4
4
Maintainer: Mandos Maintainers <mandos@recompile.se>
5
5
Uploaders: Teddy Hogeborn <teddy@recompile.se>,
6
6
Björn Påhlsson <belorn@recompile.se>
7
Build-Depends: debhelper (>= 9), docbook-xml, docbook-xsl,
8
libavahi-core-dev, libgpgme11-dev, libgnutls28-dev (>= 3.3.0)
9
| gnutls-dev (>= 3.3.0), xsltproc, pkg-config,
11
Build-Depends-Indep: systemd, python (>= 2.7), python (<< 3),
12
python-dbus, python-avahi, python-gi | python-gobject
13
Standards-Version: 3.9.7
14
Vcs-Bzr: http://ftp.recompile.se/pub/mandos/trunk
15
Vcs-Browser: http://bzr.recompile.se/loggerhead/mandos/trunk/files
16
Homepage: http://www.recompile.se/mandos
7
Build-Depends: debhelper (>= 10), docbook-xml, docbook-xsl,
8
libavahi-core-dev, libgpgme-dev | libgpgme11-dev,
9
libglib2.0-dev (>=2.40), libgnutls28-dev (>= 3.3.0),
10
libgnutls28-dev (>= 3.6.6) | libgnutls28-dev (<< 3.6.0),
11
xsltproc, pkg-config, libnl-route-3-dev, systemd
12
Build-Depends-Indep: python3 (>= 3), python3-dbus, python3-gi,
14
Standards-Version: 4.6.2
15
Vcs-Bzr: https://ftp.recompile.se/pub/mandos/trunk
16
Vcs-Browser: https://bzr.recompile.se/loggerhead/mandos/trunk/files
17
Homepage: https://www.recompile.se/mandos
18
Rules-Requires-Root: binary-targets
20
Depends: ${misc:Depends}, python (>= 2.7), python (<< 3),
21
libgnutls28-dev (>= 3.3.0) | libgnutls30 (>= 3.3.0),
22
python-dbus, python-avahi, python-gi | python-gobject,
23
avahi-daemon, adduser, python-urwid, gnupg
22
Depends: ${misc:Depends}, python3 (>= 3), libgnutls30 (>= 3.3.0),
23
libgnutls30 (>= 3.6.6) | libgnutls30 (<< 3.6.0),
24
python3-dbus, python3-gi, avahi-daemon, adduser,
25
python3-urwid, gnupg, systemd-sysv | lsb-base (>= 3.0-6),
26
debconf (>= 1.5.5) | debconf-2.0
24
27
Recommends: ssh-client | fping
28
Suggests: libc6-dev | libc-dev, c-compiler
25
29
Description: server giving encrypted passwords to Mandos clients
26
30
This is the server part of the Mandos system, which allows
27
31
computers to have encrypted root file systems and at the
30
34
The computers run a small client program in the initial RAM
31
35
disk environment which will communicate with a server over a
32
36
network. All network communication is encrypted using TLS.
33
The clients are identified by the server using an OpenPGP
37
The clients are identified by the server using a TLS public
34
38
key; each client has one unique to it. The server sends the
35
39
clients an encrypted password. The encrypted password is
36
decrypted by the clients using the same OpenPGP key, and the
40
decrypted by the clients using an OpenPGP key, and the
37
41
password is then used to unlock the root file system,
38
42
whereupon the computers can continue booting normally.
40
44
Package: mandos-client
41
45
Architecture: linux-any
42
Depends: ${shlibs:Depends}, ${misc:Depends}, adduser, cryptsetup,
43
initramfs-tools, dpkg-dev (>=1.16.0)
44
Recommends: ssh, gnutls-bin | openssl
46
Depends: ${shlibs:Depends}, ${misc:Depends}, adduser,
47
cryptsetup (<< 2:2.0.3-1) | cryptsetup-initramfs,
48
initramfs-tools (>= 0.99) | dracut (>= 044+241-3),
50
gnutls-bin (>= 3.6.6) | libgnutls30 (<< 3.6.0),
51
debconf (>= 1.5.5) | debconf-2.0
45
53
Breaks: dropbear (<= 0.53.1-1)
46
54
Enhances: cryptsetup
55
Conflicts: dracut-config-generic
47
56
Description: do unattended reboots with an encrypted root file system
48
57
This is the client part of the Mandos system, which allows
49
58
computers to have encrypted root file systems and at the
52
61
The computers run a small client program in the initial RAM
53
62
disk environment which will communicate with a server over a
54
63
network. All network communication is encrypted using TLS.
55
The clients are identified by the server using an OpenPGP
64
The clients are identified by the server using a TLS public
56
65
key; each client has one unique to it. The server sends the
57
66
clients an encrypted password. The encrypted password is
58
decrypted by the clients using the same OpenPGP key, and the
67
decrypted by the clients using an OpenPGP key, and the
59
68
password is then used to unlock the root file system,
60
69
whereupon the computers can continue booting normally.