11
12
<title>Mandos Manual</title>
12
13
<!-- NWalsh’s docbook scripts use this to generate the footer: -->
13
14
<productname>Mandos</productname>
14
<productnumber>&VERSION;</productnumber>
15
<productnumber>&version;</productnumber>
15
16
<date>&TIMESTAMP;</date>
18
19
<firstname>Björn</firstname>
19
20
<surname>Påhlsson</surname>
21
<email>belorn@fukt.bsnet.se</email>
22
<email>belorn@recompile.se</email>
25
26
<firstname>Teddy</firstname>
26
27
<surname>Hogeborn</surname>
28
<email>teddy@fukt.bsnet.se</email>
29
<email>teddy@recompile.se</email>
34
43
<holder>Teddy Hogeborn</holder>
35
44
<holder>Björn Påhlsson</holder>
39
This manual page is free software: you can redistribute it
40
and/or modify it under the terms of the GNU General Public
41
License as published by the Free Software Foundation,
42
either version 3 of the License, or (at your option) any
47
This manual page is distributed in the hope that it will
48
be useful, but WITHOUT ANY WARRANTY; without even the
49
implied warranty of MERCHANTABILITY or FITNESS FOR A
50
PARTICULAR PURPOSE. See the GNU General Public License
55
You should have received a copy of the GNU General Public
56
License along with this program; If not, see
57
<ulink url="http://www.gnu.org/licenses/"/>.
46
<xi:include href="legalnotice.xml"/>
63
50
<refentrytitle>&COMMANDNAME;</refentrytitle>
64
51
<manvolnum>8</manvolnum>
178
175
</refsynopsisdiv>
180
177
<refsect1 id="description">
181
178
<title>DESCRIPTION</title>
183
180
<command>&COMMANDNAME;</command> is a program to generate the
185
<citerefentry><refentrytitle>password-request</refentrytitle>
186
<manvolnum>8mandos</manvolnum></citerefentry>. The keys are
182
<citerefentry><refentrytitle>mandos-client</refentrytitle>
183
<manvolnum>8mandos</manvolnum></citerefentry>. The key is
187
184
normally written to /etc/mandos for later installation into the
188
initrd image, but this, like most things, can be changed with
189
command line options.
185
initrd image, but this, and most other things, can be changed
186
with command line options.
192
It can also be used to generate ready-made sections for
189
This program can also be used with the
190
<option>--password</option> or <option>--passfile</option>
191
options to generate a ready-made section for
192
<filename>clients.conf</filename> (see
193
193
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
194
<manvolnum>5</manvolnum></citerefentry> using the
195
<option>--password</option> option.
194
<manvolnum>5</manvolnum></citerefentry>).
199
198
<refsect1 id="purpose">
200
199
<title>PURPOSE</title>
203
201
The purpose of this is to enable <emphasis>remote and unattended
204
202
rebooting</emphasis> of client host computer with an
205
203
<emphasis>encrypted root file system</emphasis>. See <xref
206
204
linkend="overview"/> for details.
211
208
<refsect1 id="options">
212
209
<title>OPTIONS</title>
216
<term><literal>-h</literal>, <literal>--help</literal></term>
213
<term><option>--help</option></term>
214
<term><option>-h</option></term>
219
217
Show a help message and exit
225
<term><literal>-d</literal>, <literal>--dir
226
<replaceable>directory</replaceable></literal></term>
224
<replaceable>DIRECTORY</replaceable></option></term>
226
<replaceable>DIRECTORY</replaceable></option></term>
229
229
Target directory for key files. Default is
230
<filename>/etc/mandos</filename>.
236
<term><literal>-t</literal>, <literal>--type
237
<replaceable>type</replaceable></literal></term>
240
Key type. Default is <quote>DSA</quote>.
246
<term><literal>-l</literal>, <literal>--length
247
<replaceable>bits</replaceable></literal></term>
250
Key length in bits. Default is 2048.
256
<term><literal>-s</literal>, <literal>--subtype
257
<replaceable>type</replaceable></literal></term>
260
Subkey type. Default is <quote>ELG-E</quote> (Elgamal
230
<filename class="directory">/etc/mandos</filename>.
237
<replaceable>TYPE</replaceable></option></term>
239
<replaceable>TYPE</replaceable></option></term>
242
Key type. Default is <quote>RSA</quote>.
248
<term><option>--length
249
<replaceable>BITS</replaceable></option></term>
251
<replaceable>BITS</replaceable></option></term>
254
Key length in bits. Default is 4096.
260
<term><option>--subtype
261
<replaceable>KEYTYPE</replaceable></option></term>
263
<replaceable>KEYTYPE</replaceable></option></term>
266
Subkey type. Default is <quote>RSA</quote> (Elgamal
261
267
encryption-only).
267
<term><literal>-L</literal>, <literal>--sublength
268
<replaceable>bits</replaceable></literal></term>
273
<term><option>--sublength
274
<replaceable>BITS</replaceable></option></term>
276
<replaceable>BITS</replaceable></option></term>
271
Subkey length in bits. Default is 2048.
