout"))?; let output = String::from_utf8(output.stdout) .map_err(|_| format_err!("Failed to read stdout (got non-utf8 data)"))?; Ok(output) }