Easy GnuPG

Reading time ~11 minutes

Easy GnuPG

Easy GnuPG

1 What is GnuPG

GnuPG (GNU Privacy Guard) is a complete and free implementation of the OpenPGP standard. It allows you to encrypt and sign your data and communications.

GnuPG has scads of options which make it a flexible and powerful encryption framework. However this also makes it extremely complicated to get started with, and that quite reasonably puts people off.

I have tried to use GnuPG since a long time ago, spent a lot of time reading detailed and complicated tutorials, manuals etc. and still I find myself lost when trying to use GnuPG.

Some of the problems with GnuPG (in my opinion) are these:

  • The gpg command is monolithic, bloated with functionality and options.
  • The docs are not clearly structured.
  • The number of commands and options is huge.
  • There is no clear distinction between the commands and the options.
  • The supported use cases are not so clear (it tries to support everything).
  • The terminology is a bit confusing and counter-intuitive.

2 What is EasyGnuPG

EasyGnuPG is a wrapper script that aims to simplify the process of using GnuPG. It tries to offer:

  • a simpler interface
  • with much less commands and options
  • better organized and structured
  • with a more intuitive terminology
  • with a modular construction
  • that is also easy to customize, adapt and extend

3 EasyGnuPG is opinionated

In order to simplify things, EasyGnuPG is opinionated about the "right" way to use GnuPG. This means that while GPG offers lots of options and flexibility to perform a certain task, EGPG uses just a sensible default way, in order to keep things simple and not to bewilder the user with countless choices.

For example, when you create a new key in GPG you have to specify a lot of options, most of which make no sense for a beginner, so they will just use the defaults anyway. EGPG on the other hand, just asks for a name and an email address, filling up the rest with reasonable default values. Not only that, but it also goes on and generates automatically the needed subkeys, according to well known recommendations and best practices of using GPG.

Or, when encrypting a file, it also automatically signs it, encrypts it to the author as well, and generates the output in the text format (ASCII armored), which is more universal than the binary format.

This simplicity makes it easier for the beginners to get started.

At the same time, the selected subset of operations and features covers most of the common cases of usage, so hopefully it should be sufficient for the everyday needs of most of the users.

4 EGPG integrates seamlessly with GPG

In case users need to use some advanced features or commands which are not supported by EGPG, they can go on and use GPG itself at any time, because EGPG also integrates seamlessly with GPG.

So, the reduced set of supported operations and features, while being convenient for everyday usage, does not limit or prevent users for doing more advanced or complex things.

For example, if you want to do some extra editing to the key, which can't be done with EGPG due to its limited set of functionality, you can do it like this:

egpg gpg --edit-key 562AC309C01D2DBD

Running gpg as a subcommand of egpg will ensure that it uses the same environment (GNUPGHOME) as egpg.

Also, when initiating a new EGPG environment (with egpg init), you can migrate all the data from an existing GPG or EGPG environment (with egpg migrate).

Or you can fetch (pick up) only certain keys or contacts (public keys). For example:

egpg key fetch -k 01D532A283DC1CBF
egpg contact fetch 01D532A283DC1CBF

5 EGPG has a clear and intuitive terminology

One of the things that confuses people while using GPG is the overloaded and unclear terminology about keys, about signatures, etc. EGPG tries to improve this by making a clear distinction between the private keys and the public keys.

In EGPG there is only one primary key, which is used for signing, and a subkey which is used for decryption. All the public keys are called contacts, since they contain the names and email addresses of the people that you use to communicate (either send them encrypted messages or verify their signatures).

If you say public key to a beginner, you will also have to explain to him some cryptographic details and how public keys should be used. But if you say contact everybody gets that it contains details that enable and facilitate communication.

Also, it makes more sense when you certify and trust a contact, rather than editing a key and changing its certification and trust levels.

6 EGPG is transparent and auditable

Being built as a set of shell scripts, EGPG is quite transparent and auditable (different from a GUI for example, or a web service). If you are concerned about what it does, open up the files and read them, or have someone you trust read them.

The size of the main script is less than 250 lines, well within the reach of most of the users. Most of the commands are implemented on their own script, and these scripts are about 50 lines long on average.

7 EGPG commands

The set of commands and options of EGPG is well structured and intuitive. There are commands for:

  • working with files (for signing and encryption)
  • managing the key
  • managing contacts
  • other extra commands

EGPG file commands:

egpg seal <file> [<recipient>...]
    Sign and encrypt a file. The resulting file will have the
    extension '.sealed'. The original file will be erased.

egpg open <file.sealed>
    Decrypt and verify the signature of the given file.
    The file has to end with '.sealed' and the output will have
    that extension stripped.

egpg sign <file>
    Sign a file. The signature will be saved to <file.signature>.

egpg verify <file.signature>
    Verify the signature. The signed file must be present as well.

The key commands include:

  • generate a new key or fetch an existing one
  • to backup and restore the key
  • to split and join the key
  • to generate a revocation certificate
  • to revoke the key
  • to delete the key

The commands about contacts include:

  • commands to search and receive contacts from the keyserver network
  • to export and import from files
  • to fetch from existing GPG/EGPG directories
  • to certify and trust

8 Managing the keys

To keep things simple, EGPG supports only one private key per directory.

But there are ways to use several keys if needed. For example it can be done by using several EGPG directories/configurations, which can work in parallel and independently of each-other.

This is a design decision and is on purpose, not only for simplicity, but also because when you need more than one key, you usually use them in different contexts. So, it makes more sense to keep and manage them separately and independently of each-other, which could also help to avoid any confusion or mistakes when using them.

