1
# Default settings for all clients. These values are the default
2
# values, so uncomment and change them if you want different ones.
5
# How long until a client is disabled and not be allowed to get the
6
# data this server holds.
9
# How often to run the checker to confirm that a client is still up.
10
# Note: a new checker will not be started if an old one is still
11
# running. The server will wait for a checker to complete until the
12
# above "timeout" occurs, at which time the client will be disabled,
13
# and any running checker killed.
16
# Extended timeout is an added timeout that is given once after a
17
# password has been sent sucessfully to a client. This allows for
18
# additional delays caused by file system checks and quota checks.
19
;extended_timeout = 15m
21
# What command to run as "the checker".
22
;checker = fping -q -- %%(host)s
24
# Whether to approve a client by default after the approval delay.
25
;approved_by_default = True
27
# How long to wait for approval.
30
# How long one approval will last.
31
;approval_duration = 1s
38
;# OpenPGP key fingerprint
39
;fingerprint = 7788 2722 5BA7 DE53 9C5A 7CFA 59CF F7CD BD9A 5920
41
;# This is base64-encoded binary data. It will be decoded and sent to
42
;# the client matching the above fingerprint. This should, of course,
43
;# be OpenPGP encrypted data, decryptable only by the client.
45
; hQIOA6QdEjBs2L/HEAf/TCyrDe5Xnm9esa+Pb/vWF9CUqfn4srzVgSu234
46
; REJMVv7lBSrPE2132Lmd2gqF1HeLKDJRSVxJpt6xoWOChGHg+TMyXDxK+N
47
; Xl89vGvdU1XfhKkVm9MDLOgT5ECDPysDGHFPDhqHOSu3Kaw2DWMV/iH9vz
48
; 3Z20erVNbdcvyBnuojcoWO/6yfB5EQO0BXp7kcyy00USA3CjD5FGZdoQGI
49
; Tb8A/ar0tVA5crSQmaSotm6KmNLhrFnZ5BxX+TiE+eTUTqSloWRY6VAvqW
50
; QHC7OASxK5E6RXPBuFH5IohUA2Qbk5AHt99pYvsIPX88j2rWauOokoiKZo
51
; t/9leJ8VxO5l3wf/U64IH8bkPIoWmWZfd/nqh4uwGNbCgKMyT+AnvH7kMJ
52
; 3i7DivfWl2mKLV0PyPHUNva0VQxX6yYjcOhj1R6fCr/at8/NSLe2OhLchz
53
; dC+Ls9h+kvJXgF8Sisv+Wk/1RadPLFmraRlqvJwt6Ww21LpiXqXHV2mIgq
54
; WnR98YgSvUi3TJHrUQiNc9YyBzuRo0AjgG2C9qiE3FM+Y28+iQ/sR3+bFs
55
; zYuZKVTObqiIslwXu7imO0cvvFRgJF/6u3HNFQ4LUTGhiM3FQmC6NNlF3/
56
; vJM2hwRDMcJqDd54Twx90Wh+tYz0z7QMsK4ANXWHHWHR0JchnLWmenzbtW
57
; 5MHdW9AYsNJZAQSOpirE4Xi31CSlWAi9KV+cUCmWF5zOFy1x23P6PjdaRm
58
; 4T2zw4dxS5NswXWU0sVEXxjs6PYxuIiCTL7vdpx8QjBkrPWDrAbcMyBr2O
61
;# Host name; used only by the checker, not used by the server itself.
62
;host = foo.example.org
66
;# Another example client, named "bar".
68
;# The fingerprint is not space or case sensitive
69
;fingerprint = 3e393aeaefb84c7e89e2f547b3a107558fca3a27
71
;# If "secret" is not specified, a file can be read for the data.
72
;secfile = /etc/mandos/bar-secret.bin
74
;# An IP address for host is also fine, if the checker accepts it.
77
;# Parameters from the [DEFAULT] section can be overridden per client.
80
;# This client requires manual approval before it receives its secret.
81
;approved_by_default = False
82
;# Require approval within 30 seconds.
3
dn = C=EX,ST=Example State,L=Example Locality,O=Example Organization,CN=foo.example.org
8
dn = C=SE,ST=BL,L=Ronneby,O=gnustuff,CN=braxen_client,EMAIL=belorn@fukt.bsnet.se
9
password = Squeamish ossifrage