124
124
<refsect1 id="description">
125
125
<title>DESCRIPTION</title>
127
<command>&COMMANDNAME;</command> is a mandos plugin that works
128
like a client program that through avahi detects mandos servers,
129
sets up a gnutls connect and request a encrypted password. Any
130
passwords given is automaticly decrypted and passed to
127
<command>&COMMANDNAME;</command> is a client program that
128
communicates with <citerefentry><refentrytitle
129
>mandos</refentrytitle><manvolnum>8</manvolnum></citerefentry>
130
to get a password. It uses IPv6 link-local addresses to get
131
network connectivity, Zeroconf to find servers, and TLS with an
132
OpenPGP key to ensure authenticity and confidentiality. It
133
keeps running, trying all servers on the network, until it
134
receives a satisfactory reply or a TERM signal is recieved.
137
This program is not meant to be run directly; it is really meant
138
to run as a plugin of the <application>Mandos</application>
139
<citerefentry><refentrytitle>plugin-runner</refentrytitle>
140
<manvolnum>8mandos</manvolnum></citerefentry>, which runs in the
141
initial <acronym>RAM</acronym> disk environment because it is
142
specified as a <quote>keyscript</quote> in the <citerefentry>
143
<refentrytitle>crypttab</refentrytitle><manvolnum>5</manvolnum>
144
</citerefentry> file.
148
<refsect1 id="purpose">
149
<title>PURPOSE</title>
151
The purpose of this is to enable <emphasis>remote and unattended
152
rebooting</emphasis> of client host computer with an
153
<emphasis>encrypted root file system</emphasis>. See <xref
154
linkend="overview"/> for details.
135
158
<refsect1 id="options">
136
159
<title>OPTIONS</title>
138
Commonly not invoked as command lines but from configuration
139
file of plugin runner.
161
This program is commonly not invoked from the command line; it
162
is normally started by the <application>Mandos</application>
163
plugin runner, see <citerefentry><refentrytitle
164
>plugin-runner</refentrytitle><manvolnum>8mandos</manvolnum>
165
</citerefentry>. Any command line options this program accepts
166
are therefore normally provided by the plugin runner, and not
144
172
<term><option>--connect=<replaceable
145
>IPADDR</replaceable><literal>:</literal><replaceable
173
>ADDRESS</replaceable><literal>:</literal><replaceable
146
174
>PORT</replaceable></option></term>
148
<replaceable>IPADDR</replaceable><literal>:</literal
176
<replaceable>ADDRESS</replaceable><literal>:</literal
149
177
><replaceable>PORT</replaceable></option></term>
152
Connect directly to a specified mandos server
180
Do not use Zeroconf to locate servers. Connect directly
181
to only one specified <application>Mandos</application>
182
server. Note that an IPv6 address has colon characters in
183
it, so the <emphasis>last</emphasis> colon character is
184
assumed to separate the address from the port number.
187
This option is normally only useful for testing and
158
194
<term><option>--keydir=<replaceable
159
195
>DIRECTORY</replaceable></option></term>
173
213
<replaceable>NAME</replaceable></option></term>
176
Interface that Avahi will connect through
216
Network interface that will be brought up and scanned for
217
Mandos servers to connect to. The default it
218
<quote><literal>eth0</literal></quote>.
221
If the <option>--connect</option> option is used, this
222
specifies the interface to use to connect to the address
182
229
<term><option>--pubkey=<replaceable
183
230
>FILE</replaceable></option></term>
255
315
<term><option>-V</option></term>
258
Prints the program version
318
Prints the program version.
325
<refsect1 id="overview">
326
<title>OVERVIEW</title>
327
<xi:include href="../overview.xml"/>
329
This program is the client part. It is a plugin started by
330
<citerefentry><refentrytitle>plugin-runner</refentrytitle>
331
<manvolnum>8mandos</manvolnum></citerefentry> which will run in
332
an initial <acronym>RAM</acronym> disk environment.
335
This program could, theoretically, be used as a keyscript in
336
<filename>/etc/crypttab</filename>, but it would then be
337
impossible to enter a password for the encrypted root disk at
338
the console, since this program does not read from the console
339
at all. This is why a separate plugin does that, which will be
340
run in parallell to this one by the plugin runner.
265
344
<refsect1 id="exit_status">
266
345
<title>EXIT STATUS</title>
347
This program will exit with a successful (zero) exit status if a
348
server could be found and the password received from it could be
349
successfully decrypted and output on standard output. The
350
program will exit with a non-zero exit status only if a critical
351
error occurs. Otherwise, it will forever connect to new
352
<application>Mandos</application> servers as they appear, trying
353
to get a decryptable password.
271
357
<refsect1 id="environment">
272
358
<title>ENVIRONMENT</title>
360
This program does not use any environment variables, not even
361
the ones provided by <citerefentry><refentrytitle
362
>cryptsetup</refentrytitle><manvolnum>8</manvolnum>
277
367
<refsect1 id="file">
278
368
<title>FILES</title>
371
<term><filename>/conf/conf.d/mandos/pubkey.txt</filename
373
<term><filename>/conf/conf.d/mandos/seckey.txt</filename
377
OpenPGP public and private key files, in <quote>ASCII
378
Armor</quote> format. These are the default file names,
379
they can be changed with the <option>--pubkey</option> and
380
<option>--seckey</option> options.
387
<!-- <refsect1 id="bugs"> -->
388
<!-- <title>BUGS</title> -->
289
393
<refsect1 id="example">
290
394
<title>EXAMPLE</title>
396
Note that normally, command line options will not be given
397
directly, but via options for the Mandos <citerefentry
398
><refentrytitle>plugin-runner</refentrytitle>
399
<manvolnum>8mandos</manvolnum></citerefentry>.
403
Normal invocation needs no options, if the network interface
404
is <quote>eth0</quote>:
407
<userinput>&COMMANDNAME;</userinput>
412
Search for Mandos servers on another interface:
415
<!-- do not wrap this line -->
416
<userinput>&COMMANDNAME; --interface eth1</userinput>
421
Run in debug mode, and use a custom key directory:
424
<!-- do not wrap this line -->
425
<userinput>&COMMANDNAME; --debug --keydir keydir</userinput>
430
Run in debug mode, with a custom key directory, and do not use
431
Zeroconf to locate a server; connect directly to the IPv6
432
address <quote><systemitem class="ipaddress"
433
>2001:db8:f983:bd0b:30de:ae4a:71f2:f672</systemitem></quote>,
434
port 4711, using interface eth2:
438
<!-- do not wrap this line -->
439
<userinput>&COMMANDNAME; --debug --keydir keydir --connect 2001:db8:f983:bd0b:30de:ae4a:71f2:f672:4711 --interface eth2</userinput>
295
445
<refsect1 id="security">