docs: python howto
* Added another key import example using ProtonMail's new keyserver.
This commit is contained in:
parent
1c261b9fa3
commit
c2831e2377
@ -661,6 +661,100 @@ relative ease by which such key IDs can be reproduced, as demonstrated
|
||||
by the Evil32 Project in 2014 (which was subsequently exploited in
|
||||
2016).
|
||||
|
||||
Here is a variation on the above which checks the constrained
|
||||
ProtonMail keyserver for ProtonMail public keys.
|
||||
|
||||
#+BEGIN_SRC python -i
|
||||
import gpg
|
||||
import requests
|
||||
import sys
|
||||
|
||||
print("""
|
||||
This script searches the ProtonMail key server for the specified key and
|
||||
imports it.
|
||||
""")
|
||||
|
||||
c = gpg.Context(armor=True)
|
||||
url = "https://api.protonmail.ch/pks/lookup"
|
||||
ksearch = []
|
||||
|
||||
if len(sys.argv) >= 2:
|
||||
keyterm = sys.argv[1]
|
||||
else:
|
||||
keyterm = input("Enter the key ID, UID or search string: ")
|
||||
|
||||
if keyterm.count("@") == 2 and keyterm.startswith("@") is True:
|
||||
ksearch.append(keyterm[1:])
|
||||
ksearch.append(keyterm[1:])
|
||||
ksearch.append(keyterm[1:])
|
||||
elif keyterm.count("@") == 1 and keyterm.startswith("@") is True:
|
||||
ksearch.append("{0}@protonmail.com".format(keyterm[1:]))
|
||||
ksearch.append("{0}@protonmail.ch".format(keyterm[1:]))
|
||||
ksearch.append("{0}@pm.me".format(keyterm[1:]))
|
||||
elif keyterm.count("@") == 0:
|
||||
ksearch.append("{0}@protonmail.com".format(keyterm))
|
||||
ksearch.append("{0}@protonmail.ch".format(keyterm))
|
||||
ksearch.append("{0}@pm.me".format(keyterm))
|
||||
elif keyterm.count("@") == 2 and keyterm.startswith("@") is False:
|
||||
uidlist = keyterm.split("@")
|
||||
for uid in uidlist:
|
||||
ksearch.append("{0}@protonmail.com".format(uid))
|
||||
ksearch.append("{0}@protonmail.ch".format(uid))
|
||||
ksearch.append("{0}@pm.me".format(uid))
|
||||
elif keyterm.count("@") > 2:
|
||||
uidlist = keyterm.split("@")
|
||||
for uid in uidlist:
|
||||
ksearch.append("{0}@protonmail.com".format(uid))
|
||||
ksearch.append("{0}@protonmail.ch".format(uid))
|
||||
ksearch.append("{0}@pm.me".format(uid))
|
||||
else:
|
||||
ksearch.append(keyterm)
|
||||
|
||||
for k in ksearch:
|
||||
payload = {"op": "get", "search": k}
|
||||
try:
|
||||
r = requests.get(url, verify=True, params=payload)
|
||||
if r.ok is True:
|
||||
result = c.key_import(r.content)
|
||||
elif r.ok is False:
|
||||
result = r.content
|
||||
except Exception as e:
|
||||
result = None
|
||||
|
||||
if result is not None and hasattr(result, "considered") is False:
|
||||
print("{0} for {1}".format(result.decode(), k))
|
||||
elif result is not None and hasattr(result, "considered") is True:
|
||||
num_keys = len(result.imports)
|
||||
new_revs = result.new_revocations
|
||||
new_sigs = result.new_signatures
|
||||
new_subs = result.new_sub_keys
|
||||
new_uids = result.new_user_ids
|
||||
new_scrt = result.secret_imported
|
||||
nochange = result.unchanged
|
||||
print("""
|
||||
The total number of keys considered for import was: {0}
|
||||
|
||||
With UIDs wholely or partially matching the following string:
|
||||
|
||||
{1}
|
||||
|
||||
Number of keys revoked: {2}
|
||||
Number of new signatures: {3}
|
||||
Number of new subkeys: {4}
|
||||
Number of new user IDs: {5}
|
||||
Number of new secret keys: {6}
|
||||
Number of unchanged keys: {7}
|
||||
|
||||
The key IDs for all considered keys were:
|
||||
""".format(num_keys, k, new_revs, new_sigs, new_subs, new_uids, new_scrt,
|
||||
nochange))
|
||||
for i in range(num_keys):
|
||||
print(result.imports[i].fpr)
|
||||
print("")
|
||||
elif result is None:
|
||||
print(e)
|
||||
#+END_SRC
|
||||
|
||||
|
||||
** Exporting keys
|
||||
:PROPERTIES:
|
||||
|
Loading…
Reference in New Issue
Block a user