#!/bin/bash source /opt/aninix/Uniglot/Bash/header unset canaryText # cscanary=https://cryptostorm.is/canary.txt # cskeyserver=pgp.mit.edu # cskey=E9C7C942 keyserver=pool.sks-keyservers.net key=1CC1E3F4ED06F296 canary=https://aninix.net/AniNIX/WarrantCanary/raw/branch/main/canary.asc unset gitCommit alJazeera='https://www.aljazeera.com/xml/rss/all.xml' alJazeeraDate="$(date +%Y/%m/%d | sed -s 's#/0#/#g')" npr='https://feeds.npr.org/1004/rss.xml' nprdate="$(date +%Y/%m/%d)" function Usage() { # Show helptext # param retcode: what to exit retcode=$1 echo "Usage: $0 -V # Verify the AniNIX's warrant canary" echo " $0 -V -k KEY -K KEYSERVER -c CANARY # Verify another warrant canary" echo " $0 -s # Seed a warrant canary." echo "Add -v to increase verbosity." exit $retcode } function ConfirmGPGKeys() { # Try to make sure we either have or can pull the key if ! gpg2 --fingerprint "$key"; then gpg --keyserver "$keyserver" --recv-key "$key" if ! gpg2 --fingerprint "$key"; then echo Cannot pull the key: "$key". exit 1; fi fi } function RecentNews() { # Pull the first recent news article from an RSS feed. # param rssFeed: the url to pull rssFeed="$1" date="$2" curl -s "$rssFeed" | grep "$date" | tr '>' '\n' | grep /link | tail -n 1 } function CreateCanary() { rm ./canary.asc cat > ./canary << EOM As of $(date +%F), the AniNIX has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. AniNIX has never placed any backdoors in our hardware or software and has not received any requests to do so. AniNIX has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on AniNIX assets. The next two updates should be on or before: * `date -d @$(( $time + 7776000 )) +%F` * `date -d @$(( $time + 15552000 )) +%F` Recent news: * $(RecentNews "$alJazeera" "$alJazeeraDate") * $(RecentNews "$npr" "$nprdate") To verify this message, on the terminal import our public key from $keyserver and verify the canary: $ gpg --fetch-keys https://aninix.net/AniNIX/ShadowArch/raw/branch/main/EtcFiles/aninix.gpg $ gpg2 --fingerprint $key $(gpg2 --fingerprint $key) $ gpg --verify <(curl -s $canary) 2>&1 | grep 'Good signature' gpg: Good signature from "DarkFeather " [ultimate] There will most likely be other lines in the output from that last command, but as long as it says "Good signature", the verification worked correctly. EOM } function CanarySeed() { header Creating and signing a canary message time=`date +%s` # Create the canary. CreateCanary # Try signing gpg --default-key "$key" --personal-digest-preferences sha512 --clear-sign ./canary retcode=$? if [ $retcode -eq 0 ]; then header Success; else errorheader Fail; exit "$retcode"; fi # Git commit for consistent history if [ -n "$gitCommit" ]; then git add canary canary.asc git commit -m "Canary update for $(date +%F)" git push echo git log -n 1 fi # Exit exit 0 } function CanaryVerify() { # Verify a canary header Fingerprinting: ConfirmGPGKeys echo header Verification: if [ -f "$canary" ]; then canaryText="$(cat "$canary")" else canaryText="$(curl -s "$canary")" fi gpg --verify <(echo "$canaryText") 2>&1 | grep -v 'WARNING: not a detached signature' retcode=$? echo header Human-readable text: echo "$canaryText" | grep -B 99 'To verify this' | grep -v 'To verify this' exit $retcode } # Parse arguments while getopts 'c:ghk:K:svV' OPTION; do case "$OPTION" in c) canary="$OPTARG" ;; g) gitCommit=1 ;; h) echo Use this script to seed or verify a warrant canary; Usage 0 ;; k) key="$OPTARG" ;; K) keyserver="$OPTARG" ;; s) CanarySeed ;; v) set -x ;; V) CanaryVerify ;; *) Usage 1 ;; esac done CanaryVerify