/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to intro.xml

  • Committer: Teddy Hogeborn
  • Date: 2018-04-01 19:27:30 UTC
  • mto: (237.7.594 trunk)
  • mto: This revision was merged to the branch mainline in revision 368.
  • Revision ID: teddy@recompile.se-20180401192730-jwr4io5cb3x5u268
Don't print NULL string pointers in error message output

* plugins.d/mandos-client.c (pgp_packet_decrypt): If decryption fails,
  don't print unsupported_algorithm if it is NULL.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
1
<?xml version="1.0" encoding="UTF-8"?>
2
2
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3
3
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4
 
<!ENTITY TIMESTAMP "2019-02-10">
 
4
<!ENTITY TIMESTAMP "2018-02-08">
5
5
<!ENTITY % common SYSTEM "common.ent">
6
6
%common;
7
7
]>
38
38
      <year>2016</year>
39
39
      <year>2017</year>
40
40
      <year>2018</year>
41
 
      <year>2019</year>
42
41
      <holder>Teddy Hogeborn</holder>
43
42
      <holder>Björn Påhlsson</holder>
44
43
    </copyright>
68
67
      The computers run a small client program in the initial RAM disk
69
68
      environment which will communicate with a server over a network.
70
69
      All network communication is encrypted using TLS.  The clients
71
 
      are identified by the server using a TLS public key; each client
 
70
      are identified by the server using an OpenPGP key; each client
72
71
      has one unique to it.  The server sends the clients an encrypted
73
72
      password.  The encrypted password is decrypted by the clients
74
 
      using a separate OpenPGP key, and the password is then used to
 
73
      using the same OpenPGP key, and the password is then used to
75
74
      unlock the root file system, whereupon the computers can
76
75
      continue booting normally.
77
76
    </para>
201
200
      <para>
202
201
        No.  The server only gives out the passwords to clients which
203
202
        have <emphasis>in the TLS handshake</emphasis> proven that
204
 
        they do indeed hold the private key corresponding to that
205
 
        client.
 
203
        they do indeed hold the OpenPGP private key corresponding to
 
204
        that client.
206
205
      </para>
207
206
    </refsect2>
208
207