1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040
|
;;; mml-sec.el --- A package with security functions for MML documents -*- lexical-binding: t; -*-
;; Copyright (C) 2000-2025 Free Software Foundation, Inc.
;; Author: Simon Josefsson <simon@josefsson.org>
;; This file is part of GNU Emacs.
;; GNU Emacs is free software: you can redistribute it and/or modify
;; it under the terms of the GNU General Public License as published by
;; the Free Software Foundation, either version 3 of the License, or
;; (at your option) any later version.
;; GNU Emacs is distributed in the hope that it will be useful,
;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
;; GNU General Public License for more details.
;; You should have received a copy of the GNU General Public License
;; along with GNU Emacs. If not, see <https://www.gnu.org/licenses/>.
;;; Commentary:
;;; Code:
(require 'cl-lib)
(require 'gnus-util)
(require 'epg)
(require 'epa)
(require 'password-cache)
(require 'mm-encode)
(autoload 'mail-strip-quoted-names "mail-utils")
(autoload 'mml2015-sign "mml2015")
(autoload 'mml2015-encrypt "mml2015")
(autoload 'mml1991-sign "mml1991")
(autoload 'mml1991-encrypt "mml1991")
(autoload 'message-fetch-field "message")
(autoload 'message-goto-body "message")
(autoload 'message-options-get "message")
(autoload 'mml-insert-tag "mml")
(autoload 'mml-smime-sign "mml-smime")
(autoload 'mml-smime-encrypt "mml-smime")
(autoload 'mml-smime-sign-query "mml-smime")
(autoload 'mml-smime-encrypt-query "mml-smime")
(autoload 'mml-smime-verify "mml-smime")
(autoload 'mml-smime-verify-test "mml-smime")
(autoload 'epa--select-keys "epa")
(autoload 'message-options-get "message")
(autoload 'message-options-set "message")
(declare-function message-options-set "message" (symbol value))
(defvar mml-sign-alist
'(("smime" mml-smime-sign-buffer mml-smime-sign-query)
("pgp" mml-pgp-sign-buffer list)
("pgpauto" mml-pgpauto-sign-buffer list)
("pgpmime" mml-pgpmime-sign-buffer list))
"Alist of MIME signer functions.")
(defcustom mml-default-sign-method "pgpmime"
"Default sign method.
The string must have an entry in `mml-sign-alist'."
:version "22.1"
:type '(choice (const "smime")
(const "pgp")
(const "pgpauto")
(const "pgpmime")
string)
:group 'message)
(defvar mml-encrypt-alist
'(("smime" mml-smime-encrypt-buffer mml-smime-encrypt-query)
("pgp" mml-pgp-encrypt-buffer list)
("pgpauto" mml-pgpauto-sign-buffer list)
("pgpmime" mml-pgpmime-encrypt-buffer list))
"Alist of MIME encryption functions.")
(defcustom mml-default-encrypt-method "pgpmime"
"Default encryption method.
The string must have an entry in `mml-encrypt-alist'."
:version "22.1"
:type '(choice (const "smime")
(const "pgp")
(const "pgpauto")
(const "pgpmime")
string)
:group 'message)
(defcustom mml-signencrypt-style-alist
'(("smime" separate)
("pgp" combined)
("pgpauto" combined)
("pgpmime" combined))
"Alist specifying if `signencrypt' results in two separate operations or not.
The first entry indicates the MML security type, valid entries include
the strings \"smime\", \"pgp\", and \"pgpmime\". The second entry is
a symbol `separate' or `combined' where `separate' means that MML signs
and encrypt messages in a two step process, and `combined' means that MML
signs and encrypt the message in one step.
Note that the output generated by using a `combined' mode is NOT
understood by all PGP implementations, in particular PGP version
2 does not support it! See Info node `(message) Security' for
details."
:version "22.1"
:group 'message
:type '(repeat (list (choice (const :tag "S/MIME" "smime")
(const :tag "PGP" "pgp")
(const :tag "PGP/MIME" "pgpmime")
(string :tag "User defined"))
(choice (const :tag "Separate" separate)
(const :tag "Combined" combined)))))
(defcustom mml-secure-verbose nil
"If non-nil, ask the user about the current operation more verbosely."
:group 'message
:type 'boolean)
;; FIXME If it's "NOT recommended", why is it the default?
(defcustom mml-secure-cache-passphrase password-cache
"If t, cache OpenPGP or S/MIME passphrases inside Emacs.
Passphrase caching in Emacs is NOT recommended. Use gpg-agent instead.
See Info node `(message) Security'."
:group 'message
:type 'boolean)
(defcustom mml-secure-passphrase-cache-expiry password-cache-expiry
"How many seconds the passphrase is cached.
Whether the passphrase is cached at all is controlled by
`mml-secure-cache-passphrase'."
:group 'message
:type 'integer)
(defcustom mml-secure-safe-bcc-list nil
"List of e-mail addresses that are safe to use in Bcc headers.
EasyPG encrypts e-mails to Bcc addresses, and the encrypted e-mail
by default identifies the used encryption keys, giving away the
Bcc'ed identities. Clearly, this contradicts the original goal of
*blind* copies.
For an academic paper explaining the problem, see URL
`https://crypto.stanford.edu/portia/papers/bb-bcc.pdf'.
