Add ":!RSA" to GnuTLS priority string, to disallow non-DHE kx.
If Mandos was somehow made to use a non-ephemeral Diffie-Hellman key exchange algorithm in the TLS handshake, any saved network traffic could then be decrypted later if the Mandos client key was obtained. By default, Mandos uses ephemeral DH key exchanges which does not have this problem, but a non-ephemeral key exchange algorithm was still enabled by default. The simplest solution is to simply turn that off, which ensures that Mandos will always use ephemeral DH key exchanges.
There is a "PFS" priority string specifier, but we can't use it because:
1. Security-wise, it is a mix between "NORMAL" and "SECURE128" - it enables a lot more algorithms than "SECURE256".
2. It is only available since GnuTLS 3.2.4.
Thanks to Andreas Fischer <af@bantuX.org> for reporting this issue.
Watch this directory and add/remove/update clients?
69
73
** TODO Use python-tlslite?
70
74
** TODO D-Bus AddClient() method on server object
71
75
** TODO Use org.freedesktop.DBus.Method.NoReply annotation on async methods. :2:
72
** TODO Emit [[http://dbus.freedesktop.org/doc/dbus-specification.html#standard-interfaces-properties][org.freedesktop.DBus.Properties.PropertiesChanged]] signal :2:
73
TODO Deprecate se.recompile.Mandos.Client.PropertyChanged - annotate!
74
TODO Can use "invalidates" annotation to also emit on changed secret.
75
76
** TODO Support [[http://dbus.freedesktop.org/doc/dbus-specification.html#standard-interfaces-objectmanager][org.freedesktop.DBus.ObjectManager]] interface on server object :2: