PGP::Sign version 0.16
(Create and verify detached PGP signatures for data)
Copyright 1997, 1998, 1999, 2000 by Russ Allbery <
[email protected]>.
This program is free software; you may redistribute it and/or modify it
under the same terms as Perl itself.
INTRODUCTION
One important thing to clear up right away:
THIS IS NOT A GENERAL PGP MODULE
For wonderful general PGP modules that will encrypt, decrypt, manage key
rings, slice, dice, fold, spindle, and mutilate your data, see the PGP
by-module directory at your local CPAN mirror; hopefully there will be
one there. This module sprung out of a need to do one thing and one
thing only, do it securely, and do it well. This module creates and
checks detached signatures for data. That's it. If you want to do
anything else that PGP lets you do, look elsewhere.
Currently this module only works with text data. Support for binary
data is high on the list of features I want to add.
The original purpose of this module was to factor out common code in a
News::Article class written by Andrew Gierth that did PGPMoose
signatures and signed control messages. It should now be possible to
reimplement PGPMoose, signcontrol, and pgpverify using this module, and
the second and parts of the first have already been done.
So much for the "one thing only" part. For the "do it securely" part,
this module uses a pipe to pass the secret key password to PGP, rather
than a command line flag or an environment variable as seen in other
modules. Both of those are subject to snooping by other users; this
approach isn't.
For the "do it well" part, the interface to this module takes every form
of data known to man. Scalars and arrays are no problem, of course, but
if you give it a reference to an array, it'll walk the array to avoid
making a copy of a potentially large data structure. You can also give
it an open file (in the form of a glob, a reference to a glob, a
FileHandle object, an IO::Handle object, or anything derived from
either) and it'll walk that too. Or you can give it a reference to a
scalar if you really want to and it's cool with that. Or, if you want
to get really exciting, you can give it a reference to a sub and it'll
call the sub repeatedly to get more data until the sub returns undef.
Perfect for walking some complex data structure you don't want to make
an internal copy of. And if there's any other interesting data
structure you want to throw at it, tell me about it, and the next
version will probably support that too.
This module supports a wide variety of different versions of PGP, from
PGP 2.6.2 to PGP 5.0 to PGP 6.5 to the new (and very nice) GnuPG.
Different implementations of PGP are capable (and not capable) of
creating and checking various types of signatures; obviously, what this
module can do is limited by what versions of PGP you have installed.
See the documentation for all the gory details, which really aren't that
gory. At least yet.
REQUIREMENTS
This module requires a version of PGP that supports PGPPASSFD or some
other mechanism for handing the passphrase over in a pipe. 2.6.2,
2.6.3i, 5.0, 6.5, and GnuPG all do. I can't personally vouch for any
other version, but I believe ViaCrypt PGP 4.0 may also work (since it's
largely based on 2.6.2). This module also requires an operating system
that's capable of coping with pipes, forking, and passing file
descriptors through an exec(). If your operating system can't, that's
considered by this module author to be a bug in your operating system
and not in this module.
I've personally tested or received reports of clean tests of this module
with the following versions of PGP:
PGP 2.6.2 (US version)
PGP 2.6.2i
PGP 5.0 (US Linux freeware version)
PGP 6.5.2 (US Solaris freeware version)
GnuPG 0.9.2 (Linux and Solaris)
GnuPG 1.0.1 (Solaris)
(Note that GnuPG 0.9.2 will fail test 9 since it doesn't use the same
type of whitespace munging as PGP. This has been changed in later
versions of GnuPG.) If you successfully use this module with other
versions of PGP not listed above, please let me know.
This module requires no other modules besides IPC::Open3 and FileHandle,
both of which are part of Perl core and have been for some time. It
should work with Perl 5.003 or later, although I personally have only
tested it with Perl 5.004_04 and 5.005_03.
INSTALLATION
Follow the standard installation procedure for Perl modules, which is to
type the following commands:
perl Makefile.PL
make
make test
make install
You'll probably need to do the last as root unless you're installing in
your own private modules directory.
In order for make test to succeed if you're using GnuPG and egd (the
entropy daemon), you may have to make a symlink from data/entropy to the
entropy socket in your ~/.gnupg directory.
When you run make, you will be prompted for the path to the program to
create signatures and the program to verify signatures. PGP::Sign will
try to guess at what you may want to use, preferring GnuPG and then PGP
5.0. For GnuPG, PGP 2.6, or PGP 6.5, both paths should point to the
same program; for PGP 5.0, pgps is the program that generates signatures
and pgpv is the program that verifies them. Don't set the signing
program and the verifying program to mutually incompatible things, or
you'll get strange results.
You will also be prompted for what PGP style to default to, since each
PGP implementation works slightly differently. This has to be one of
the following: "PGP2" for PGP 2.6 workalikes, "PGP5" for PGP 5.0 and
workalikes, "PGP6" for PGP 6.5 and workalikes, or "GPG" for GnuPG.
Again, PGP::Sign will try to guess from the name of the binaries you
chose (and distinguish between PGP2 and PGP6 based on the output of the
program when run without any arguments).