279
Subkey length in bits. Default is 4096.
277
<term><literal>-e</literal>, <literal>--email</literal>
278
<replaceable>address</replaceable></term>
285
<term><option>--email
286
<replaceable>ADDRESS</replaceable></option></term>
288
<replaceable>ADDRESS</replaceable></option></term>
281
291
Email address of key. Default is empty.
287
<term><literal>-c</literal>, <literal>--comment</literal>
288
<replaceable>comment</replaceable></term>
297
<term><option>--comment
298
<replaceable>TEXT</replaceable></option></term>
300
<replaceable>TEXT</replaceable></option></term>
291
Comment field for key. The default value is
292
<quote><literal>Mandos client key</literal></quote>.
303
Comment field for key. Default is empty.
298
<term><literal>-x</literal>, <literal>--expire</literal>
299
<replaceable>time</replaceable></term>
309
<term><option>--expire
310
<replaceable>TIME</replaceable></option></term>
312
<replaceable>TIME</replaceable></option></term>
302
315
Key expire time. Default is no expiration. See
328
342
>8</manvolnum></citerefentry>. The host name or the name
329
343
specified with the <option>--name</option> option is used
330
344
for the section header. All other options are ignored,
331
and no keys are created.
345
and no key is created.
350
<term><option>--passfile
351
<replaceable>FILE</replaceable></option></term>
353
<replaceable>FILE</replaceable></option></term>
356
The same as <option>--password</option>, but read from
357
<replaceable>FILE</replaceable>, not the terminal.
362
<term><option>--no-ssh</option></term>
363
<term><option>-S</option></term>
366
When <option>--password</option> or
367
<option>--passfile</option> is given, this option will
368
prevent <command>&COMMANDNAME;</command> from calling
369
<command>ssh-keyscan</command> to get an SSH fingerprint
370
for this host and, if successful, output suitable config
371
options to use this fingerprint as a
372
<option>checker</option> option in the output. This is
373
otherwise the default behavior.
338
380
<refsect1 id="overview">
339
381
<title>OVERVIEW</title>
340
382
<xi:include href="overview.xml"/>
342
384
This program is a small utility to generate new OpenPGP keys for
385
new Mandos clients, and to generate sections for inclusion in
386
<filename>clients.conf</filename> on the server.
347
390
<refsect1 id="exit_status">
348
391
<title>EXIT STATUS</title>
350
The exit status will be 0 if new keys were successfully created,
393
The exit status will be 0 if a new key (or password, if the
394
<option>--password</option> option was used) was successfully
395
created, otherwise not.
437
479
</informalexample>
482
Prompt for a password, encrypt it with the key in <filename
483
class="directory">/etc/mandos</filename> and output a section
484
suitable for <filename>clients.conf</filename>.
487
<userinput>&COMMANDNAME; --password</userinput>
492
Prompt for a password, encrypt it with the key in the
493
<filename>client-key</filename> directory and output a section
494
suitable for <filename>clients.conf</filename>.
498
<!-- do not wrap this line -->
499
<userinput>&COMMANDNAME; --password --dir client-key</userinput>
440
505
<refsect1 id="security">
441
506
<title>SECURITY</title>
443
508
The <option>--type</option>, <option>--length</option>,
444
509
<option>--subtype</option>, and <option>--sublength</option>
445
options can be used to create keys of insufficient security. If
446
in doubt, leave them to the default values.
510
options can be used to create keys of low security. If in
511
doubt, leave them to the default values.
449
The key expire time is not guaranteed to be honored by
450
<citerefentry><refentrytitle>mandos</refentrytitle>
514
The key expire time is <emphasis>not</emphasis> guaranteed to be
515
honored by <citerefentry><refentrytitle>mandos</refentrytitle>
451
516
<manvolnum>8</manvolnum></citerefentry>.
455
520
<refsect1 id="see_also">
456
521
<title>SEE ALSO</title>
523
<citerefentry><refentrytitle>intro</refentrytitle>
524
<manvolnum>8mandos</manvolnum></citerefentry>,
458
525
<citerefentry><refentrytitle>gpg</refentrytitle>
459
526
<manvolnum>1</manvolnum></citerefentry>,
527
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
528
<manvolnum>5</manvolnum></citerefentry>,
460
529
<citerefentry><refentrytitle>mandos</refentrytitle>
461
530
<manvolnum>8</manvolnum></citerefentry>,
462
<citerefentry><refentrytitle>password-request</refentrytitle>
463
<manvolnum>8mandos</manvolnum></citerefentry>
531
<citerefentry><refentrytitle>mandos-client</refentrytitle>
532
<manvolnum>8mandos</manvolnum></citerefentry>,
533
<citerefentry><refentrytitle>ssh-keyscan</refentrytitle>
534
<manvolnum>1</manvolnum></citerefentry>