Use this variable to specify e-mail addresses whose owners do not
mind if they are identifiable as recipients. This may be useful if
you use Bcc headers to encrypt e-mails to yourself."
:version "25.1"
:group 'message
:type '(repeat string))
;;; Configuration/helper functions
(defun mml-signencrypt-style (method &optional style)
"Function for setting/getting the signencrypt-style used.
Takes two arguments, the method (e.g. \"pgp\") and optionally the mode
\(e.g. combined). If the mode is omitted, the current value is
returned.
For example, if you prefer to use combined sign & encrypt with
smime, putting the following in your Gnus startup file will
enable that behavior:
\(mml-set-signencrypt-style \"smime\" combined)
You can also customize or set `mml-signencrypt-style-alist' instead."
(let ((style-item (assoc method mml-signencrypt-style-alist)))
(if style-item
(if (or (eq style 'separate)
(eq style 'combined))
;; valid style setting?
(setf (cadr style-item) style)
;; otherwise, just return the current value
(cadr style-item))
(message "Warning, attempt to set invalid signencrypt style"))))
;;; Security functions
(defun mml-smime-sign-buffer (cont)
(or (mml-smime-sign cont)
(error "Signing failed... inspect message logs for errors")))
(defun mml-smime-encrypt-buffer (cont &optional sign)
(when sign
(message "Combined sign and encrypt S/MIME not support yet")
(sit-for 1))
(or (mml-smime-encrypt cont)
(error "Encryption failed... inspect message logs for errors")))
(defun mml-pgp-sign-buffer (cont)
(or (mml1991-sign cont)
(error "Signing failed... inspect message logs for errors")))
(defun mml-pgp-encrypt-buffer (cont &optional sign)
(or (mml1991-encrypt cont sign)
(error "Encryption failed... inspect message logs for errors")))
(defun mml-pgpmime-sign-buffer (cont)
(or (mml2015-sign cont)
(error "Signing failed... inspect message logs for errors")))
(defun mml-pgpmime-encrypt-buffer (cont &optional sign)
(or (mml2015-encrypt cont sign)
(error "Encryption failed... inspect message logs for errors")))
(defun mml-pgpauto-sign-buffer (cont)
(message-goto-body)
(or (if (re-search-backward "Content-Type: *multipart/.*" nil t) ; there must be a better way...
(mml2015-sign cont)
(mml1991-sign cont))
(error "Encryption failed... inspect message logs for errors")))
(defun mml-pgpauto-encrypt-buffer (cont &optional sign)
(message-goto-body)
(or (if (re-search-backward "Content-Type: *multipart/.*" nil t) ; there must be a better way...
(mml2015-encrypt cont sign)
(mml1991-encrypt cont sign))
(error "Encryption failed... inspect message logs for errors")))
(defun mml-secure-part (method &optional sign)
(save-excursion
(let ((tags (funcall (nth 2 (assoc method (if sign mml-sign-alist
mml-encrypt-alist))))))
(cond ((re-search-backward
"<#\\(multipart\\|part\\|external\\|mml\\)" nil t)
(goto-char (match-end 0))
(insert (if sign " sign=" " encrypt=") method)
(while tags
(let ((key (pop tags))
(value (pop tags)))
(when value
;; Quote VALUE if it contains suspicious characters.
(when (string-match "[\"'\\~/*;() \t\n]" value)
(setq value (prin1-to-string value)))
(insert (format " %s=%s" key value))))))
((or (re-search-backward
(concat "^" (regexp-quote mail-header-separator) "\n") nil t)
(re-search-forward
(concat "^" (regexp-quote mail-header-separator) "\n") nil t))
(goto-char (match-end 0))
(apply #'mml-insert-tag 'part (cons (if sign 'sign 'encrypt)
(cons method tags))))
(t (error "The message is corrupted. No mail header separator"))))))
(defvar mml-secure-method
(if (equal mml-default-encrypt-method mml-default-sign-method)
mml-default-sign-method
"pgpmime")
"Current security method. Internal variable.")
(defun mml-secure-sign (&optional method)
"Add MML tags to sign this MML part.
Use METHOD if given. Else use `mml-secure-method' or
`mml-default-sign-method'."
(interactive nil mml-mode)
(mml-secure-part
(or method mml-secure-method mml-default-sign-method)
'sign))
(defun mml-secure-encrypt (&optional method)
"Add MML tags to encrypt this MML part.
Use METHOD if given. Else use `mml-secure-method' or
`mml-default-sign-method'."
(interactive nil mml-mode)
(mml-secure-part
(or method mml-secure-method mml-default-sign-method)))
(defun mml-secure-sign-pgp ()
"Add MML tags to PGP sign this MML part."
(interactive nil mml-mode)
(mml-secure-part "pgp" 'sign))
(defun mml-secure-sign-pgpauto ()
"Add MML tags to PGP-auto sign this MML part."
(interactive nil mml-mode)
(mml-secure-part "pgpauto" 'sign))
(defun mml-secure-sign-pgpmime ()
"Add MML tags to PGP/MIME sign this MML part."
(interactive nil mml-mode)
(mml-secure-part "pgpmime" 'sign))
(defun mml-secure-sign-smime ()
"Add MML tags to S/MIME sign this MML part."
