=== modified file 'TODO'
--- TODO 2008-09-03 17:11:32 +0000
+++ TODO 2008-09-03 17:34:29 +0000
@@ -8,9 +8,6 @@
** [#B] Seperate more code to function for more readability
* password-request
-** [#A] Man page: man8/password-request.8mandos
-*** SEE ALSO
- Update from mandos.xml
** [#B] Temporarily lower kernel log level
for less printouts during sucessfull boot.
** IPv4 support
=== modified file 'plugins.d/password-request.xml'
--- plugins.d/password-request.xml 2008-09-03 17:11:32 +0000
+++ plugins.d/password-request.xml 2008-09-03 17:34:29 +0000
@@ -336,8 +336,10 @@
/etc/crypttab, but it would then be
impossible to enter a password for the encrypted root disk at
the console, since this program does not read from the console
- at all. This is why a separate plugin does that, which will be
- run in parallell to this one by the plugin runner.
+ at all. This is why a separate plugin (
+ password-prompt
+ 8mandos) does that, which
+ will be run in parallell to this one by the plugin runner.
@@ -446,7 +448,8 @@
SECURITY
This program is set-uid to root, but will switch back to the
- original user and group after bringing up the network interface.
+ original (and presumably non-privileged) user and group after
+ bringing up the network interface.
To use this program for its intended purpose (see mandos8.
- Note: This makes it impossible to have
- Mandos clients which dual-boot to
- another operating system which does not run
- a Mandos client.
+ It will also help if the checker program on the server is
+ configured to request something from the client which can not be
+ spoofed by someone else on the network, unlike unencrypted
+ ICMP echo (ping
) replies.
+
+
+ Note: This makes it completely insecure to
+ have Mandos clients which dual-boot
+ to another operating system which is not
+ trusted to keep the initial RAM disk image
+ confidential.
SEE ALSO
+ cryptsetup
+ 8,
+ crypttab
+ 5,
mandos
8,
password-prompt
@@ -491,42 +505,121 @@
plugin-runner
8mandos
-
-
- Zeroconf
-
-
-
- Avahi
-
-
-
- GnuTLS
-
-
-
- GPGME
-
-
-
- RFC 4880: OpenPGP Message
- Format
-
-
-
- RFC 5081: Using OpenPGP Keys for
- Transport Layer Security
-
-
-
- RFC 4291: IP Version 6 Addressing
- Architecture, section 2.5.6, Link-Local IPv6
- Unicast Addresses
-
-
+
+
+
+ Zeroconf
+
+
+
+ Zeroconf is the network protocol standard used for finding
+ Mandos servers on the local network.
+
+
+
+
+
+ Avahi
+
+
+
+ Avahi is the library this program calls to find Zeroconf
+ services.
+
+
+
+
+
+ GnuTLS
+
+
+
+ GnuTLS is the library this client uses to implement TLS for
+ communicating securely with the server, and at the same time
+ send the public OpenPGP key to the server.
+
+
+
+
+
+ GPGME
+
+
+
+ GPGME is the library used to decrypt the OpenPGP data sent
+ by the server.
+
+
+
+
+
+ RFC 4291: IP Version 6 Addressing
+ Architecture
+
+
+
+
+ Section 2.2: Text Representation of
+ Addresses
+
+
+
+ Section 2.5.5.2: IPv4-Mapped IPv6
+ Address
+
+
+
+ Section 2.5.6, Link-Local IPv6 Unicast
+ Addresses
+
+
+ This client uses IPv6 link-local addresses, which are
+ immediately usable since a link-local addresses is
+ automatically assigned to a network interfaces when it
+ is brought up.
+
+
+
+
+
+
+
+
+ RFC 4346: The Transport Layer Security (TLS)
+ Protocol Version 1.1
+
+
+
+ TLS 1.1 is the protocol implemented by GnuTLS.
+
+
+
+
+
+ RFC 4880: OpenPGP Message Format
+
+
+
+ The data received from the server is binary encrypted
+ OpenPGP data.
+
+
+
+
+
+ RFC 5081: Using OpenPGP Keys for Transport Layer
+ Security
+
+
+
+ This is implemented by GnuTLS and used by this program so
+ that OpenPGP keys can be used.
+
+
+
+