3
dn = C=EX,ST=Example State,L=Example Locality,O=Example Organization,CN=foo.example.org
8
dn = C=SE,ST=BL,L=Ronneby,O=gnustuff,CN=braxen_client,EMAIL=belorn@fukt.bsnet.se
9
password = Squeamish ossifrage
1
# Default settings for all clients. These values are the default
2
# values, so uncomment and change them if you want different ones.
5
# How long until a client is disabled and not be allowed to get the
6
# data this server holds.
7
# (RFC 3339 duration syntax)
10
# How often to run the checker to confirm that a client is still up.
11
# Note: a new checker will not be started if an old one is still
12
# running. The server will wait for a checker to complete until the
13
# above "timeout" occurs, at which time the client will be disabled,
14
# and any running checker killed.
15
# (RFC 3339 duration syntax)
18
# Extended timeout is an added timeout that is given once after a
19
# password has been sent sucessfully to a client. This allows for
20
# additional delays caused by file system checks and quota checks.
21
# (RFC 3339 duration syntax)
22
;extended_timeout = PT15M
24
# What command to run as "the checker".
25
;checker = fping -q -- %%(host)s
27
# Whether to approve a client by default after the approval delay.
28
;approved_by_default = True
30
# How long to wait for approval.
31
# (RFC 3339 duration syntax)
32
;approval_delay = PT0S
34
# How long one approval will last.
35
# (RFC 3339 duration syntax)
36
;approval_duration = PT1S
38
# Whether this client is enabled by default
47
;key_id = f33fcbed11ed5e03073f6a55b86ffe92af0e24c045fb6e3b40547b3dc0c030ed
49
;# OpenPGP key fingerprint
50
;fingerprint = 7788 2722 5BA7 DE53 9C5A 7CFA 59CF F7CD BD9A 5920
52
;# This is base64-encoded binary data. It will be decoded and sent to
53
;# the client matching the above fingerprint. This should, of course,
54
;# be OpenPGP encrypted data, decryptable only by the client.
56
; hQIOA6QdEjBs2L/HEAf/TCyrDe5Xnm9esa+Pb/vWF9CUqfn4srzVgSu234
57
; REJMVv7lBSrPE2132Lmd2gqF1HeLKDJRSVxJpt6xoWOChGHg+TMyXDxK+N
58
; Xl89vGvdU1XfhKkVm9MDLOgT5ECDPysDGHFPDhqHOSu3Kaw2DWMV/iH9vz
59
; 3Z20erVNbdcvyBnuojcoWO/6yfB5EQO0BXp7kcyy00USA3CjD5FGZdoQGI
60
; Tb8A/ar0tVA5crSQmaSotm6KmNLhrFnZ5BxX+TiE+eTUTqSloWRY6VAvqW
61
; QHC7OASxK5E6RXPBuFH5IohUA2Qbk5AHt99pYvsIPX88j2rWauOokoiKZo
62
; t/9leJ8VxO5l3wf/U64IH8bkPIoWmWZfd/nqh4uwGNbCgKMyT+AnvH7kMJ
63
; 3i7DivfWl2mKLV0PyPHUNva0VQxX6yYjcOhj1R6fCr/at8/NSLe2OhLchz
64
; dC+Ls9h+kvJXgF8Sisv+Wk/1RadPLFmraRlqvJwt6Ww21LpiXqXHV2mIgq
65
; WnR98YgSvUi3TJHrUQiNc9YyBzuRo0AjgG2C9qiE3FM+Y28+iQ/sR3+bFs
66
; zYuZKVTObqiIslwXu7imO0cvvFRgJF/6u3HNFQ4LUTGhiM3FQmC6NNlF3/
67
; vJM2hwRDMcJqDd54Twx90Wh+tYz0z7QMsK4ANXWHHWHR0JchnLWmenzbtW
68
; 5MHdW9AYsNJZAQSOpirE4Xi31CSlWAi9KV+cUCmWF5zOFy1x23P6PjdaRm
69
; 4T2zw4dxS5NswXWU0sVEXxjs6PYxuIiCTL7vdpx8QjBkrPWDrAbcMyBr2O
72
;# Host name; used only by the checker, not used by the server itself.
73
;host = foo.example.org
77
;# Another example client, named "bar".
79
;# The key ID is not space or case sensitive
80
;key_id = F33FCBED11ED5E03073F6A55B86FFE92 AF0E24C045FB6E3B40547B3DC0C030ED
82
;# The fingerprint is not space or case sensitive
83
;fingerprint = 3e393aeaefb84c7e89e2f547b3a107558fca3a27
85
;# If "secret" is not specified, a file can be read for the data.
86
;secfile = /etc/keys/mandos/bar-secret.bin
88
;# An IP address for host is also fine, if the checker accepts it.
91
;# Parameters from the [DEFAULT] section can be overridden per client.
94
;# This client requires manual approval before it receives its secret.
95
;approved_by_default = False
96
;# Require approval within 30 seconds.
97
;approval_delay = PT30S