blob: 959918d2da731ec7a6d36805722e1de296b3019c (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
|
use std::{
env,
io,
time::Duration,
};
use sequoia_openpgp::{
self as openpgp,
Fingerprint,
Result,
serialize::Serialize,
};
use sequoia_net::KeyServer;
#[tokio::main]
async fn main() -> Result<()> {
let handle: Fingerprint = env::args()
.nth(1).expect("Usage: tor-hkp-get <FINGERPRINT>")
.parse()?;
// Select a fresh circuit by providing a random username/password
// combination to Tor.
let mut nonce = [0; 4];
openpgp::crypto::random(&mut nonce[..]);
let nonce = openpgp::fmt::hex::encode(&nonce);
let proxy_url = format!("socks5h://anonymous:{}@127.0.0.1:9050", nonce);
// Create a reqwest::Client with appropriate timeouts for Tor, and
// set the local Tor client as SOCKS5 proxy.
let client = reqwest::Client::builder()
.connect_timeout(Duration::new(10, 0))
.timeout(Duration::new(10, 0))
.proxy(reqwest::Proxy::all(proxy_url)?)
.build()?;
// Connect to keys.openpgp.org over Tor.
let keyserver = KeyServer::with_client(
"hkp://zkaan2xfbuxia2wpf7ofnkbz6r5zdbbvxbunvp5g2iebopbfc4iqmbad.onion",
client)?;
// Finally, get the requested certificate.
keyserver.get(handle).await?.armored().serialize(&mut io::stdout())?;
Ok(())
}
|