(interactive nil mml-mode)
(mml-secure-part "smime" 'sign))
(defun mml-secure-encrypt-pgp ()
"Add MML tags to PGP encrypt this MML part."
(interactive nil mml-mode)
(mml-secure-part "pgp"))
(defun mml-secure-encrypt-pgpmime ()
"Add MML tags to PGP/MIME encrypt this MML part."
(interactive nil mml-mode)
(mml-secure-part "pgpmime"))
(defun mml-secure-encrypt-smime ()
"Add MML tags to S/MIME encrypt this MML part."
(interactive nil mml-mode)
(mml-secure-part "smime"))
(defun mml-secure-is-encrypted-p (&optional tag-present)
"Whether the current buffer contains a mail message that should be encrypted.
If TAG-PRESENT, say whether the <#secure tag is present anywhere
in the buffer."
(save-excursion
(goto-char (point-min))
(message-goto-body)
(if tag-present
(re-search-forward "<#secure[^>]+encrypt" nil t)
(skip-chars-forward "[ \t\n")
(looking-at "<#secure[^>]+encrypt"))))
(defun mml-secure-bcc-is-safe ()
"Check whether usage of Bcc is safe (or absent).
Bcc usage is safe in two cases: first, if the current message does
not contain an MML secure encrypt tag;
second, if the Bcc addresses are a subset of `mml-secure-safe-bcc-list'.
In all other cases, ask the user whether Bcc usage is safe.
Raise error if user answers no.
Note that this function does not produce a meaningful return value:
either an error is raised or not."
(when (mml-secure-is-encrypted-p)
(let ((bcc (mail-strip-quoted-names (message-fetch-field "bcc"))))
(when bcc
(let ((bcc-list (mapcar #'cadr
(mail-extract-address-components bcc t))))
(unless (gnus-subsetp bcc-list mml-secure-safe-bcc-list)
(unless (yes-or-no-p "Message for encryption contains Bcc header.\
This may give away all Bcc'ed identities to all recipients.\
Are you sure that this is safe?\
(Customize `mml-secure-safe-bcc-list' to avoid this warning.)")
(error "Aborted"))))))))
;; defuns that add the proper <#secure ...> tag to the top of the message body
(defun mml-secure-message (method &optional modesym)
(let ((mode (prin1-to-string modesym))
(tags (append
(if (or (eq modesym 'sign)
(eq modesym 'signencrypt))
(funcall (nth 2 (assoc method mml-sign-alist))))
(if (or (eq modesym 'encrypt)
(eq modesym 'signencrypt))
(funcall (nth 2 (assoc method mml-encrypt-alist))))))
insert-loc)
(mml-unsecure-message)
(save-excursion
(goto-char (point-min))
(cond ((re-search-forward
(concat "^" (regexp-quote mail-header-separator) "\n") nil t)
(goto-char (setq insert-loc (match-end 0)))
(unless (looking-at "<#secure")
(apply #'mml-insert-tag
'secure 'method method 'mode mode tags)))
(t (error
"The message is corrupted. No mail header separator"))))
(when (eql insert-loc (point))
(forward-line 1))))
(defun mml-unsecure-message ()
"Remove security related MML tags from message."
(interactive nil mml-mode)
(save-excursion
(goto-char (point-max))
(when (re-search-backward "^<#secure.*>\n" nil t)
(delete-region (match-beginning 0) (match-end 0)))))
(defun mml-secure-message-sign (&optional method)
"Add MML tags to sign the entire message.
Use METHOD if given. Else use `mml-secure-method' or
`mml-default-sign-method'."
(interactive nil mml-mode)
(mml-secure-message
(or method mml-secure-method mml-default-sign-method)
'sign))
(defun mml-secure-message-sign-encrypt (&optional method)
"Add MML tag to sign and encrypt the entire message.
Use METHOD if given. Else use `mml-secure-method' or
`mml-default-sign-method'."
(interactive nil mml-mode)
(mml-secure-message
(or method mml-secure-method mml-default-sign-method)
'signencrypt))
(defun mml-secure-message-encrypt (&optional method)
"Add MML tag to encrypt the entire message.
Use METHOD if given. Else use `mml-secure-method' or
`mml-default-sign-method'."
(interactive nil mml-mode)
(mml-secure-message
(or method mml-secure-method mml-default-sign-method)
'encrypt))
(defun mml-secure-message-sign-smime ()
"Add MML tag to encrypt/sign the entire message."
(interactive nil mml-mode)
(mml-secure-message "smime" 'sign))
(defun mml-secure-message-sign-pgp ()
"Add MML tag to encrypt/sign the entire message."
(interactive nil mml-mode)
(mml-secure-message "pgp" 'sign))
(defun mml-secure-message-sign-pgpmime ()
"Add MML tag to encrypt/sign the entire message."
(interactive nil mml-mode)
(mml-secure-message "pgpmime" 'sign))
(defun mml-secure-message-sign-pgpauto ()
"Add MML tag to encrypt/sign the entire message."
(interactive nil mml-mode)
(mml-secure-message "pgpauto" 'sign))
(defun mml-secure-message-encrypt-smime (&optional dontsign)
"Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign)."
(interactive "P" mml-mode)
(mml-secure-message "smime" (if dontsign 'encrypt 'signencrypt)))
(defun mml-secure-message-encrypt-pgp (&optional dontsign)
"Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign)."
