4
4
Maintainer: Mandos Maintainers <mandos@recompile.se>
5
5
Uploaders: Teddy Hogeborn <teddy@recompile.se>,
6
6
Björn Påhlsson <belorn@recompile.se>
7
Build-Depends: debhelper (>= 9), docbook-xml, docbook-xsl,
8
libavahi-core-dev, libgpgme11-dev, libgnutls28-dev
9
| gnutls-dev, xsltproc, pkg-config, libnl-route-3-dev
10
Build-Depends-Indep: systemd, python2.7, python2.7-gnutls,
11
python2.7-dbus, python2.7-avahi, python2.7-gobject
12
Standards-Version: 3.9.6
13
Vcs-Bzr: http://ftp.recompile.se/pub/mandos/trunk
14
Vcs-Browser: http://bzr.recompile.se/loggerhead/mandos/trunk/files
15
Homepage: http://www.recompile.se/mandos
7
Build-Depends: debhelper (>= 10), docbook-xml, docbook-xsl,
8
libavahi-core-dev, libgpgme-dev | libgpgme11-dev,
9
libglib2.0-dev (>=2.40), libgnutls28-dev (>= 3.3.0),
10
libgnutls28-dev (>= 3.6.6) | libgnutls28-dev (<< 3.6.0),
11
xsltproc, pkg-config, libnl-route-3-dev, systemd
12
Build-Depends-Indep: python3 (>= 3), python3-dbus, python3-gi,
14
Standards-Version: 4.6.2
15
Vcs-Bzr: https://ftp.recompile.se/pub/mandos/trunk
16
Vcs-Browser: https://bzr.recompile.se/loggerhead/mandos/trunk/files
17
Homepage: https://www.recompile.se/mandos
18
Rules-Requires-Root: binary-targets
19
Depends: ${misc:Depends}, python (>= 2.7), python2.7, python-gnutls,
20
python2.7-gnutls, python-dbus, python2.7-dbus, python-avahi,
21
python2.7-avahi, python-gobject, python2.7-gobject,
22
avahi-daemon, adduser, python-urwid, python2.7-urwid,
23
gnupg (<< 2), initscripts (>= 2.88dsf-13.3)
22
Depends: ${misc:Depends}, python3 (>= 3), libgnutls30 (>= 3.3.0),
23
libgnutls30 (>= 3.6.6) | libgnutls30 (<< 3.6.0),
24
python3-dbus, python3-gi, avahi-daemon, adduser,
25
python3-urwid, gnupg2 | gnupg,
26
systemd-sysv | lsb-base (>= 3.0-6),
27
debconf (>= 1.5.5) | debconf-2.0
24
28
Recommends: ssh-client | fping
29
Suggests: libc6-dev | libc-dev, c-compiler
25
30
Description: server giving encrypted passwords to Mandos clients
26
31
This is the server part of the Mandos system, which allows
27
32
computers to have encrypted root file systems and at the
30
35
The computers run a small client program in the initial RAM
31
36
disk environment which will communicate with a server over a
32
37
network. All network communication is encrypted using TLS.
33
The clients are identified by the server using an OpenPGP
38
The clients are identified by the server using a TLS public
34
39
key; each client has one unique to it. The server sends the
35
40
clients an encrypted password. The encrypted password is
36
decrypted by the clients using the same OpenPGP key, and the
41
decrypted by the clients using an OpenPGP key, and the
37
42
password is then used to unlock the root file system,
38
43
whereupon the computers can continue booting normally.
40
45
Package: mandos-client
41
46
Architecture: linux-any
42
Depends: ${shlibs:Depends}, ${misc:Depends}, adduser, cryptsetup,
43
gnupg (<< 2), initramfs-tools, dpkg-dev (>=1.16.0)
47
Depends: ${shlibs:Depends}, ${misc:Depends}, adduser,
48
cryptsetup (<< 2:2.0.3-1) | cryptsetup-initramfs,
49
initramfs-tools (>= 0.99) | dracut (>= 044+241-3),
51
gnutls-bin (>= 3.6.6) | libgnutls30 (<< 3.6.0),
52
debconf (>= 1.5.5) | debconf-2.0
45
54
Breaks: dropbear (<= 0.53.1-1)
46
55
Enhances: cryptsetup
56
Conflicts: dracut-config-generic
47
57
Description: do unattended reboots with an encrypted root file system
48
58
This is the client part of the Mandos system, which allows
49
59
computers to have encrypted root file systems and at the
52
62
The computers run a small client program in the initial RAM
53
63
disk environment which will communicate with a server over a
54
64
network. All network communication is encrypted using TLS.
55
The clients are identified by the server using an OpenPGP
65
The clients are identified by the server using a TLS public
56
66
key; each client has one unique to it. The server sends the
57
67
clients an encrypted password. The encrypted password is
58
decrypted by the clients using the same OpenPGP key, and the
68
decrypted by the clients using an OpenPGP key, and the
59
69
password is then used to unlock the root file system,
60
70
whereupon the computers can continue booting normally.