12
11
<title>Mandos Manual</title>
13
12
<!-- NWalsh’s docbook scripts use this to generate the footer: -->
14
13
<productname>Mandos</productname>
15
<productnumber>&version;</productnumber>
14
<productnumber>&VERSION;</productnumber>
16
15
<date>&TIMESTAMP;</date>
19
18
<firstname>Björn</firstname>
20
19
<surname>Påhlsson</surname>
22
<email>belorn@recompile.se</email>
21
<email>belorn@fukt.bsnet.se</email>
26
25
<firstname>Teddy</firstname>
27
26
<surname>Hogeborn</surname>
29
<email>teddy@recompile.se</email>
28
<email>teddy@fukt.bsnet.se</email>
38
34
<holder>Teddy Hogeborn</holder>
39
35
<holder>Björn Påhlsson</holder>
41
<xi:include href="legalnotice.xml"/>
39
This manual page is free software: you can redistribute it
40
and/or modify it under the terms of the GNU General Public
41
License as published by the Free Software Foundation,
42
either version 3 of the License, or (at your option) any
47
This manual page is distributed in the hope that it will
48
be useful, but WITHOUT ANY WARRANTY; without even the
49
implied warranty of MERCHANTABILITY or FITNESS FOR A
50
PARTICULAR PURPOSE. See the GNU General Public License
55
You should have received a copy of the GNU General Public
56
License along with this program; If not, see
57
<ulink url="http://www.gnu.org/licenses/"/>.
45
63
<refentrytitle>&COMMANDNAME;</refentrytitle>
46
64
<manvolnum>8</manvolnum>
170
178
</refsynopsisdiv>
172
180
<refsect1 id="description">
173
181
<title>DESCRIPTION</title>
175
183
<command>&COMMANDNAME;</command> is a program to generate the
177
<citerefentry><refentrytitle>mandos-client</refentrytitle>
178
<manvolnum>8mandos</manvolnum></citerefentry>. The key is
185
<citerefentry><refentrytitle>password-request</refentrytitle>
186
<manvolnum>8mandos</manvolnum></citerefentry>. The keys are
179
187
normally written to /etc/mandos for later installation into the
180
initrd image, but this, and most other things, can be changed
181
with command line options.
188
initrd image, but this, like most things, can be changed with
189
command line options.
184
This program can also be used with the
185
<option>--password</option> or <option>--passfile</option>
186
options to generate a ready-made section for
187
<filename>clients.conf</filename> (see
192
It can also be used to generate ready-made sections for
188
193
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
189
<manvolnum>5</manvolnum></citerefentry>).
194
<manvolnum>5</manvolnum></citerefentry> using the
195
<option>--password</option> option.
193
199
<refsect1 id="purpose">
194
200
<title>PURPOSE</title>
196
203
The purpose of this is to enable <emphasis>remote and unattended
197
204
rebooting</emphasis> of client host computer with an
198
205
<emphasis>encrypted root file system</emphasis>. See <xref
199
206
linkend="overview"/> for details.
203
211
<refsect1 id="options">
204
212
<title>OPTIONS</title>
208
<term><option>--help</option></term>
209
<term><option>-h</option></term>
216
<term><literal>-h</literal>, <literal>--help</literal></term>
212
219
Show a help message and exit
219
<replaceable>DIRECTORY</replaceable></option></term>
221
<replaceable>DIRECTORY</replaceable></option></term>
225
<term><literal>-d</literal>, <literal>--dir
226
<replaceable>directory</replaceable></literal></term>
224
229
Target directory for key files. Default is
225
<filename class="directory">/etc/mandos</filename>.
232
<replaceable>TYPE</replaceable></option></term>
234
<replaceable>TYPE</replaceable></option></term>
237
Key type. Default is <quote>RSA</quote>.
243
<term><option>--length
244
<replaceable>BITS</replaceable></option></term>
246
<replaceable>BITS</replaceable></option></term>
249
Key length in bits. Default is 4096.
255
<term><option>--subtype
256
<replaceable>KEYTYPE</replaceable></option></term>
258
<replaceable>KEYTYPE</replaceable></option></term>
261
Subkey type. Default is <quote>RSA</quote> (Elgamal
230
<filename>/etc/mandos</filename>.
236
<term><literal>-t</literal>, <literal>--type
237
<replaceable>type</replaceable></literal></term>
240
Key type. Default is <quote>DSA</quote>.
246
<term><literal>-l</literal>, <literal>--length
247
<replaceable>bits</replaceable></literal></term>
250
Key length in bits. Default is 2048.
256
<term><literal>-s</literal>, <literal>--subtype
257
<replaceable>type</replaceable></literal></term>
260
Subkey type. Default is <quote>ELG-E</quote> (Elgamal
262
261
encryption-only).
268
<term><option>--sublength
269
<replaceable>BITS</replaceable></option></term>
271
<replaceable>BITS</replaceable></option></term>
267
<term><literal>-L</literal>, <literal>--sublength
268
<replaceable>bits</replaceable></literal></term>
274
Subkey length in bits. Default is 4096.