(interactive "P" mml-mode)
(mml-secure-message "pgp" (if dontsign 'encrypt 'signencrypt)))
(defun mml-secure-message-encrypt-pgpmime (&optional dontsign)
"Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign)."
(interactive "P" mml-mode)
(mml-secure-message "pgpmime" (if dontsign 'encrypt 'signencrypt)))
(defun mml-secure-message-encrypt-pgpauto (&optional dontsign)
"Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign)."
(interactive "P" mml-mode)
(mml-secure-message "pgpauto" (if dontsign 'encrypt 'signencrypt)))
;;; Common functionality for mml1991.el, mml2015.el, mml-smime.el
(define-obsolete-variable-alias 'mml1991-signers 'mml-secure-openpgp-signers
"25.1")
(define-obsolete-variable-alias 'mml2015-signers 'mml-secure-openpgp-signers
"25.1")
(defcustom mml-secure-openpgp-signers nil
"A list of your own key ID(s) which will be used to sign OpenPGP messages.
If set, it is added to the setting of `mml-secure-openpgp-sign-with-sender'."
:group 'mime-security
:type '(repeat (string :tag "Key ID")))
(define-obsolete-variable-alias 'mml-smime-signers 'mml-secure-smime-signers
"25.1")
(defcustom mml-secure-smime-signers nil
"A list of your own key ID(s) which will be used to sign S/MIME messages.
If set, it is added to the setting of `mml-secure-smime-sign-with-sender'."
:group 'mime-security
:type '(repeat (string :tag "Key ID")))
(define-obsolete-variable-alias
'mml1991-encrypt-to-self 'mml-secure-openpgp-encrypt-to-self "25.1")
(define-obsolete-variable-alias
'mml2015-encrypt-to-self 'mml-secure-openpgp-encrypt-to-self "25.1")
(defcustom mml-secure-openpgp-encrypt-to-self nil
"List of own key ID(s) or t; determines additional recipients with OpenPGP.
If t, also encrypt to key for message sender; if list, encrypt to those keys.
With this variable, you can ensure that you can decrypt your own messages.
Alternatives to this variable include Bcc'ing the message to yourself or
using the encrypt-to or hidden-encrypt-to option in gpg.conf (see man gpg(1)).
Note that this variable and the encrypt-to option give away your identity
for *every* encryption without warning, which is not what you want if you are
using, e.g., remailers.
Also, use of Bcc gives away your identity for *every* encryption without
warning, which is a bug, see:
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=18718"
:group 'mime-security
:type '(choice (const :tag "None" nil)
(const :tag "From address" t)
(repeat (string :tag "Key ID"))))
(define-obsolete-variable-alias
'mml-smime-encrypt-to-self 'mml-secure-smime-encrypt-to-self "25.1")
(defcustom mml-secure-smime-encrypt-to-self nil
"List of own key ID(s) or t; determines additional recipients with S/MIME.
If t, also encrypt to key for message sender; if list, encrypt to those keys.
With this variable, you can ensure that you can decrypt your own messages.
Alternatives to this variable include Bcc'ing the message to yourself or
using the encrypt-to option in gpgsm.conf (see man gpgsm(1)).
Note that this variable and the encrypt-to option give away your identity
for *every* encryption without warning, which is not what you want if you are
using, e.g., remailers.
Also, use of Bcc gives away your identity for *every* encryption without
warning, which is a bug, see:
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=18718"
:group 'mime-security
:type '(choice (const :tag "None" nil)
(const :tag "From address" t)
(repeat (string :tag "Key ID"))))
(define-obsolete-variable-alias
'mml2015-sign-with-sender 'mml-secure-openpgp-sign-with-sender "25.1")
;mml1991-sign-with-sender did never exist.
(defcustom mml-secure-openpgp-sign-with-sender nil
"If t, use message sender to find an OpenPGP key to sign with.
Also use message's sender with GnuPG's --sender option."
:group 'mime-security
:type 'boolean)
(define-obsolete-variable-alias
'mml-smime-sign-with-sender 'mml-secure-smime-sign-with-sender "25.1")
(defcustom mml-secure-smime-sign-with-sender nil
"If t, use message sender to find an S/MIME key to sign with."
:group 'mime-security
:type 'boolean)
(define-obsolete-variable-alias
'mml2015-always-trust 'mml-secure-openpgp-always-trust "25.1")
;mml1991-always-trust did never exist.
(defcustom mml-secure-openpgp-always-trust t
"If t, skip key validation of GnuPG on encryption."
:group 'mime-security
:type 'boolean)
(defcustom mml-secure-fail-when-key-problem nil
"If t, raise an error if some key is missing or several keys exist.
Otherwise, ask the user."
:version "25.1"
:group 'mime-security
:type 'boolean)
(defcustom mml-secure-key-preferences
'((OpenPGP (sign) (encrypt)) (CMS (sign) (encrypt)))
"Protocol- and usage-specific fingerprints of preferred keys.
This variable is only relevant if a recipient owns multiple key pairs (for
encryption) or you own multiple key pairs (for signing). In such cases,
you will be asked which key(s) should be used, and your choice can be
customized in this variable."
