Mercurial > hg > rc1
comparison bin/decrypt.sh @ 0:1e000243b222
vanilla 1.3.3 distro, I hope
author | Charlie Root |
---|---|
date | Thu, 04 Jan 2018 15:50:29 -0500 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:1e000243b222 |
---|---|
1 #!/usr/bin/env php | |
2 <?php | |
3 /* | |
4 +-----------------------------------------------------------------------+ | |
5 | bin/decrypt.sh | | |
6 | | | |
7 | This file is part of the Roundcube Webmail client | | |
8 | Copyright (C) 2005-2009, The Roundcube Dev Team | | |
9 | | | |
10 | Licensed under the GNU General Public License version 3 or | | |
11 | any later version with exceptions for skins & plugins. | | |
12 | See the README file for a full license statement. | | |
13 | | | |
14 | PURPOSE: | | |
15 | Decrypt the encrypted parts of the HTTP Received: headers | | |
16 | | | |
17 +-----------------------------------------------------------------------+ | |
18 | Author: Tomas Tevesz <ice@extreme.hu> | | |
19 +-----------------------------------------------------------------------+ | |
20 */ | |
21 | |
22 /** | |
23 * If http_received_header_encrypt is configured, the IP address and the | |
24 * host name of the added Received: header is encrypted with 3DES, to | |
25 * protect information that some could consider sensitve, yet their | |
26 * availability is a must in some circumstances. | |
27 * | |
28 * Such an encrypted Received: header might look like: | |
29 * | |
30 * Received: from DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ== | |
31 * [my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4] | |
32 * with HTTP/1.1 (POST); Thu, 14 May 2009 19:17:28 +0200 | |
33 * | |
34 * In this example, the two encrypted components are the sender host name | |
35 * (DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ==) and the IP | |
36 * address (my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4). | |
37 * | |
38 * Using this tool, they can be decrypted into plain text: | |
39 * | |
40 * $ bin/decrypt.sh 'my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4' \ | |
41 * > 'DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ==' | |
42 * 84.3.187.208 | |
43 * 5403BBD0.catv.pool.telekom.hu | |
44 * $ | |
45 * | |
46 * Thus it is known that this particular message was sent by 84.3.187.208, | |
47 * having, at the time of sending, the name of 5403BBD0.catv.pool.telekom.hu. | |
48 * | |
49 * If (most likely binary) junk is shown, then | |
50 * - either the encryption password has, between the time the mail was sent | |
51 * and 'now', changed, or | |
52 * - you are dealing with counterfeit header data. | |
53 */ | |
54 | |
55 define('INSTALL_PATH', realpath(__DIR__ .'/..') . '/'); | |
56 | |
57 require INSTALL_PATH . 'program/include/clisetup.php'; | |
58 | |
59 if ($argc < 2) { | |
60 die("Usage: " . basename($argv[0]) . " encrypted-hdr-part [encrypted-hdr-part ...]\n"); | |
61 } | |
62 | |
63 $RCMAIL = rcube::get_instance(); | |
64 | |
65 for ($i = 1; $i < $argc; $i++) { | |
66 printf("%s\n", $RCMAIL->decrypt($argv[$i])); | |
67 }; |