12
11
<title>Mandos Manual</title>
13
12
<!-- NWalsh’s docbook scripts use this to generate the footer: -->
14
13
<productname>Mandos</productname>
15
<productnumber>&version;</productnumber>
14
<productnumber>&VERSION;</productnumber>
16
15
<date>&TIMESTAMP;</date>
19
18
<firstname>Björn</firstname>
20
19
<surname>Påhlsson</surname>
22
<email>belorn@recompile.se</email>
21
<email>belorn@fukt.bsnet.se</email>
26
25
<firstname>Teddy</firstname>
27
26
<surname>Hogeborn</surname>
29
<email>teddy@recompile.se</email>
28
<email>teddy@fukt.bsnet.se</email>
43
34
<holder>Teddy Hogeborn</holder>
44
35
<holder>Björn Påhlsson</holder>
46
<xi:include href="legalnotice.xml"/>
39
This manual page is free software: you can redistribute it
40
and/or modify it under the terms of the GNU General Public
41
License as published by the Free Software Foundation,
42
either version 3 of the License, or (at your option) any
47
This manual page is distributed in the hope that it will
48
be useful, but WITHOUT ANY WARRANTY; without even the
49
implied warranty of MERCHANTABILITY or FITNESS FOR A
50
PARTICULAR PURPOSE. See the GNU General Public License
55
You should have received a copy of the GNU General Public
56
License along with this program; If not, see
57
<ulink url="http://www.gnu.org/licenses/"/>.
50
63
<refentrytitle>&COMMANDNAME;</refentrytitle>
51
64
<manvolnum>8</manvolnum>
175
178
</refsynopsisdiv>
177
180
<refsect1 id="description">
178
181
<title>DESCRIPTION</title>
180
183
<command>&COMMANDNAME;</command> is a program to generate the
182
<citerefentry><refentrytitle>mandos-client</refentrytitle>
183
<manvolnum>8mandos</manvolnum></citerefentry>. The key is
185
<citerefentry><refentrytitle>password-request</refentrytitle>
186
<manvolnum>8mandos</manvolnum></citerefentry>. The keys are
184
187
normally written to /etc/mandos for later installation into the
185
initrd image, but this, and most other things, can be changed
186
with command line options.
188
initrd image, but this, like most things, can be changed with
189
command line options.
189
This program can also be used with the
190
<option>--password</option> or <option>--passfile</option>
191
options to generate a ready-made section for
192
<filename>clients.conf</filename> (see
192
It can also be used to generate ready-made sections for
193
193
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
194
<manvolnum>5</manvolnum></citerefentry>).
194
<manvolnum>5</manvolnum></citerefentry> using the
195
<option>--password</option> option.
198
199
<refsect1 id="purpose">
199
200
<title>PURPOSE</title>
201
203
The purpose of this is to enable <emphasis>remote and unattended
202
204
rebooting</emphasis> of client host computer with an
203
205
<emphasis>encrypted root file system</emphasis>. See <xref
204
206
linkend="overview"/> for details.
208
211
<refsect1 id="options">
209
212
<title>OPTIONS</title>
213
<term><option>--help</option></term>
214
<term><option>-h</option></term>
216
<term><literal>-h</literal>, <literal>--help</literal></term>
217
219
Show a help message and exit
224
<replaceable>DIRECTORY</replaceable></option></term>
226
<replaceable>DIRECTORY</replaceable></option></term>
225
<term><literal>-d</literal>, <literal>--dir
226
<replaceable>directory</replaceable></literal></term>
229
229
Target directory for key files. Default is
230
<filename class="directory">/etc/mandos</filename>.
237
<replaceable>TYPE</replaceable></option></term>
239
<replaceable>TYPE</replaceable></option></term>
242
Key type. Default is <quote>RSA</quote>.
248
<term><option>--length
249
<replaceable>BITS</replaceable></option></term>
251
<replaceable>BITS</replaceable></option></term>
254
Key length in bits. Default is 4096.
260
<term><option>--subtype
261
<replaceable>KEYTYPE</replaceable></option></term>
263
<replaceable>KEYTYPE</replaceable></option></term>
266
Subkey type. Default is <quote>RSA</quote> (Elgamal
230
<filename>/etc/mandos</filename>.
236
<term><literal>-t</literal>, <literal>--type
237
<replaceable>type</replaceable></literal></term>
240
Key type. Default is <quote>DSA</quote>.
246
<term><literal>-l</literal>, <literal>--length
247
<replaceable>bits</replaceable></literal></term>
250
Key length in bits. Default is 2048.
256
<term><literal>-s</literal>, <literal>--subtype
257
<replaceable>type</replaceable></literal></term>
260
Subkey type. Default is <quote>ELG-E</quote> (Elgamal
267
261
encryption-only).
273
<term><option>--sublength
274
<replaceable>BITS</replaceable></option></term>
276
<replaceable>BITS</replaceable></option></term>
267
<term><literal>-L</literal>, <literal>--sublength
268
<replaceable>bits</replaceable></literal></term>
279
Subkey length in bits. Default is 4096.