:version "25.1"
:group 'mime-security
:type '(alist :key-type (symbol :tag "Protocol") :value-type
(alist :key-type (symbol :tag "Usage") :value-type
(alist :key-type (string :tag "Name") :value-type
(repeat (string :tag "Fingerprint"))))))
(defun mml-secure-cust-usage-lookup (context usage)
"Return preferences for CONTEXT and USAGE."
(let* ((protocol (epg-context-protocol context))
(protocol-prefs (cdr (assoc protocol mml-secure-key-preferences))))
(assoc usage protocol-prefs)))
(defun mml-secure-cust-fpr-lookup (context usage name)
"Return fingerprints of preferred keys for CONTEXT, USAGE, and NAME."
(let* ((usage-prefs (mml-secure-cust-usage-lookup context usage))
(fprs (assoc name (cdr usage-prefs))))
(when fprs
(cdr fprs))))
(defun mml-secure-cust-record-keys (context usage name keys &optional save)
"For CONTEXT, USAGE, and NAME record fingerprint(s) of KEYS.
If optional SAVE is not nil, save customized fingerprints.
Return keys."
(cl-assert keys)
(let* ((usage-prefs (mml-secure-cust-usage-lookup context usage))
(curr-fprs (cdr (assoc name (cdr usage-prefs))))
(key-fprs (mapcar #'mml-secure-fingerprint keys))
(new-fprs (cl-union curr-fprs key-fprs :test 'equal)))
(if curr-fprs
(setcdr (assoc name (cdr usage-prefs)) new-fprs)
(setcdr usage-prefs (cons (cons name new-fprs) (cdr usage-prefs))))
(when save
(customize-save-variable
'mml-secure-key-preferences mml-secure-key-preferences))
keys))
(defun mml-secure-cust-remove-keys (context usage name)
"Remove keys for CONTEXT, USAGE, and NAME.
Return t if a customization for NAME was present (and has been removed)."
(let* ((usage-prefs (mml-secure-cust-usage-lookup context usage))
(current (assoc name usage-prefs)))
(when current
(setcdr usage-prefs (remove current (cdr usage-prefs)))
t)))
(defvar mml-secure-secret-key-id-list nil)
(defun mml-secure-add-secret-key-id (key-id)
"Record KEY-ID in list of secret keys."
(add-to-list 'mml-secure-secret-key-id-list key-id))
(defun mml-secure-clear-secret-key-id-list ()
"Remove passwords from cache and clear list of secret keys."
;; Loosely based on code inside mml2015-epg-encrypt,
;; mml2015-epg-clear-decrypt, and mml2015-epg-decrypt
(dolist (key-id mml-secure-secret-key-id-list nil)
(password-cache-remove key-id))
(setq mml-secure-secret-key-id-list nil))
(defvar mml1991-cache-passphrase)
(defvar mml1991-passphrase-cache-expiry)
(defun mml-secure-cache-passphrase-p (protocol)
"Return t if OpenPGP or S/MIME passphrases should be cached for PROTOCOL.
Passphrase caching in Emacs is NOT recommended. Use gpg-agent instead."
(or (and (eq 'OpenPGP protocol)
(or mml-secure-cache-passphrase
(and (boundp 'mml2015-cache-passphrase)
mml2015-cache-passphrase)
(and (boundp 'mml1991-cache-passphrase)
mml1991-cache-passphrase)))
(and (eq 'CMS protocol)
(or mml-secure-cache-passphrase
(and (boundp 'mml-smime-cache-passphrase)
mml-smime-cache-passphrase)))))
(defun mml-secure-cache-expiry-interval (protocol)
"Return time in seconds to cache passphrases for PROTOCOL.
Passphrase caching in Emacs is NOT recommended. Use gpg-agent instead."
(or (and (eq 'OpenPGP protocol)
(or (and (boundp 'mml2015-passphrase-cache-expiry)
mml2015-passphrase-cache-expiry)
(and (boundp 'mml1991-passphrase-cache-expiry)
mml1991-passphrase-cache-expiry)
mml-secure-passphrase-cache-expiry))
(and (eq 'CMS protocol)
(or (and (boundp 'mml-smime-passphrase-cache-expiry)
mml-smime-passphrase-cache-expiry)
mml-secure-passphrase-cache-expiry))))
(defun mml-secure-passphrase-callback (context key-id _standard)
"Ask for passphrase in CONTEXT for KEY-ID for STANDARD.
The passphrase is read and cached."
;; Based on mml2015-epg-passphrase-callback.
(if (eq key-id 'SYM)
(epa-passphrase-callback-function context key-id nil)
(let* ((password-cache-key-id
(if (eq key-id 'PIN)
"PIN"
key-id))
(entry (assoc key-id epg-user-id-alist))
(passphrase
(password-read
(if (eq key-id 'PIN)
"Passphrase for PIN: "
(if entry
(format "Passphrase for %s %s: " key-id (cdr entry))
(format "Passphrase for %s: " key-id)))
;; TODO: With mml-smime.el, password-cache-key-id is not passed
;; as argument to password-read.
;; Is that on purpose? If so, the following needs to be placed
;; inside an if statement.
password-cache-key-id)))
(when passphrase
(let ((password-cache-expiry (mml-secure-cache-expiry-interval
(epg-context-protocol context))))
;; FIXME test passphrase works before caching it.