271
Subkey length in bits. Default is 2048.
280
<term><option>--email
281
<replaceable>ADDRESS</replaceable></option></term>
283
<replaceable>ADDRESS</replaceable></option></term>
277
<term><literal>-e</literal>, <literal>--email</literal>
278
<replaceable>address</replaceable></term>
286
281
Email address of key. Default is empty.
292
<term><option>--comment
293
<replaceable>TEXT</replaceable></option></term>
295
<replaceable>TEXT</replaceable></option></term>
287
<term><literal>-c</literal>, <literal>--comment</literal>
288
<replaceable>comment</replaceable></term>
298
Comment field for key. Default is empty.
291
Comment field for key. The default value is
292
<quote><literal>Mandos client key</literal></quote>.
304
<term><option>--expire
305
<replaceable>TIME</replaceable></option></term>
307
<replaceable>TIME</replaceable></option></term>
298
<term><literal>-x</literal>, <literal>--expire</literal>
299
<replaceable>time</replaceable></term>
310
302
Key expire time. Default is no expiration. See
337
328
>8</manvolnum></citerefentry>. The host name or the name
338
329
specified with the <option>--name</option> option is used
339
330
for the section header. All other options are ignored,
340
and no key is created.
345
<term><option>--passfile
346
<replaceable>FILE</replaceable></option></term>
348
<replaceable>FILE</replaceable></option></term>
351
The same as <option>--password</option>, but read from
352
<replaceable>FILE</replaceable>, not the terminal.
357
<term><option>--no-ssh</option></term>
358
<term><option>-S</option></term>
361
When <option>--password</option> or
362
<option>--passfile</option> is given, this option will
363
prevent <command>&COMMANDNAME;</command> from calling
364
<command>ssh-keyscan</command> to get an SSH fingerprint
365
for this host and, if successful, output suitable config
366
options to use this fingerprint as a
367
<option>checker</option> option in the output. This is
368
otherwise the default behavior.
331
and no keys are created.
375
338
<refsect1 id="overview">
376
339
<title>OVERVIEW</title>
377
340
<xi:include href="overview.xml"/>
379
342
This program is a small utility to generate new OpenPGP keys for
380
new Mandos clients, and to generate sections for inclusion in
381
<filename>clients.conf</filename> on the server.
385
347
<refsect1 id="exit_status">
386
348
<title>EXIT STATUS</title>
388
The exit status will be 0 if a new key (or password, if the
389
<option>--password</option> option was used) was successfully
390
created, otherwise not.
350
The exit status will be 0 if new keys were successfully created,
475
437
</informalexample>
478
Prompt for a password, encrypt it with the key in <filename
479
class="directory">/etc/mandos</filename> and output a section
480
suitable for <filename>clients.conf</filename>.
483
<userinput>&COMMANDNAME; --password</userinput>
488
Prompt for a password, encrypt it with the key in the
489
<filename>client-key</filename> directory and output a section
490
suitable for <filename>clients.conf</filename>.
494
<!-- do not wrap this line -->
495
<userinput>&COMMANDNAME; --password --dir client-key</userinput>
501
440
<refsect1 id="security">
502
441
<title>SECURITY</title>
504
443
The <option>--type</option>, <option>--length</option>,
505
444
<option>--subtype</option>, and <option>--sublength</option>
506
options can be used to create keys of low security. If in
507
doubt, leave them to the default values.
445
options can be used to create keys of insufficient security. If
446
in doubt, leave them to the default values.
510
The key expire time is <emphasis>not</emphasis> guaranteed to be
511
honored by <citerefentry><refentrytitle>mandos</refentrytitle>
449
The key expire time is not guaranteed to be honored by
450
<citerefentry><refentrytitle>mandos</refentrytitle>
512
451
<manvolnum>8</manvolnum></citerefentry>.
516
455
<refsect1 id="see_also">
517
456
<title>SEE ALSO</title>
519
<citerefentry><refentrytitle>intro</refentrytitle>
520
<manvolnum>8mandos</manvolnum></citerefentry>,
521
458
<citerefentry><refentrytitle>gpg</refentrytitle>
522
459
<manvolnum>1</manvolnum></citerefentry>,
523
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
524
<manvolnum>5</manvolnum></citerefentry>,
525
460
<citerefentry><refentrytitle>mandos</refentrytitle>
526
461
<manvolnum>8</manvolnum></citerefentry>,
527
<citerefentry><refentrytitle>mandos-client</refentrytitle>
528
<manvolnum>8mandos</manvolnum></citerefentry>,
529
<citerefentry><refentrytitle>ssh-keyscan</refentrytitle>
530
<manvolnum>1</manvolnum></citerefentry>
462
<citerefentry><refentrytitle>password-request</refentrytitle>
463
<manvolnum>8mandos</manvolnum></citerefentry>