93
104
<command>&COMMANDNAME;</command>
94
105
<arg choice='plain'>--check</arg>
98
109
<refsect1 id="description">
99
110
<title>DESCRIPTION</title>
101
<command>&COMMANDNAME;</command> is a server daemon that handels
102
incomming passwords request for passwords. Mandos use avahi to
103
announce the service, and through gnutls authenticates
104
clients. Any authenticated client is then given its encrypted
112
<command>&COMMANDNAME;</command> is a server daemon which
113
handles incoming request for passwords for a pre-defined list of
114
client host computers. The Mandos server uses Zeroconf to
115
announce itself on the local network, and uses GnuTLS to
116
communicate securely with and to authenticate the clients.
117
Mandos uses IPv6 link-local addresses, since the clients are
118
assumed to not have any other addresses configured. Any
119
authenticated client is then given the pre-encrypted password
120
for that specific client.
125
<refsect1 id="purpose">
126
<title>PURPOSE</title>
129
The purpose of this is to enable <emphasis>remote and unattended
130
rebooting</emphasis> of any client host computer with an
131
<emphasis>encrypted root file system</emphasis>. The client
132
host computer should start a Mandos client in the initial RAM
133
disk environment, the Mandos client program communicates with
134
this server program to get an encrypted password, which is then
135
decrypted and used to unlock the encrypted root file system.
136
The client host computer can then continue its boot sequence
142
<refsect1 id="options">
143
<title>OPTIONS</title>
110
147
<term><literal>-h</literal>, <literal>--help</literal></term>
113
show a help message and exit
150
Show a help message and exit
120
157
IF</replaceable></literal></term>
160
Only announce the server and listen to requests on network
161
interface <replaceable>IF</replaceable>. Default is to
162
use all available interfaces.
129
168
<term><literal>-a</literal>, <literal>--address <replaceable>
130
169
ADDRESS</replaceable></literal></term>
133
Address to listen for requests on
172
If this option is used, the server will only listen to a
173
specific address. This must currently be an IPv6 address;
174
an IPv4 address can be specified using the
175
<quote><literal>::FFFF:192.0.2.3</literal></quote> syntax.
176
Also, if a link-local address is specified, an interface
177
should be set, since a link-local address is only valid on
178
a single interface. By default, the server will listen to
179
all available addresses.
139
185
<term><literal>-p</literal>, <literal>--port <replaceable>
140
186
PORT</replaceable></literal></term>
143
Port number to receive requests on
189
If this option is used, the server to bind to that
190
port. By default, the server will listen to an arbitrary
191
port given by the operating system.
149
197
<term><literal>--check</literal></term>
152
Run self-test on the server
200
Run the server's self-tests. This includes any unit
158
207
<term><literal>--debug</literal></term>
210
If the server is run in debug mode, it will run in the
211
foreground and print a lot of debugging information. The
212
default is <emphasis>not</emphasis> to run in debug mode.
168
219
PRIORITY</replaceable></literal></term>
171
GnuTLS priority string. See <citerefentry>
172
<refentrytitle>gnutls_priority_init</refentrytitle>
173
<manvolnum>3</manvolnum></citerefentry>
222
GnuTLS priority string for the TLS handshake with the
224
<citerefentry><refentrytitle>gnutls_priority_init
225
</refentrytitle><manvolnum>3</manvolnum></citerefentry>
226
for the syntax. The default is
227
<quote><literal>SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP</literal></quote>.
228
<emphasis>Warning</emphasis>: changing this may make the
229
TLS handshake fail, making communication with clients
179
236
<term><literal>--servicename <replaceable>NAME</replaceable>
180
237
</literal></term>
183
Zeroconf service name
240
Zeroconf service name. The default is
241
<quote><literal>Mandos</literal></quote>. You only need
242
to change this if you for some reason want to run more
243
than one server on the same <emphasis>host</emphasis>,
244
which would not normally be useful. If there are name
245
collisions on the same <emphasis>network</emphasis>, the
246
newer server will automatically rename itself to
247
<quote><literal>Mandos #2</literal></quote>, and so on,
248
therefore this option is not needed in that case.
189
254
<term><literal>--configdir <replaceable>DIR</replaceable>
190
255
</literal></term>
193
Directory to search for configuration files
258
Directory to search for configuration files. Default is
259
<quote><literal>/etc/mandos</literal></quote>. See
260
<citerefentry><refentrytitle>mandos.conf</refentrytitle>
261
<manvolnum>5</manvolnum></citerefentry> and <citerefentry>
262
<refentrytitle>mandos-clients.conf</refentrytitle>
263
<manvolnum>5</manvolnum></citerefentry>.
199
269
<term><literal>--version</literal></term>
202
Prints the program version
272
Prints the program version and exit.
279
<refsect1 id="protocol">
280
<title>NETWORK PROTOCOL</title>
282
The Mandos server announces itself as a Zeroconf service of type
283
<quote><literal>_mandos._tcp</literal></quote>. The Mandos
284
client connects to the announced address and port, and sends a
285
line of text where the first whitespace-separated field is the
286
protocol version, which currently is
287
<quote><literal>1</literal></quote>. The client and server then
288
start a TLS protocol handshake with a slight quirk: the Mandos
289
server program acts as a TLS <quote>client</quote> while the
290
connecting Mandos client acts as a TLS <quote>server</quote>.
291
The Mandos client must supply an OpenPGP certificate, and the
292
fingerprint of this certificate is used by the Mandos server to
293
look up (in a list read from <filename>clients.conf</filename>
294
at start time) which binary blob to give the client. No other
295
authentication or authorization is done by the server.