(password-cache-add password-cache-key-id passphrase))
(mml-secure-add-secret-key-id password-cache-key-id)
(copy-sequence passphrase)))))
(defun mml-secure-check-user-id (key recipient)
"Check whether KEY has a non-revoked, non-expired UID for RECIPIENT."
;; Based on mml2015-epg-check-user-id.
(let ((uids (epg-key-user-id-list key)))
(catch 'break
(dolist (uid uids nil)
(if (and (stringp (epg-user-id-string uid))
(car (ignore-errors
(mail-header-parse-address
(epg-user-id-string uid))))
(equal (downcase (car (mail-header-parse-address
(epg-user-id-string uid))))
(downcase (or (car (mail-header-parse-address
recipient))
recipient)))
(not (memq (epg-user-id-validity uid)
'(revoked expired))))
(throw 'break t))))))
(defun mml-secure-secret-key-exists-p (context subkey)
"Return t if keyring for CONTEXT contains secret key for public SUBKEY."
(let* ((fpr (epg-sub-key-fingerprint subkey))
(candidates (epg-list-keys context fpr 'secret))
(candno (length candidates)))
;; If two or more subkeys with the same fingerprint exist, something is
;; terribly wrong.
(when (>= candno 2)
(error "Found %d secret keys with same fingerprint %s" candno fpr))
(= 1 candno)))
(defun mml-secure-check-sub-key (context key usage &optional fingerprint)
"Check whether in CONTEXT the public KEY has a usable subkey for USAGE.
This is the case if KEY is not disabled, and there is a subkey for
USAGE that is neither revoked nor expired. Additionally, if optional
FINGERPRINT is present and if it is not the primary key's fingerprint, then
the returned subkey must have that FINGERPRINT. FINGERPRINT must consist of
hexadecimal digits only (no leading \"0x\" allowed).
If USAGE is not `encrypt', then additionally an appropriate secret key must
be present in the keyring."
;; Based on mml2015-epg-check-sub-key, extended by
;; - check for secret keys if usage is not 'encrypt and
;; - check for new argument FINGERPRINT.
(let* ((subkeys (epg-key-sub-key-list key))
(primary (car subkeys))
(fpr (epg-sub-key-fingerprint primary)))
;; The primary key will be marked as disabled, when the entire
;; key is disabled (see 12 Field, Format of colon listings, in
;; gnupg/doc/DETAILS)
(unless (memq 'disabled (epg-sub-key-capability primary))
(catch 'break
(dolist (subkey subkeys nil)
(if (and (memq usage (epg-sub-key-capability subkey))
(not (memq (epg-sub-key-validity subkey)
'(revoked expired)))
(or (eq 'encrypt usage) ; Encryption works with public key.
;; In contrast, signing requires secret key.
(mml-secure-secret-key-exists-p context subkey))
(or (not fingerprint)
(string-match-p (concat fingerprint "$") fpr)
(string-match-p (concat fingerprint "$")
(epg-sub-key-fingerprint subkey))))
(throw 'break t)))))))
(defun mml-secure-find-usable-keys (context name usage &optional justone)
"In CONTEXT return a list of keys for NAME and USAGE.
If USAGE is `encrypt' public keys are returned, otherwise secret ones.
Only non-revoked and non-expired keys are returned whose primary key is
not disabled.
NAME can be an e-mail address or a key ID.
If NAME just consists of hexadecimal digits (possibly prefixed by \"0x\"), it
is treated as key ID for which at most one key must exist in the keyring.
Otherwise, NAME is treated as user ID, for which no keys are returned if it
is expired or revoked.
If optional JUSTONE is not nil, return the first key instead of a list."
(let* ((keys (epg-list-keys context name))
(iskeyid (string-match "\\(0x\\)?\\([[:xdigit:]]\\{8,\\}\\)" name))
(fingerprint (match-string 2 name))
result)
(when (and iskeyid (>= (length keys) 2))
(error
"Name %s (for %s) looks like a key ID but multiple keys found"
name usage))
(catch 'break
(dolist (key keys result)
(if (and (or iskeyid
(mml-secure-check-user-id key name))
(mml-secure-check-sub-key context key usage fingerprint))
(if justone
(throw 'break key)
(push key result)))))))
(defun mml-secure-select-preferred-keys (context names usage)
"Return list of preferred keys in CONTEXT for NAMES and USAGE.
This inspects the keyrings to find keys for each name in NAMES. If several
keys are found for a name, `mml-secure-select-keys' is used to look for
customized preferences or have the user select preferable ones.
When `mml-secure-fail-when-key-problem' is t, fail with an error in
case of missing, outdated, or multiple keys."
;; Loosely based on code appearing inside mml2015-epg-sign and
;; mml2015-epg-encrypt.
(apply
#'nconc
(mapcar
(lambda (name)
(let* ((keys (mml-secure-find-usable-keys context name usage))
(keyno (length keys)))
(cond ((= 0 keyno)
(when (or mml-secure-fail-when-key-problem
(not (y-or-n-p
(format "No %s key for %s; skip it? "
usage name))))
(error "No %s key for %s" usage name)))
((= 1 keyno) keys)
(t (mml-secure-select-keys context name keys usage)))))
names)))
(defun mml-secure-fingerprint (key)
"Return fingerprint for public KEY."
