/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to intro.xml

  • Committer: Teddy Hogeborn
  • Date: 2017-02-21 21:42:08 UTC
  • mto: (237.7.594 trunk)
  • mto: This revision was merged to the branch mainline in revision 358.
  • Revision ID: teddy@recompile.se-20170221214208-09wu1p4l2hjhqfoj
Use "read -r" in shell scripts to avoid backslash escapes

* initramfs-tools-hook: Use "read -r" to read filenames from network
  hook given the "files" argument.
* initramfs-tools-script: Use "read -e" when parsing
  "/conf/conf.d/cryptroot".
* mandos-keygen (keygen): Use "read -r" when reading passphrase.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
1
<?xml version="1.0" encoding="UTF-8"?>
2
2
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3
3
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4
 
<!ENTITY TIMESTAMP "2014-06-22">
 
4
<!ENTITY TIMESTAMP "2016-11-27">
5
5
<!ENTITY % common SYSTEM "common.ent">
6
6
%common;
7
7
]>
32
32
    <copyright>
33
33
      <year>2011</year>
34
34
      <year>2012</year>
 
35
      <year>2013</year>
 
36
      <year>2014</year>
 
37
      <year>2015</year>
 
38
      <year>2016</year>
35
39
      <holder>Teddy Hogeborn</holder>
36
40
      <holder>Björn Påhlsson</holder>
37
41
    </copyright>
73
77
  <refsect1 id="introduction">
74
78
    <title>INTRODUCTION</title>
75
79
    <para>
 
80
      <!-- This paragraph is a combination and paraphrase of two
 
81
           quotes from the 1995 movie “The Usual Suspects”. -->
76
82
      You know how it is.  You’ve heard of it happening.  The Man
77
83
      comes and takes away your servers, your friends’ servers, the
78
84
      servers of everybody in the same hosting facility. The servers
197
203
      </para>
198
204
    </refsect2>
199
205
    
 
206
    <refsect2 id="sniff">
 
207
      <title>How about sniffing the network traffic and decrypting it
 
208
      later by physically grabbing the Mandos client and using its
 
209
      key?</title>
 
210
      <para>
 
211
        We only use <acronym>PFS</acronym> (Perfect Forward Security)
 
212
        key exchange algorithms in TLS, which protects against this.
 
213
      </para>
 
214
    </refsect2>
 
215
    
200
216
    <refsect2 id="physgrab">
201
217
      <title>Physically grabbing the Mandos server computer?</title>
202
218
      <para>
365
381
    </para>
366
382
  </refsect1>
367
383
  
 
384
  <refsect1 id="bugs">
 
385
    <title>BUGS</title>
 
386
    <xi:include href="bugs.xml"/>
 
387
  </refsect1>
 
388
  
368
389
  <refsect1 id="see_also">
369
390
    <title>SEE ALSO</title>
370
391
    <para>
398
419
    <variablelist>
399
420
      <varlistentry>
400
421
        <term>
401
 
          <ulink url="http://www.recompile.se/mandos">Mandos</ulink>
 
422
          <ulink url="https://www.recompile.se/mandos">Mandos</ulink>
402
423
        </term>
403
424
        <listitem>
404
425
          <para>