271
Subkey length in bits. Default is 2048.
285
<term><option>--email
286
<replaceable>ADDRESS</replaceable></option></term>
288
<replaceable>ADDRESS</replaceable></option></term>
277
<term><literal>-e</literal>, <literal>--email</literal>
278
<replaceable>address</replaceable></term>
291
281
Email address of key. Default is empty.
297
<term><option>--comment
298
<replaceable>TEXT</replaceable></option></term>
300
<replaceable>TEXT</replaceable></option></term>
287
<term><literal>-c</literal>, <literal>--comment</literal>
288
<replaceable>comment</replaceable></term>
303
Comment field for key. Default is empty.
291
Comment field for key. The default value is
292
<quote><literal>Mandos client key</literal></quote>.
309
<term><option>--expire
310
<replaceable>TIME</replaceable></option></term>
312
<replaceable>TIME</replaceable></option></term>
298
<term><literal>-x</literal>, <literal>--expire</literal>
299
<replaceable>time</replaceable></term>
315
302
Key expire time. Default is no expiration. See
342
328
>8</manvolnum></citerefentry>. The host name or the name
343
329
specified with the <option>--name</option> option is used
344
330
for the section header. All other options are ignored,
345
and no key is created.
350
<term><option>--passfile
351
<replaceable>FILE</replaceable></option></term>
353
<replaceable>FILE</replaceable></option></term>
356
The same as <option>--password</option>, but read from
357
<replaceable>FILE</replaceable>, not the terminal.
362
<term><option>--no-ssh</option></term>
363
<term><option>-S</option></term>
366
When <option>--password</option> or
367
<option>--passfile</option> is given, this option will
368
prevent <command>&COMMANDNAME;</command> from calling
369
<command>ssh-keyscan</command> to get an SSH fingerprint
370
for this host and, if successful, output suitable config
371
options to use this fingerprint as a
372
<option>checker</option> option in the output. This is
373
otherwise the default behavior.
331
and no keys are created.
380
338
<refsect1 id="overview">
381
339
<title>OVERVIEW</title>
382
340
<xi:include href="overview.xml"/>
384
342
This program is a small utility to generate new OpenPGP keys for
385
new Mandos clients, and to generate sections for inclusion in
386
<filename>clients.conf</filename> on the server.
390
347
<refsect1 id="exit_status">
391
348
<title>EXIT STATUS</title>
393
The exit status will be 0 if a new key (or password, if the
394
<option>--password</option> option was used) was successfully
395
created, otherwise not.
350
The exit status will be 0 if new keys were successfully created,
480
437
</informalexample>
483
Prompt for a password, encrypt it with the key in <filename
484
class="directory">/etc/mandos</filename> and output a section
485
suitable for <filename>clients.conf</filename>.
488
<userinput>&COMMANDNAME; --password</userinput>
493
Prompt for a password, encrypt it with the key in the
494
<filename>client-key</filename> directory and output a section
495
suitable for <filename>clients.conf</filename>.
499
<!-- do not wrap this line -->
500
<userinput>&COMMANDNAME; --password --dir client-key</userinput>
506
440
<refsect1 id="security">
507
441
<title>SECURITY</title>
509
443
The <option>--type</option>, <option>--length</option>,
510
444
<option>--subtype</option>, and <option>--sublength</option>
511
options can be used to create keys of low security. If in
512
doubt, leave them to the default values.
445
options can be used to create keys of insufficient security. If
446
in doubt, leave them to the default values.
515
The key expire time is <emphasis>not</emphasis> guaranteed to be
516
honored by <citerefentry><refentrytitle>mandos</refentrytitle>
449
The key expire time is not guaranteed to be honored by
450
<citerefentry><refentrytitle>mandos</refentrytitle>
517
451
<manvolnum>8</manvolnum></citerefentry>.
521
455
<refsect1 id="see_also">
522
456
<title>SEE ALSO</title>
524
<citerefentry><refentrytitle>intro</refentrytitle>
525
<manvolnum>8mandos</manvolnum></citerefentry>,
526
458
<citerefentry><refentrytitle>gpg</refentrytitle>
527
459
<manvolnum>1</manvolnum></citerefentry>,
528
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
529
<manvolnum>5</manvolnum></citerefentry>,
530
460
<citerefentry><refentrytitle>mandos</refentrytitle>
531
461
<manvolnum>8</manvolnum></citerefentry>,
532
<citerefentry><refentrytitle>mandos-client</refentrytitle>
533
<manvolnum>8mandos</manvolnum></citerefentry>,
534
<citerefentry><refentrytitle>ssh-keyscan</refentrytitle>
535
<manvolnum>1</manvolnum></citerefentry>
462
<citerefentry><refentrytitle>password-request</refentrytitle>
463
<manvolnum>8mandos</manvolnum></citerefentry>