If you have multiple versions of PGP installed on your system, you still
have to pick one to be the default. You'll be able to switch between
PGP programs and PGP styles at runtime; see the PGP::Sign documentation
for details.
If you want to avoid the prompt for the path to PGP, you can, instead of
the first line, type:
perl Makefile.PL PGP=/path/to/pgp
and then /path/to/pgp will be used as the path to PGP (both signing and
verification) and you won't be prompted. When invoked this way,
Makefile.PL will attempt to figure out what PGP style you're using from
the name of the binaries. You can set it specifically with something
like:
perl Makefile.PL PGP=/usr/local/bin/gpg PGPSTYLE=GPG
if you need to. If the signing program and verifying program are
different, set PGPS and PGPV instead of just PGP. For example:
perl Makefile.PL PGPS=/usr/local/bin/pgps PGPV=/usr/local/bin/pgpv
If you want to install PGP::Sign in somewhere other than the default
installation location, you can set PREFIX or LIB on the Makefile.PL
command line. See the ExtUtils::MakeMaker documentation for more
details.
TESTING
There is a small test suite that uses the files in data to make sure
that signing and checking of signatures work. This test suite uses the
key rings and data in the data subdirectory of the distribution, and
should work correctly under any of the supported versions of PGP.
To run the test suite, type:
make test
after running make. Regardless of your PGP style, at least one test
will be skipped, since PGP::Sign knows how to test RSA signatures (PGP
2.6, PGP 5.0, and PGP 6.5), DSS version three signatures (PGP 5.0, PGP
6.5, and GnuPG), and DSS version four signatures (GnuPG only), and no
one PGP implementation can handle all three (unless your GnuPG
installation includes RSA support).
For some reason, the test suite fails the first time it's run with PGP
6.5 (at least on Solaris), giving error messages about not having enough
random bits, and then succeeds the second time. I consider this to be a
bug in PGP 6.5, as no other version of PGP has this problem.
Note that different PGP implementations return different things and
therefore the test suite looks for different things depending on what
your PGP style is set to. See the PGP::Sign documentation for an
extended discussion of issues related to trailing whitespace, and see
the comments in test.pl for information on exactly what's being tested.
More tests are welcome, particularly if you find a bug or if they test
some major functionality of this module not currently covered.
THANKS
To Andrew Gierth <
[email protected]> for the inspiration and
motivation to write this and the reminder that PGPPASSFD existed, for
being one of the two people who caught the mistake I made with $? and
open3(), and for pointing out a missing waitpid() in pgp_verify() that
was causing zombies.
To Jon Ribbens <
[email protected]> for pointing out that $? isn't
guaranteed to contain the exit status of something called from open3()
unless you do a waitpid() for it first.
To Andrew Ford <
[email protected]> for adding PGPPATH support
and adding a test suite and code in Makefile.PL to search for an
installed version of PGP.
To Todd Underwood <
[email protected]> for the impetus to get this module
working under GnuPG and PGP 5.0, and to him and Monte Mitzelfelt
<
[email protected]> for the initial GnuPG implementation that I based mine
on.
To Lupe Christoph <
[email protected]> for pointing out that Perl
5.005_03 sets close-on-exec on file handles created by pipe, requiring
an fcntl() call in PGP::Sign to unset that.
To J. Porter Clark <
[email protected]> for information about
the socket needed for GnuPG with egd support.
To David Lawrence <
[email protected]> and Greg Rose <
[email protected]> for
signcontrol and PGPMoose respectively, the motivating applications.
To Phil Zimmermann, because Phil should be listed in the thank you list
for anything related to PGP, given that he wrote it and went through
legal hell to make sure we still had it available.
To Werner Koch <
[email protected]> for GnuPG, which is much nicer than
any other PGP implementation I've worked with and is free to boot, and
for pointing me at the right sections of RFC 2440 to explain the OpenPGP
standard on whitespace munging in text signatures.
CONTACTING ME AND CONTRIBUTIONS
Send any comments, bug reports, feature requests, flames, thank yous,
offers of vast quantities of money, lutefisk, and large green Martian
dogs named Ralf to
[email protected]. :)
Please allow at least a month for me to respond to mail regarding this
module. I get at *least* 500 mail messages a day, and I'm afraid this
module is something that I only get a chance to work on once every few
months. I do intend to continue to maintain it, however, and I will get
back to you eventually.
Contributions are welcome! I will not have enough time to add
everything I want to add to this module, but I tend to be sparked into
bursts of creativity and programming energy when sent new ideas or
patches, even partial ones. If you're interested in contributing,
please read TODO first.
Enjoy!
--
Russ Allbery <
[email protected]> <URL:
http://www.eyrie.org/~eagle/>
[ RSA: 32 D7 46 5A D7 BA 0E 5C 5B F0 8A 27 3D B4 30 E3 ]
[ DSS: 18CF B0C8 368A 36A8 86F5 66A2 F985 E340 0AFC 7476 ]