(epg-sub-key-fingerprint (car (epg-key-sub-key-list key))))
(defun mml-secure-filter-keys (keys fprs)
"Filter KEYS to subset with fingerprints in FPRS."
(when keys
(if (member (mml-secure-fingerprint (car keys)) fprs)
(cons (car keys) (mml-secure-filter-keys (cdr keys) fprs))
(mml-secure-filter-keys (cdr keys) fprs))))
(defun mml-secure-normalize-cust-name (name)
"Normalize NAME to be used for customization.
Currently, remove ankle brackets."
(if (string-match "^<\\(.*\\)>$" name)
(match-string 1 name)
name))
(defun mml-secure-select-keys (context name keys usage)
"In CONTEXT for NAME select among KEYS for USAGE.
KEYS should be a list with multiple entries.
NAME is normalized first as customized keys are inspected.
When `mml-secure-fail-when-key-problem' is t, fail with an error in case of
outdated or multiple keys."
(let* ((nname (mml-secure-normalize-cust-name name))
(fprs (mml-secure-cust-fpr-lookup context usage nname))
(usable-fprs (mapcar #'mml-secure-fingerprint keys)))
(if fprs
(if (gnus-subsetp fprs usable-fprs)
(mml-secure-filter-keys keys fprs)
(mml-secure-cust-remove-keys context usage nname)
(let ((diff (gnus-setdiff fprs usable-fprs)))
(if mml-secure-fail-when-key-problem
(error "Customization of %s keys for %s outdated" usage nname)
(mml-secure-select-keys-1
context nname keys usage (format "\
Customized keys
(%s)
for %s not available any more.
Select anew. "
diff nname)))))
(if mml-secure-fail-when-key-problem
(error "Multiple %s keys for %s" usage nname)
(mml-secure-select-keys-1
context nname keys usage (format "\
Multiple %s keys for:
%s
Select preferred one(s). "
usage nname))))))
(defun mml-secure-select-keys-1 (context name keys usage message)
"In CONTEXT for NAME let user select among KEYS for USAGE, showing MESSAGE.
Return selected keys."
(let* ((selected (epa--select-keys message keys))
(selno (length selected))
;; TODO: y-or-n-p does not always resize the echo area but may
;; truncate the message. Why? The following does not help.
;; yes-or-no-p shows full message, though.
(message-truncate-lines nil))
(if selected
(if (y-or-n-p
(format "%d %s key(s) selected. Store for %s? "
selno usage name))
(mml-secure-cust-record-keys context usage name selected 'save)
selected)
(unless (y-or-n-p
(format "No %s key for %s; skip it? " usage name))
(error "No %s key for %s" usage name)))))
(defun mml-secure-signer-names (protocol sender)
"Determine signer names for PROTOCOL and message from SENDER.
Returned names may be e-mail addresses or key IDs and are determined based
on `mml-secure-openpgp-signers' and `mml-secure-openpgp-sign-with-sender' with
OpenPGP or `mml-secure-smime-signers' and `mml-secure-smime-sign-with-sender'
with S/MIME."
(if (eq 'OpenPGP protocol)
(append mml-secure-openpgp-signers
(if (and mml-secure-openpgp-sign-with-sender sender)
(list (concat "<" sender ">"))))
(append mml-secure-smime-signers
(if (and mml-secure-smime-sign-with-sender sender)
(list (concat "<" sender ">"))))))
(defun mml-secure-signers (context signer-names)
"Determine signing keys in CONTEXT from SIGNER-NAMES.
If `mm-sign-option' is `guided', the user is asked to choose.
Otherwise, `mml-secure-select-preferred-keys' is used."
;; Based on code appearing inside mml2015-epg-sign and
;; mml2015-epg-encrypt.
(if (eq mm-sign-option 'guided)
(epa-select-keys context "\
Select keys for signing.
If no one is selected, default secret key is used. "
signer-names t)
(mml-secure-select-preferred-keys context signer-names 'sign)))
(defun mml-secure-self-recipients (protocol sender)
"Determine additional recipients based on encrypt-to-self variables.
PROTOCOL specifies OpenPGP or S/MIME for a message from SENDER."
(let ((encrypt-to-self
(if (eq 'OpenPGP protocol)
mml-secure-openpgp-encrypt-to-self
mml-secure-smime-encrypt-to-self)))
(when encrypt-to-self
(if (listp encrypt-to-self)
encrypt-to-self
(list sender)))))
(defun mml-secure-recipients (protocol context config sender)
"Determine encryption recipients.
PROTOCOL specifies OpenPGP or S/MIME with matching CONTEXT and CONFIG
for a message from SENDER."
;; Based on code appearing inside mml2015-epg-encrypt.
(let ((recipients
(apply #'nconc
(mapcar
(lambda (recipient)
(or (epg-expand-group config recipient)
(list (concat "<" recipient ">"))))
(split-string
(or (message-options-get 'message-recipients)
(message-options-set 'message-recipients
(read-string "Recipients: ")))
"[ \f\t\n\r\v,]+")))))
(nconc recipients (mml-secure-self-recipients protocol sender))
(if (eq mm-encrypt-option 'guided)
(setq recipients
(epa-select-keys context "\
Select recipients for encryption.
