3
3
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4
4
<!ENTITY VERSION "1.0">
5
5
<!ENTITY COMMANDNAME "mandos-keygen">
6
<!ENTITY TIMESTAMP "2008-08-31">
6
<!ENTITY TIMESTAMP "2008-09-12">
9
9
<refentry xmlns:xi="http://www.w3.org/2001/XInclude">
34
34
<holder>Teddy Hogeborn</holder>
35
35
<holder>Björn Påhlsson</holder>
39
This manual page is free software: you can redistribute it
40
and/or modify it under the terms of the GNU General Public
41
License as published by the Free Software Foundation,
42
either version 3 of the License, or (at your option) any
47
This manual page is distributed in the hope that it will
48
be useful, but WITHOUT ANY WARRANTY; without even the
49
implied warranty of MERCHANTABILITY or FITNESS FOR A
50
PARTICULAR PURPOSE. See the GNU General Public License
55
You should have received a copy of the GNU General Public
56
License along with this program; If not, see
57
<ulink url="http://www.gnu.org/licenses/"/>.
37
<xi:include href="legalnotice.xml"/>
63
41
<refentrytitle>&COMMANDNAME;</refentrytitle>
64
42
<manvolnum>8</manvolnum>
68
46
<refname><command>&COMMANDNAME;</command></refname>
70
Generate keys for <citerefentry><refentrytitle>password-request
71
</refentrytitle><manvolnum>8mandos</manvolnum></citerefentry>
48
Generate key and password for Mandos client and server.
77
54
<command>&COMMANDNAME;</command>
178
155
</refsynopsisdiv>
180
157
<refsect1 id="description">
181
158
<title>DESCRIPTION</title>
183
160
<command>&COMMANDNAME;</command> is a program to generate the
185
<citerefentry><refentrytitle>password-request</refentrytitle>
186
<manvolnum>8mandos</manvolnum></citerefentry>. The keys are
162
<citerefentry><refentrytitle>mandos-client</refentrytitle>
163
<manvolnum>8mandos</manvolnum></citerefentry>. The key is
187
164
normally written to /etc/mandos for later installation into the
188
initrd image, but this, like most things, can be changed with
189
command line options.
165
initrd image, but this, and most other things, can be changed
166
with command line options.
192
It can also be used to generate ready-made sections for
169
This program can also be used with the
170
<option>--password</option> option to generate a ready-made
171
section for <filename>clients.conf</filename> (see
193
172
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
194
<manvolnum>5</manvolnum></citerefentry> using the
195
<option>--password</option> option.
173
<manvolnum>5</manvolnum></citerefentry>).
199
177
<refsect1 id="purpose">
200
178
<title>PURPOSE</title>
203
180
The purpose of this is to enable <emphasis>remote and unattended
204
181
rebooting</emphasis> of client host computer with an
205
182
<emphasis>encrypted root file system</emphasis>. See <xref
206
183
linkend="overview"/> for details.
211
187
<refsect1 id="options">
212
188
<title>OPTIONS</title>
216
<term><literal>-h</literal>, <literal>--help</literal></term>
192
<term><option>--help</option></term>
193
<term><option>-h</option></term>
219
196
Show a help message and exit
225
<term><literal>-d</literal>, <literal>--dir
226
<replaceable>directory</replaceable></literal></term>
203
<replaceable>DIRECTORY</replaceable></option></term>
205
<replaceable>DIRECTORY</replaceable></option></term>
229
208
Target directory for key files. Default is
236
<term><literal>-t</literal>, <literal>--type
237
<replaceable>type</replaceable></literal></term>
216
<replaceable>TYPE</replaceable></option></term>
218
<replaceable>TYPE</replaceable></option></term>
240
221
Key type. Default is <quote>DSA</quote>.
246
<term><literal>-l</literal>, <literal>--length
247
<replaceable>bits</replaceable></literal></term>
227
<term><option>--length
228
<replaceable>BITS</replaceable></option></term>
230
<replaceable>BITS</replaceable></option></term>
250
233
Key length in bits. Default is 2048.