9 EGPG extends the features of GPG

EGPG combines the features of GPG with external tools/commands in order to achieve better results or to be more user-friendly.

For example, when making the backup of the key, the output is produced as a PDF file with a 2D barcode, which can be printed on paper and stored away on a safe place. Later this can be easily scanned back to digital format and restored.

This is achieved by exporting the key from GPG in ASCII armor format, then using a bunch of Linux commands and tools, like qrencode and convert, to convert it to the proper PDF format.

There is nothing that cannot be done manually or with a shell script, but EGPG already automates things for you in a single command, so that you can immediately take advantage of best practices and recommendations.

Another example is printing the fingerprint of the key as a 2D barcode and picking it up from the camera. This can simplify the exchange of keys in mobile phones, if people have physical contact.

For example in a meeting one of them can show the code on the screen, and the other one can scan it from the camera, and automatically fetch the details from a keyserver. Or the fingerprint can be printed as a 2D barcode on a business card, and scanned from there.

Yet another example is moving the main key (that is used for signing and certification) to a dongle (USB flash drive), for portability and security (the USB flash drive should be encrypted). This is done with the external command:

egpg key2dongle

10 Splitting the key

You can split a key into 3 partial keys, so that any 2 of them can be combined to recreate the original key (but a single one is not enough).

EGPG takes advantage of this to save a partial key on the local machine and another partial on a dongle (USB flash drive, removable device). The third partial key is used as a backup, to recover the full key in case that the dongle or the computer is lost, and it can be stored for example on a cloud account.

Splitting the key into partial keys makes key management safer and more robust. In case that you loose the dongle, the key is not deconspired, because a single partial key is not enough to reconstruct the full key.

The same goes for the backup partial key; you can store it on cloud and if somebody manages to get it, they still cannot get your key.

Similarly, if you loose the dongle or change the PC, you still can recover the key using the remaining partial key and the backup partial key.

EGPG manages all this with simple commands:

egpg key split [-d,--dongle <dir>] [-b,--backup <dir>]
    Split the key into 3 partial keys and store one of them on the
    dongle (removable device, usb), keep the other one locally,
    and use the third one as a backup. Afterwards, whenever the
    key needs to be used, the dongle has to be present.

egpg key join
    Join two partial keys into a full key and delete the partials.

egpg key recover <backup-partial.key.xyz>
    Recover the key from the backup partial key and from the
    partial key of the home or the dongle. This is useful when
    either the dongle or the home partial key is lost.

11 EGPG can work on any platform

The file platform.sh contains a couple of functions that can be platform dependent. The platform is detected automatically and these functions are overridden with the right implementation for the current platform.

So, EGPG is flexible enough to potentially work on any platform. However, currently it has been tested only on Ubuntu and Debian.

12 EGPG is customizable and extensible

If EGPG doesn't fit your workflow, you can adapt and extend it to fit your way of doing things. You can also share your extensions with the others, in the form of external commands.

The file $EGPG_DIR/customize.sh can be used to redefine and customize some functions, without having to touch the code of the main script.

External command example can be overridden (or defined) by adding the file $EGPG_DIR/cmd_example.sh, which contains the function cmd_example() { . . . }. For an external command the script will look:

  • first for $EGPG_DIR/cmd_example.sh
  • then for $LIB/ext/$PLATFORM/cmd_command.sh
  • and finally for $LIB/ext/cmd_command.sh

The first that is found is loaded and used. For commands about the key the name of the file must be cmd_key_example.sh For commands about contacts it must be cmd_contact_example.sh

13 EGPG enables scripting

I think that it is time to stop writting detailed tutorials with best practices on how to use GPG on certain situations. Write instead scripts (in EGPG or some other framework) that automate these processes.

GPG itself does not facilitate writing such scripts and EGPG tries to improve this.

14 EGPG criticism

The EGPG critics have expressed their concerns that since EGPG is just a wrapper script to GPG, it is too fragile. This is so because the GPG command line was meant to be an interactive tool, not a streamline tool that can be easily combined with other tools. As such, its output format can change at any time, and even small changes can break EGPG.

A possible defense argument can be that EGPG should be used only with stable releases of Linux distributions, which by definition don't change the major versions of their supported tools and utilities and allow only for bug and security fixes. So, the chances of EGPG being broken are small, and it needs to be updated/fixed only for every next stable release (which does not occur too frequently).

Nevertheless the problem still exists and the recommended solution is to re-implement parts of EGPG with Python bindings of GPGME (which is a library for doing GPG stuff).

15 EGPG improvements

There is a proposed project on GSoC about possible improvements to EGPG: https://wiki.debian.org/SummerOfCode2018/Projects/EasyGnuPG I am looking for co-mentors, and of course for interested students.

Some of the potential improvements are:

  • Rewrite EasyGnuPG (or parts of it) so that it is built with Python and GPGME (https://www.gnupg.org/software/gpgme/)
  • Implement a GUI to EasyGnuPG (maybe with Python).
  • Extend EasyGnuPG with scripts/commands that automate other common usage scenarios (for example keeping the master key on a card).
  • Make a Debian package for installing EasyGnuPG.

Date: 2018-01-26

Author: Dashamir Hoxha

Created: 2019-01-24 Thu 05:13

Emacs 25.1.1 (Org mode 8.2.10)

Validate

OpenPGP Web Key Directory

OpenPGP Web Key DirectoryOpenPGP Web Key DirectoryTable of Contents1. Introduction2. How WKD works3. Building a WKD3.1. Create the direct...… Continue reading

SMTP Server with LDAP Authentication

Published on April 17, 2021

Using WireGuard VPN

Published on November 09, 2020