If no one is selected, symmetric encryption will be performed. "
recipients))
(setq recipients
(mml-secure-select-preferred-keys context recipients 'encrypt))
(unless recipients
(error "No recipient specified")))
recipients))
(defun mml-secure-epg-encrypt (protocol _cont &optional sign)
;; Based on code appearing inside mml2015-epg-encrypt.
(let* ((context (epg-make-context protocol))
(config (epg-find-configuration 'OpenPGP))
(sender (message-options-get 'message-sender))
(recipients (mml-secure-recipients protocol context config sender))
(signer-names (mml-secure-signer-names protocol sender))
cipher signers)
(when sign
(setq signers (mml-secure-signers context signer-names))
(setf (epg-context-signers context) signers)
(when (and (eq 'OpenPGP protocol) mml-secure-openpgp-sign-with-sender)
(setf (epg-context-sender context) sender)))
(when (eq 'OpenPGP protocol)
(setf (epg-context-armor context) t)
(setf (epg-context-textmode context) t))
(when (mml-secure-cache-passphrase-p protocol)
(epg-context-set-passphrase-callback
context
(cons 'mml-secure-passphrase-callback protocol)))
(condition-case error
(setq cipher
(if (eq 'OpenPGP protocol)
(epg-encrypt-string context (buffer-string) recipients sign
mml-secure-openpgp-always-trust)
(epg-encrypt-string context (buffer-string) recipients))
mml-secure-secret-key-id-list nil)
(error
(mml-secure-clear-secret-key-id-list)
(signal (car error) (cdr error))))
cipher))
(defun mml-secure-sender-sign-query (protocol sender)
"Query whether to use SENDER to sign when using PROTOCOL.
PROTOCOL will be `OpenPGP' or `CMS' (smime).
This can also save the resulting value of
`mml-secure-smime-sign-with-sender' or
`mml-secure-openpgp-sign-with-sender' via Customize.
Returns non-nil if the user has chosen to use SENDER."
(let ((buffer (get-buffer-create "*MML sender signing options*"))
(options '((?a "always" "Sign using this sender now and sign with message sender in future.")
(?s "session only" "Sign using this sender now, and sign with message sender for this session only.")
(?n "no" "Do not sign this message (and error out)")))
answer done val)
(save-window-excursion
(pop-to-buffer buffer)
(erase-buffer)
(insert (format "No %s signing key was found for this message.\nThe sender of this message is \"%s\".\nWould you like to attempt looking up a signing key based on it?"
(if (eq protocol 'OpenPGP)
"openpgp" "smime")
sender))
(while (not done)
(setq answer (read-multiple-choice "Sign this message using the sender?" options))
(cl-case (car answer)
(?a
(if (eq protocol 'OpenPGP)
(progn
(setq mml-secure-openpgp-sign-with-sender t)
(customize-save-variable
'mml-secure-openpgp-sign-with-sender t))
(setq mml-secure-smime-sign-with-sender t)
(customize-save-variable 'mml-secure-smime-sign-with-sender t))
(setq done t
val t))
(?s
(if (eq protocol 'OpenPGP)
(setq mml-secure-openpgp-sign-with-sender t)
(setq mml-secure-smime-sign-with-sender t))
(setq done t
val t))
(?n
(setq done t)))))
val))
(defun mml-secure-epg-sign (protocol mode)
;; Based on code appearing inside mml2015-epg-sign.
(let* ((context (epg-make-context protocol))
(sender (message-options-get 'message-sender))
(signer-names (mml-secure-signer-names protocol sender))
(signers (mml-secure-signers context signer-names))
signature micalg)
(unless signers
(if (and (not noninteractive)
(mml-secure-sender-sign-query protocol sender))
(setq signer-names (mml-secure-signer-names protocol sender)
signers (mml-secure-signers context signer-names)))
(unless signers
(let ((maybe-msg
(if (or mml-secure-smime-sign-with-sender
mml-secure-openpgp-sign-with-sender)
"."
"; try setting `mml-secure-smime-sign-with-sender' or 'mml-secure-openpgp-sign-with-sender'.")))
;; If `mml-secure-smime-sign-with-sender' or
;; `mml-secure-openpgp-sign-with-sender' are already non-nil
;; then there's no point advising the user to examine them.
;; If there are any other variables worth examining, please
;; improve this error message by having it mention them.
(error "Couldn't find any signer names%s" maybe-msg))))
(when (eq 'OpenPGP protocol)
(setf (epg-context-armor context) t)
(setf (epg-context-textmode context) t)
(when mml-secure-openpgp-sign-with-sender
(setf (epg-context-sender context) sender)))
(setf (epg-context-signers context) signers)
(when (mml-secure-cache-passphrase-p protocol)
(epg-context-set-passphrase-callback
context
(cons 'mml-secure-passphrase-callback protocol)))
(condition-case error
(setq signature
(if (eq 'OpenPGP protocol)
(epg-sign-string context (buffer-string) mode)
(epg-sign-string context
(string-replace
"\n" "\r\n" (buffer-string))
t))
mml-secure-secret-key-id-list nil)
(error
(mml-secure-clear-secret-key-id-list)
(signal (car error) (cdr error))))
(if (epg-context-result-for context 'sign)
(setq micalg (epg-new-signature-digest-algorithm
(car (epg-context-result-for context 'sign)))))
(cons signature micalg)))
(provide 'mml-sec)
;;; mml-sec.el ends here
|