298
<title>Mandos Protocol (Version 1)</title><tgroup cols="3"><thead>
300
<entry>Mandos Client</entry>
301
<entry>Direction</entry>
302
<entry>Mandos Server</entry>
306
<entry>Connect</entry>
307
<entry>-><!-- → --></entry>
310
<entry><quote><literal>1\r\en</literal></quote></entry>
311
<entry>-><!-- → --></entry>
314
<entry>TLS handshake <emphasis>as TLS <quote>server</quote>
316
<entry><-><!-- ⟷ --></entry>
317
<entry>TLS handshake <emphasis>as TLS <quote>client</quote>
321
<entry>OpenPGP public key (part of TLS handshake)</entry>
322
<entry>-><!-- → --></entry>
326
<entry><-<!-- ← --></entry>
327
<entry>Binary blob (client will assume OpenPGP data)</entry>
331
<entry><-<!-- ← --></entry>
334
</tbody></tgroup></table>
337
<refsect1 id="checking">
338
<title>CHECKING</title>
340
The server will, by default, continually check that the clients
341
are still up. If a client has not been confirmed as being up
342
for some time, the client is assumed to be compromised and is no
343
longer eligible to receive the encrypted password. The timeout,
344
checker program and interval between checks can be configured
345
both globally and per client; see <citerefentry>
346
<refentrytitle>mandos.conf</refentrytitle>
347
<manvolnum>5</manvolnum></citerefentry> and <citerefentry>
348
<refentrytitle>mandos-clients.conf</refentrytitle>
349
<manvolnum>5</manvolnum></citerefentry>.
353
<refsect1 id="logging">
354
<title>LOGGING</title>
356
The server will send log messaged with various severity levels
357
to <filename>/dev/log</filename>. With the
358
<option>--debug</option> option, it will log even more messages,
359
and also show them on the console.
363
<refsect1 id="exit_status">
364
<title>EXIT STATUS</title>
366
The server will exit with a non-zero exit status only when a
367
critical error is encountered.
374
Use the <option>--configdir</option> option to change where
375
<command>&COMMANDNAME;</command> looks for its configurations
376
files. The default file names are listed here.
380
<term><filename>/etc/mandos/mandos.conf</filename></term>
383
Server-global settings. See
384
<citerefentry><refentrytitle>mandos.conf</refentrytitle>
385
<manvolnum>5</manvolnum></citerefentry> for details.
390
<term><filename>/etc/mandos/clients.conf</filename></term>
393
List of clients and client-specific settings. See
394
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
395
<manvolnum>5</manvolnum></citerefentry> for details.
400
<term><filename>/var/run/mandos/mandos.pid</filename></term>
403
The file containing the process id of
404
<command>&COMMANDNAME;</command>.
409
<term><filename>/dev/log</filename></term>
412
The Unix domain socket to where local syslog messages are
423
This server might, on especially fatal errors, emit a Python
424
backtrace. This could be considered a feature.
428
<refsect1 id="examples">
429
<title>EXAMPLES</title>
432
Normal invocation needs no options:
435
<userinput>mandos</userinput>
440
Run the server in debug mode and read configuration files from
441
the <filename>~/mandos</filename> directory:
445
<!-- do not wrap this line -->
446
<userinput>mandos --debug --configdir ~/mandos --servicename Test</userinput>
452
Run the server normally, but only listen to one interface and
453
only on the link-local address on that interface:
457
<!-- do not wrap this line -->
458
<userinput>mandos --interface eth7 --address fe80::aede:48ff:fe71:f6f2</userinput>
464
<refsect1 id="security">
465
<title>SECURITY</title>
467
<title>SERVER</title>
469
Running the server should not in itself present any security
470
risk to the host computer running it.
474
<title>CLIENTS</title>
476
The server only gives out its stored data to clients which
477
does have the OpenPGP key of the stored fingerprint. This is
478
guaranteed by the fact that the client sends its OpenPGP
479
public key in the TLS handshake; this ensures it to be
480
genuine. The server computes the fingerprint of the key
481
itself and looks up the fingerprint in its list of
482
clients. The <filename>clients.conf</filename> file (see
483
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
484
<manvolnum>5</manvolnum></citerefentry>) must be non-readable
485
by anyone except the user running the server.
488
For more details on client-side security, see
489
<citerefentry><refentrytitle>password-request</refentrytitle>
490
<manvolnum>8mandos</manvolnum></citerefentry>.
495
<refsect1 id="see_also">
496
<title>SEE ALSO</title>
497
<itemizedlist spacing="compact">
499
<citerefentry><refentrytitle>password-request</refentrytitle>
500
<manvolnum>8mandos</manvolnum></citerefentry>
504
<citerefentry><refentrytitle>plugin-runner</refentrytitle>
505
<manvolnum>8mandos</manvolnum></citerefentry>
509
<ulink url="http://www.zeroconf.org/">Zeroconf</ulink>
513
<ulink url="http://www.avahi.org/">Avahi</ulink>
518
url="http://www.gnu.org/software/gnutls/">GnuTLS</ulink>
522
<citation>RFC 4880: <citetitle>OpenPGP Message
523
Format</citetitle></citation>
527
<citation>RFC 5081: <citetitle>Using OpenPGP Keys for
528
Transport Layer Security</citetitle></citation>
532
<citation>RFC 4291: <citetitle>IP Version 6 Addressing
533
Architecture</citetitle>, section 2.5.6, Link-Local IPv6
534
Unicast Addresses</citation>