256
<term><literal>-s</literal>, <literal>--subtype
257
<replaceable>type</replaceable></literal></term>
239
<term><option>--subtype
240
<replaceable>KEYTYPE</replaceable></option></term>
242
<replaceable>KEYTYPE</replaceable></option></term>
260
245
Subkey type. Default is <quote>ELG-E</quote> (Elgamal
267
<term><literal>-L</literal>, <literal>--sublength
268
<replaceable>bits</replaceable></literal></term>
252
<term><option>--sublength
253
<replaceable>BITS</replaceable></option></term>
255
<replaceable>BITS</replaceable></option></term>
271
258
Subkey length in bits. Default is 2048.
277
<term><literal>-e</literal>, <literal>--email</literal>
278
<replaceable>address</replaceable></term>
264
<term><option>--email
265
<replaceable>ADDRESS</replaceable></option></term>
267
<replaceable>ADDRESS</replaceable></option></term>
281
270
Email address of key. Default is empty.
287
<term><literal>-c</literal>, <literal>--comment</literal>
288
<replaceable>comment</replaceable></term>
276
<term><option>--comment
277
<replaceable>TEXT</replaceable></option></term>
279
<replaceable>TEXT</replaceable></option></term>
291
282
Comment field for key. The default value is
298
<term><literal>-x</literal>, <literal>--expire</literal>
299
<replaceable>time</replaceable></term>
289
<term><option>--expire
290
<replaceable>TIME</replaceable></option></term>
292
<replaceable>TIME</replaceable></option></term>
302
295
Key expire time. Default is no expiration. See
310
<term><literal>-f</literal>, <literal>--force</literal></term>
303
<term><option>--force</option></term>
304
<term><option>-f</option></term>
313
Force overwriting old keys.
307
Force overwriting old key.
318
<term><literal>-p</literal>, <literal>--password</literal
312
<term><option>--password</option></term>
313
<term><option>-p</option></term>
322
316
Prompt for a password and encrypt it with the key already
328
322
>8</manvolnum></citerefentry>. The host name or the name
329
323
specified with the <option>--name</option> option is used
330
324
for the section header. All other options are ignored,
331
and no keys are created.
325
and no key is created.
338
332
<refsect1 id="overview">
339
333
<title>OVERVIEW</title>
340
334
<xi:include href="overview.xml"/>
342
336
This program is a small utility to generate new OpenPGP keys for
337
new Mandos clients, and to generate sections for inclusion in
338
<filename>clients.conf</filename> on the server.
347
342
<refsect1 id="exit_status">
348
343
<title>EXIT STATUS</title>
350
The exit status will be 0 if new keys were successfully created,
345
The exit status will be 0 if a new key (or password, if the
346
<option>--password</option> option was used) was successfully
347
created, otherwise not.
437
432
</informalexample>
435
Prompt for a password, encrypt it with the key in
436
<filename>/etc/mandos</filename> and output a section suitable
437
for <filename>clients.conf</filename>.
440
<userinput>&COMMANDNAME; --password</userinput>
445
Prompt for a password, encrypt it with the key in the
446
<filename>client-key</filename> directory and output a section
447
suitable for <filename>clients.conf</filename>.
451
<!-- do not wrap this line -->
452
<userinput>&COMMANDNAME; --password --dir client-key</userinput>
440
458
<refsect1 id="security">
441
459
<title>SECURITY</title>
443
461
The <option>--type</option>, <option>--length</option>,
444
462
<option>--subtype</option>, and <option>--sublength</option>
445
options can be used to create keys of insufficient security. If
446
in doubt, leave them to the default values.
463
options can be used to create keys of low security. If in
464
doubt, leave them to the default values.
449
The key expire time is not guaranteed to be honored by
450
<citerefentry><refentrytitle>mandos</refentrytitle>
467
The key expire time is <emphasis>not</emphasis> guaranteed to be
468
honored by <citerefentry><refentrytitle>mandos</refentrytitle>
451
469
<manvolnum>8</manvolnum></citerefentry>.
455
473
<refsect1 id="see_also">
456
474
<title>SEE ALSO</title>
458
476
<citerefentry><refentrytitle>gpg</refentrytitle>
459
477
<manvolnum>1</manvolnum></citerefentry>,
478
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
479
<manvolnum>5</manvolnum></citerefentry>,
460
480
<citerefentry><refentrytitle>mandos</refentrytitle>
461
481
<manvolnum>8</manvolnum></citerefentry>,
462
<citerefentry><refentrytitle>password-request</refentrytitle>
482
<citerefentry><refentrytitle>mandos-client</refentrytitle>
463
483
<manvolnum>8mandos</manvolnum></citerefentry>