package main import ( "bytes" "crypto/sha1" "encoding/hex" "errors" "flag" "fmt" "html/template" "io" "io/ioutil" "log" "os" "os/exec" "path/filepath" "runtime" "strings" "sync" "time" ) func hasSuffix(b, suffix []byte) bool { h := sha1.Sum(b) //log.Printf("%s =~ %s?\n", paddedHex(h[:]), paddedHex(suffix)) return bytes.HasSuffix(h[:], suffix) } func progress(perc float64, size int) string { var ( s = "[" i int d = 100.0 / float64(size) ) for ; i < int(perc/d); i++ { s += "#" } for ; i < size; i++ { s += "-" } s += "]" return fmt.Sprintf("%s %5s%%", s, fmt.Sprintf("%.1f", perc)) } func readUint32(b []byte) uint32 { return uint32(b[0])<<24 | uint32(b[1])<<16 | uint32(b[2])<<8 | uint32(b[3]) } func humanScale(f float64) string { switch { case f > 1e15: return fmt.Sprintf("%.3fP", f/1e15+.0005) case f > 1e12: return fmt.Sprintf("%.3fT", f/1e12+.0005) case f > 1e9: return fmt.Sprintf("%.3fG", f/1e9+.0005) case f > 1e6: return fmt.Sprintf("%.3fM", f/1e6+.0005) case f > 1e3: return fmt.Sprintf("%.3fk", f/1e3+.0005) default: return fmt.Sprintf("%.f", f) } } func findSuffixWorker(suffix, b []byte, ts, min, step uint32, found chan []byte, wg *sync.WaitGroup, round *uint64) { //log.Printf("worker: scan %d down to %d, step %d\n", ts, min, step) for ; ts > min; ts = ts - step { *round++ b[4] = byte(ts >> 24) b[5] = byte(ts >> 16) b[6] = byte(ts >> 8) b[7] = byte(ts) if hasSuffix(b, suffix) { found <- b return } } wg.Done() } func findSuffix(suffix, b []byte, min uint32, workers int) (bool, []byte) { ts := readUint32(b[4:]) wg := new(sync.WaitGroup) var ( round = make([]uint64, workers) found = make(chan []byte, 1) total = ts - min ) for i := 0; i < workers; i++ { wg.Add(1) // Make a copy of the slice, since all workers will manipulate wb := make([]byte, len(b)) copy(wb, b) go findSuffixWorker(suffix, wb, ts-uint32(i), min, uint32(workers), found, wg, &round[i]) } abort := make(chan struct{}, 1) go func() { wg.Wait() abort <- struct{}{} }() timer := time.NewTicker(time.Second) start := time.Now() state := func() string { delta := time.Since(start) var rounds uint64 for _, r := range round { rounds += r } return fmt.Sprintf("%s %s, %sk/s [r=%d,t=%s]\r", time.Now().Format("2006/01/02 15:04:05"), progress((float64(rounds)/float64(total))*100+.05, 20), humanScale(float64(rounds)/(float64(delta)/float64(time.Second))), rounds, delta/time.Second*time.Second) } defer func() { timer.Stop() fmt.Println(state()) }() for { select { case key := <-found: return true, key case <-abort: return false, nil case <-timer.C: os.Stdout.Write([]byte(state())) } } } func readFull(r io.Reader, buf []byte) (n int, err error) { n, err = io.ReadFull(r, buf) if err == io.EOF { err = io.ErrUnexpectedEOF } return } func paddedHex(buf []byte) string { var ( tmp = buf pad string ) for i := 0; i < len(tmp); i += 2 { pad += strings.ToUpper(hex.EncodeToString(tmp[i:i+2])) + " " } return pad[:len(pad)-1] } func readableFingerprint(packet []byte) string { hash := sha1.Sum(packet) return paddedHex(hash[:]) } func readPublicKeyPacket(packet []byte, offset int) (err error) { //log.Printf("offset: %d\n", offset) //log.Printf("packet:\n%s\n", hex.Dump(packet[:16])) if version := packet[offset]; version != 4 { return fmt.Errorf("unsupported public key version %d", version) } switch keyType := packet[offset+5]; keyType { case 1: log.Println("public key type RSA") case 2: log.Println("public key type RSA (encrypt only)") case 3: log.Println("public key type RSA (sign only)") case 16: err = errors.New("unsupported ElGamal public key") return case 17: err = errors.New("unsupported DSA public key (you suck!)") return case 18: err = errors.New("unsupported ECDH public key") return case 19: err = errors.New("unsupported ECDSA public key") return default: err = fmt.Errorf("unknown public key %#02x", keyType) return } log.Printf("public key %s\n", readableFingerprint(packet)) return } func readPacket(r io.Reader) (packet []byte, tag byte, offset int, err error) { packet = make([]byte, 1, 4096) if _, err = readFull(r, packet); err != nil { return } if packet[0]&0x80 == 0 { err = errors.New("tag byte does not have MSB set") return } if packet[0]&0x40 == 0 { tag = (packet[0] & 0x3f) >> 2 lengthType := packet[0] & 3 if lengthType == 3 { err = errors.New("packet contains no data") return } lengthBytes := 1 << lengthType //log.Printf("got %d length bytes\n", lengthBytes) packet = append(packet, make([]byte, lengthBytes)...) _, err = readFull(r, packet[1:]) if err != nil { return } //log.Printf("packet: %q (%d)\n", packet, len(packet)) var length int for i := 0; i < lengthBytes; i++ { length <<= 8 length |= int(packet[1+i]) } offset = lengthBytes + 1 packet = append(packet, make([]byte, length)...) _, err = readFull(r, packet[lengthBytes+1:]) return } err = errors.New("new packet not supported") return } var ( keyRingTemplate, _ = template.New("keyring").Parse(`Key-Type: RSA Key-Length: 4096 Subkey-Type: RSA Subkey-Length: 1024 Name-Real: {{.Name}} Name-Email: {{.Email}} Expire-Date: 0 %pubring {{.PubRing}} %secring {{.SecRing}} %commit %echo done`) ) func populateStdin(str string) func(io.WriteCloser) { return func(stdin io.WriteCloser) { defer stdin.Close() io.Copy(stdin, bytes.NewBufferString(str)) } } func generateKeyRing(bits int, name, email string) (secRing, pubRing []byte, err error) { var secFile, pubFile *os.File if secFile, err = ioutil.TempFile("", "secring"); err != nil { return } secFile.Close() if pubFile, err = ioutil.TempFile("", "pubring"); err != nil { return } pubFile.Close() defer func() { os.Remove(secFile.Name()) os.Remove(pubFile.Name()) }() log.Printf("generating %d bits RSA key for %s <%s>\n", bits, name, email) cmd := exec.Command("gpg", "--batch", "--gen-key") cmd.Stderr = os.Stderr var stdin io.WriteCloser if stdin, err = cmd.StdinPipe(); err != nil { return } if err = cmd.Start(); err != nil { return } if err = keyRingTemplate.Execute(stdin, map[string]interface{}{ "Bits": bits, "Name": name, "Email": email, "PubRing": pubFile.Name(), "SecRing": secFile.Name(), }); err != nil { return } if err = stdin.Close(); err != nil { return } if err = cmd.Wait(); err != nil { log.Panic(err) } if secRing, err = ioutil.ReadFile(secFile.Name()); err != nil { return } if l := len(secRing); l < 1024 { err = fmt.Errorf("keypair generation failed: unlikely secring size %d", l) return } if pubRing, err = ioutil.ReadFile(pubFile.Name()); err != nil { return } if l := len(pubRing); l < 1024 { err = fmt.Errorf("keypair generation failed: unlikely secring size %d", l) return } return } func saveRing(name string, pubRing, secRing []byte, ts uint32, offset, length int, uidString string) (err error) { log.Printf("saving dir %s/\n", name) if err = os.MkdirAll(name, 0700); err != nil { return } log.Printf("found match on %s\n", time.Unix(int64(ts), 0)) log.Printf("replace timestamp at +%d\n", offset) pubRing[4] = byte(ts >> 24) pubRing[5] = byte(ts >> 16) pubRing[6] = byte(ts >> 8) pubRing[7] = byte(ts) pubName := filepath.Join(name, "pubring.gpg") log.Printf("saving pubring to %s\n", pubName) if err = ioutil.WriteFile(pubName, pubRing, 0644); err != nil { return } secRing[4] = byte(ts >> 24) secRing[5] = byte(ts >> 16) secRing[6] = byte(ts >> 8) secRing[7] = byte(ts) secName := filepath.Join(name, "secring.gpg") log.Printf("saving secring to %s\n", secName) if err = ioutil.WriteFile(secName, secRing, 0600); err != nil { return } return } func find(workers, bits int, name, email string, suffix []byte, min time.Duration) (found bool, err error) { var secRing, pubRing []byte if secRing, pubRing, err = generateKeyRing(bits, name, email); err != nil { return } ringFile := bytes.NewBuffer(pubRing) var ( packet []byte tag byte offset int ) if packet, tag, offset, err = readPacket(ringFile); err != nil { log.Fatalln(err) } log.Printf("read %d bytes %#02x (%#02x) packet, offset %d\n", len(packet), tag, packet[0], offset) if !(tag == 0x05 || tag == 0x06) { log.Fatalf("packet not a private key or public key, got %#02x\n", tag) } if err = readPublicKeyPacket(packet, offset); err != nil { log.Fatalln(err) } tsMin := time.Now().Add(-min) log.Printf("scanning for suffix %s up until %s\n", paddedHex(suffix), tsMin) var ( key []byte start = time.Now() ) if found, key = findSuffix(suffix, packet, uint32(tsMin.Unix()), workers); found { delta := time.Since(start) fingerprint := readableFingerprint(key) log.Printf("public key %s found in %s\n", fingerprint, delta) uid := fmt.Sprintf("%s <%s>", name, email) err = saveRing(strings.Replace(fingerprint, " ", "", -1), pubRing, secRing, readUint32(key[4:]), offset, len(packet), uid) } return } func main() { suffixString := flag.String("suffix", "", "suffix to find") scanMin := flag.String("min", "43800h", "minimal valid timestamp") bits := flag.Int("bits", 4096, "RSA key size") name := flag.String("name", "John Doe", "name in uid") email := flag.String("email", "john.doe@example.org", "email in uid") workers := flag.Int("workers", (runtime.NumCPU()*3)/2, "number of workers") flag.Parse() if *suffixString == "" { log.Fatalln("supply a -suffix") } suffix, err := hex.DecodeString(*suffixString) if err != nil { log.Fatalf("invalid suffix %q: %v\n", *suffixString, err) } min, err := time.ParseDuration(*scanMin) if err != nil { log.Fatalf("invalid duration %q: %v\n", *scanMin, err) } for { var found bool if found, err = find(*workers, *bits, *name, *email, suffix, min); err != nil { log.Fatalln(err) } if found { break } log.Println("... not found, next round!") } }