7
Debian 8.0 "jessie" or Ubuntu 15.10 "Wily Werewolf" (or later).
9
This is mostly for the support scripts which make sure that the
10
client is installed and started in the initial RAM disk environment
11
and that the initial RAM file system image file is automatically
12
made unreadable. The server and client programs themselves *could*
13
be run in other distributions, but they *are* specific to GNU/Linux
14
systems, and are not written with portabillity to other Unixes in
7
Debian 5.0 "lenny" or Ubuntu 8.04 "Hardy Heron".
9
This is mostly for scripts to make sure that the client is
10
installed and started in the initial RAM disk environment and that
11
the initrd.img file is automatically made unreadable. The programs
12
themselves *could* be run in other distributions, but they *are*
13
specific to GNU/Linux systems, and not intended to be portable to
19
18
The following libraries and packages are needed. (It is possible
28
27
+ DocBook 4.5 http://www.docbook.org/
29
Note: DocBook 5.0 is not compatible.
30
28
+ DocBook XSL stylesheets 1.71.0
31
http://wiki.docbook.org/DocBookXslStylesheets
29
http://wiki.docbook.org/topic/DocBookXslStylesheets
34
32
docbook docbook-xsl
36
To build just the documentation, run the command "make doc". Then
37
the manual page "mandos.8", for example, can be read by running
41
+ GnuTLS 3.3 http://www.gnutls.org/
35
+ GnuTLS 2.4 http://www.gnu.org/software/gnutls/
42
36
+ Avahi 0.6.16 http://www.avahi.org/
43
+ Python 2.7 https://www.python.org/
37
+ Python 2.4 http://www.python.org/
38
+ Python-GnuTLS 1.1.5 http://pypi.python.org/pypi/python-gnutls/
44
39
+ dbus-python 0.82.4 http://dbus.freedesktop.org/doc/dbus-python/
45
+ PyGObject 2.14.2 https://developer.gnome.org/pygobject/
46
+ pkg-config http://www.freedesktop.org/wiki/Software/pkg-config/
47
+ Urwid 1.0.1 http://urwid.org/
48
(Only needed by the "mandos-monitor" tool.)
40
+ python-ctypes 1.0.0 http://pypi.python.org/pypi/ctypes
50
42
Strongly recommended:
51
+ fping 2.4b2-to-ipv6 http://www.fping.org/
52
+ ssh-keyscan from OpenSSH http://www.openssh.com/
43
+ fping 2.4b2-to-ipv6 http://www.fping.com/
55
avahi-daemon python python-avahi python-dbus python-gobject
56
python-urwid pkg-config fping ssh-client
46
python-gnutls avahi-daemon python2.5 python-avahi python-dbus
59
+ GNU C Library 2.16 https://gnu.org/software/libc/
60
50
+ initramfs-tools 0.85i
61
https://tracker.debian.org/pkg/initramfs-tools
62
+ GnuTLS 3.3 http://www.gnutls.org/
63
+ Avahi 0.6.16 http://www.avahi.org/
64
+ GnuPG 1.4.9 https://www.gnupg.org/
65
+ GPGME 1.1.6 https://www.gnupg.org/related_software/gpgme/
66
+ pkg-config http://www.freedesktop.org/wiki/Software/pkg-config/
69
+ OpenSSH http://www.openssh.com/
51
http://packages.qa.debian.org/i/initramfs-tools.html
52
+ GnuTLS 2.4 http://www.gnu.org/software/gnutls/
53
+ Avahi 0.6.16 http://www.avahi.org/
54
+ GnuPG 1.4.9 http://www.gnupg.org/
55
+ GPGME 1.1.6 http://www.gnupg.org/related_software/gpgme/
72
58
initramfs-tools libgnutls-dev libavahi-core-dev gnupg
73
libgpgme11-dev pkg-config ssh
75
61
* Installing the Mandos server
79
65
2. On the computer to run as a Mandos server, run the following
81
For Debian: su -c 'make install-server'
82
For Ubuntu: sudo make install-server
84
(This creates a configuration without any clients configured; you
66
command: "sudo make install-server".
68
(This creates a configuration without any clients configured; we
85
69
need an actually configured client to do that; see below.)
87
71
* Installing the Mandos client.
89
73
1. Do "make all doc".
91
75
2. On the computer to run as a Mandos client, run the following
93
For Debian: su -c 'make install-client'
94
For Ubuntu: sudo make install-client
96
This will also create an OpenPGP key, which will take some time
97
and entropy, so be patient.
99
3. Run the following command:
100
For Debian: su -c 'mandos-keygen --password'
101
For Ubuntu: sudo mandos-keygen --password
103
When prompted, enter the password/passphrase for the encrypted
104
root file system on this client computer. The command will
105
output a section of text, starting with a [section header]. Copy
106
and append this to the file "/etc/mandos/clients.conf" *on the
109
4. Configure the client to use any special configuration needed for
110
your local system. Note: This is not necessary if the server is
111
present on the same wired local network as the client. If you do
112
make changes to /etc/mandos/plugin-runner.conf, the initrd.img
113
file must be updated, possibly using the following command:
115
# update-initramfs -k all -u
117
5. On the server computer, start the server by running the command
118
For Debian: su -c 'invoke-rc.d mandos start'
119
For Ubuntu: sudo service mandos start
121
At this point, it is possible to verify that the correct password
122
will be received by the client by running the command:
124
# /usr/lib/mandos/plugins.d/mandos-client \
125
--pubkey=/etc/keys/mandos/pubkey.txt \
126
--seckey=/etc/keys/mandos/seckey.txt; echo
128
This command should retrieve the password from the server,
129
decrypt it, and output it to standard output.
131
After this, the client computer should be able to reboot without
132
needing a password entered on the console, as long as it does not
133
take more than five minutes to reboot.
76
command: "sudo make install-client". This will also create an
77
OpenPGP key, which will take some time and entropy, so either
78
wait patiently or frob your mouse until it's done.
80
3. Run "mandos-keygen --password". When prompted, enter the
81
password/passphrase for the encrypted root file system on this
82
client computer. It will output a section of text, starting with
83
a [section header]. Copy and paste this into the file
84
"/etc/mandos/clients.conf" *on the server computer*.
86
4. On the server computer, start the server by running the command
87
"invoke-rc.d mandos start".
135
89
* Further customizations
137
91
You may want to tighten or loosen the timeouts in the server
138
92
configuration files; see mandos.conf(5) and mandos-clients.conf(5).
139
If IPsec is not used and SSH is not installed, it is suggested that
140
a more cryptographically secure checker program is used and
141
configured, since, without IPsec, ping packets can be faked.
93
Is IPsec is not used, it is suggested that a more cryptographically
94
secure checker program is used and configured, since without IPsec
95
ping packets can be faked.