Thomas Bruederli
2016-04-17 cde7a9eb74b6fd6315885c30c0763e0ee5332499
commit | author | age
2471d3 1 #!/usr/bin/env php
A 2 <?php
3 /*
4  +-----------------------------------------------------------------------+
30aa4c 5  | bin/decrypt.sh                                                        |
2471d3 6  |                                                                       |
e019f2 7  | This file is part of the Roundcube Webmail client                     |
f5e7b3 8  | Copyright (C) 2005-2009, The Roundcube Dev Team                       |
7fe381 9  |                                                                       |
T 10  | Licensed under the GNU General Public License version 3 or            |
11  | any later version with exceptions for skins & plugins.                |
12  | See the README file for a full license statement.                     |
2471d3 13  |                                                                       |
A 14  | PURPOSE:                                                              |
15  |   Decrypt the encrypted parts of the HTTP Received: headers           |
16  |                                                                       |
17  +-----------------------------------------------------------------------+
18  | Author: Tomas Tevesz <ice@extreme.hu>                                 |
19  +-----------------------------------------------------------------------+
20 */
21
f23ef1 22 /**
2471d3 23  * If http_received_header_encrypt is configured, the IP address and the
A 24  * host name of the added Received: header is encrypted with 3DES, to
25  * protect information that some could consider sensitve, yet their
26  * availability is a must in some circumstances.
27  *
28  * Such an encrypted Received: header might look like:
29  *
30  * Received: from DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ==
f23ef1 31  *  [my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4]
AM 32  *  with HTTP/1.1 (POST); Thu, 14 May 2009 19:17:28 +0200
2471d3 33  *
A 34  * In this example, the two encrypted components are the sender host name
35  * (DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ==) and the IP
36  * address (my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4).
37  *
38  * Using this tool, they can be decrypted into plain text:
39  *
30aa4c 40  * $ bin/decrypt.sh 'my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4' \
2471d3 41  * > 'DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ=='
A 42  * 84.3.187.208
43  * 5403BBD0.catv.pool.telekom.hu
44  * $
45  *
46  * Thus it is known that this particular message was sent by 84.3.187.208,
47  * having, at the time of sending, the name of 5403BBD0.catv.pool.telekom.hu.
48  *
49  * If (most likely binary) junk is shown, then
50  *  - either the encryption password has, between the time the mail was sent
f23ef1 51  *    and 'now', changed, or
2471d3 52  *  - you are dealing with counterfeit header data.
A 53  */
54
55 define('INSTALL_PATH', realpath(dirname(__FILE__).'/..') . '/');
6cc3f5 56
A 57 require INSTALL_PATH . 'program/include/clisetup.php';
2471d3 58
A 59 if ($argc < 2) {
60     die("Usage: " . basename($argv[0]) . " encrypted-hdr-part [encrypted-hdr-part ...]\n");
61 }
62
63 $RCMAIL = rcmail::get_instance();
64
65 for ($i = 1; $i < $argc; $i++) {
66     printf("%s\n", $RCMAIL->decrypt($argv[$i]));
67 };