// ImportFromLibOTR parses the contents of a libotr private key file and imports all the keys found. func ImportFromLibOTR(in []byte) []otr.PrivateKey { acctStart := []byte("(account") ret := []otr.PrivateKey{} var i, p int for { i = bytes.Index(in[p:], acctStart) if i == -1 { break } p += i + len(acctStart) key := otr.PrivateKey{} if key.Import(in[p:]) { ret = append(ret, key) } } return ret }
func enroll(config *Config, term *terminal.Terminal) bool { var err error warn(term, "Enrolling new config file") var domain string for { term.SetPrompt("Account (i.e. [email protected], enter to quit): ") if config.Account, err = term.ReadLine(); err != nil || len(config.Account) == 0 { return false } parts := strings.SplitN(config.Account, "@", 2) if len(parts) != 2 { alert(term, "invalid username (want user@domain): "+config.Account) continue } domain = parts[1] break } term.SetPrompt("Resource name (i.e. work, enter for empty): ") if config.Resource, err = term.ReadLine(); err != nil { return false } const debugLogFile = "/tmp/xmpp-client-debug.log" term.SetPrompt("Enable debug logging to " + debugLogFile + " (y/n)?: ") if debugLog, err := term.ReadLine(); err != nil || !isYes(debugLog) { info(term, "Not enabling debug logging...") } else { config.RawLogFile = debugLogFile info(term, "Debug logging enabled.") } term.SetPrompt("Use Tor (y/n)?: ") if useTorQuery, err := term.ReadLine(); err != nil || !isYes(useTorQuery) { info(term, "Not using Tor...") config.UseTor = false } else { info(term, "Using Tor...") config.UseTor = true } term.SetPrompt("File to import libotr private key from (enter to generate): ") var priv otr.PrivateKey for { importFile, err := term.ReadLine() if err != nil { return false } if len(importFile) > 0 { privKeyBytes, err := ioutil.ReadFile(importFile) if err != nil { alert(term, "Failed to open private key file: "+err.Error()) continue } if !priv.Import(privKeyBytes) { alert(term, "Failed to parse libotr private key file (the parser is pretty simple I'm afraid)") continue } break } else { info(term, "Generating private key...") priv.Generate(rand.Reader) break } } config.PrivateKey = priv.Serialize(nil) config.OTRAutoAppendTag = true config.OTRAutoStartSession = true config.OTRAutoTearDown = false // List well known Tor hidden services. knownTorDomain := map[string]string{ "jabber.ccc.de": "okj7xc6j2szr2y75.onion", "riseup.net": "4cjw6cwpeaeppfqz.onion", "jabber.calyxinstitute.org": "ijeeynrc6x2uy5ob.onion", "jabber.otr.im": "5rgdtlawqkcplz75.onion", "wtfismyip.com": "ofkztxcohimx34la.onion", "rows.io": "yz6yiv2hxyagvwy6.onion", } // Autoconfigure well known Tor hidden services. if hiddenService, ok := knownTorDomain[domain]; ok && config.UseTor { const torProxyURL = "socks5://127.0.0.1:9050" info(term, "It appears that you are using a well known server and we will use its Tor hidden service to connect.") config.Server = hiddenService config.Port = 5222 config.Proxies = []string{torProxyURL} term.SetPrompt("> ") return true } var proxyStr string proxyDefaultPrompt := ", enter for none" if config.UseTor { proxyDefaultPrompt = ", which is the default" } term.SetPrompt("Proxy (i.e socks5://127.0.0.1:9050" + proxyDefaultPrompt + "): ") for { if proxyStr, err = term.ReadLine(); err != nil { return false } if len(proxyStr) == 0 { if !config.UseTor { break } else { proxyStr = "socks5://127.0.0.1:9050" } } u, err := url.Parse(proxyStr) if err != nil { alert(term, "Failed to parse "+proxyStr+" as a URL: "+err.Error()) continue } if _, err = proxy.FromURL(u, proxy.Direct); err != nil { alert(term, "Failed to parse "+proxyStr+" as a proxy: "+err.Error()) continue } break } if len(proxyStr) > 0 { config.Proxies = []string{proxyStr} info(term, "Since you selected a proxy, we need to know the server and port to connect to as a SRV lookup would leak information every time.") term.SetPrompt("Server (i.e. xmpp.example.com, enter to lookup using unproxied DNS): ") if config.Server, err = term.ReadLine(); err != nil { return false } if len(config.Server) == 0 { var port uint16 info(term, "Performing SRV lookup") if config.Server, port, err = xmpp.Resolve(domain); err != nil { alert(term, "SRV lookup failed: "+err.Error()) return false } config.Port = int(port) info(term, "Resolved "+config.Server+":"+strconv.Itoa(config.Port)) } else { for { term.SetPrompt("Port (enter for 5222): ") portStr, err := term.ReadLine() if err != nil { return false } if len(portStr) == 0 { portStr = "5222" } if config.Port, err = strconv.Atoi(portStr); err != nil || config.Port <= 0 || config.Port > 65535 { info(term, "Port numbers must be 0 < port <= 65535") continue } break } } } term.SetPrompt("> ") return true }