1
<?xml version="1.0" encoding="UTF-8"?>
1
<?xml version='1.0' encoding='UTF-8'?>
2
<?xml-stylesheet type="text/xsl"
3
href="http://docbook.sourceforge.net/release/xsl/current/manpages/docbook.xsl"?>
2
4
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
5
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4
6
<!ENTITY VERSION "1.0">
5
7
<!ENTITY COMMANDNAME "mandos">
6
<!ENTITY OVERVIEW SYSTEM "overview.xml">
11
12
<title>&COMMANDNAME;</title>
12
<!-- NWalsh’s docbook scripts use this to generate the footer: -->
13
<!-- NWalsh's docbook scripts use this to generate the footer: -->
13
14
<productname>&COMMANDNAME;</productname>
14
15
<productnumber>&VERSION;</productnumber>
75
76
<command>&COMMANDNAME;</command>
76
<arg>--interface<arg choice="plain">IF</arg></arg>
77
<arg>--address<arg choice="plain">ADDRESS</arg></arg>
78
<arg>--port<arg choice="plain">PORT</arg></arg>
79
<arg>--priority<arg choice="plain">PRIORITY</arg></arg>
80
<arg>--servicename<arg choice="plain">NAME</arg></arg>
81
<arg>--configdir<arg choice="plain">DIRECTORY</arg></arg>
85
<command>&COMMANDNAME;</command>
86
<arg>-i<arg choice="plain">IF</arg></arg>
87
<arg>-a<arg choice="plain">ADDRESS</arg></arg>
88
<arg>-p<arg choice="plain">PORT</arg></arg>
89
<arg>--priority<arg choice="plain">PRIORITY</arg></arg>
90
<arg>--servicename<arg choice="plain">NAME</arg></arg>
91
<arg>--configdir<arg choice="plain">DIRECTORY</arg></arg>
95
<command>&COMMANDNAME;</command>
97
<arg choice="plain">-h</arg>
98
<arg choice="plain">--help</arg>
102
<command>&COMMANDNAME;</command>
103
<arg choice="plain">--version</arg>
106
<command>&COMMANDNAME;</command>
107
<arg choice="plain">--check</arg>
77
<arg choice='opt'>--interface<arg choice='plain'>IF</arg></arg>
78
<arg choice='opt'>--address<arg choice='plain'>ADDRESS</arg></arg>
79
<arg choice='opt'>--port<arg choice='plain'>PORT</arg></arg>
80
<arg choice='opt'>--priority<arg choice='plain'>PRIORITY</arg></arg>
81
<arg choice='opt'>--servicename<arg choice='plain'>NAME</arg></arg>
82
<arg choice='opt'>--configdir<arg choice='plain'>DIRECTORY</arg></arg>
83
<arg choice='opt'>--debug</arg>
86
<command>&COMMANDNAME;</command>
87
<arg choice='opt'>-i<arg choice='plain'>IF</arg></arg>
88
<arg choice='opt'>-a<arg choice='plain'>ADDRESS</arg></arg>
89
<arg choice='opt'>-p<arg choice='plain'>PORT</arg></arg>
90
<arg choice='opt'>--priority<arg choice='plain'>PRIORITY</arg></arg>
91
<arg choice='opt'>--servicename<arg choice='plain'>NAME</arg></arg>
92
<arg choice='opt'>--configdir<arg choice='plain'>DIRECTORY</arg></arg>
93
<arg choice='opt'>--debug</arg>
96
<command>&COMMANDNAME;</command>
97
<arg choice='plain'>--help</arg>
100
<command>&COMMANDNAME;</command>
101
<arg choice='plain'>--version</arg>
104
<command>&COMMANDNAME;</command>
105
<arg choice='plain'>--check</arg>
109
107
</refsynopsisdiv>
114
112
<command>&COMMANDNAME;</command> is a server daemon which
115
113
handles incoming request for passwords for a pre-defined list of
116
114
client host computers. The Mandos server uses Zeroconf to
117
announce itself on the local network, and uses TLS to
118
communicate securely with and to authenticate the clients. The
119
Mandos server uses IPv6 to allow Mandos clients to use IPv6
120
link-local addresses, since the clients will probably not have
121
any other addresses configured (see <xref linkend="overview"/>).
122
Any authenticated client is then given the stored pre-encrypted
123
password for that specific client.
115
announce itself on the local network, and uses GnuTLS to
116
communicate securely with and to authenticate the clients.
117
Mandos uses IPv6 link-local addresses, since the clients are
118
assumed to not have any other addresses configured. Any
119
authenticated client is then given the pre-encrypted password
120
for that specific client.
132
129
The purpose of this is to enable <emphasis>remote and unattended
133
rebooting</emphasis> of client host computer with an
134
<emphasis>encrypted root file system</emphasis>. See <xref
135
linkend="overview"/> for details.
130
rebooting</emphasis> of any client host computer with an
131
<emphasis>encrypted root file system</emphasis>. The client
132
host computer should start a Mandos client in the initial RAM
133
disk environment, the Mandos client program communicates with
134
this server program to get an encrypted password, which is then
135
decrypted and used to unlock the encrypted root file system.
136
The client host computer can then continue its boot sequence
222
222
GnuTLS priority string for the TLS handshake with the
223
clients. The default is
224
<citerefentry><refentrytitle>gnutls_priority_init
225
</refentrytitle><manvolnum>3</manvolnum></citerefentry>
226
for the syntax. The default is
224
227
<quote><literal>SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP</literal></quote>.
225
See <citerefentry><refentrytitle>gnutls_priority_init
226
</refentrytitle><manvolnum>3</manvolnum></citerefentry>
227
for the syntax. <emphasis>Warning</emphasis>: changing
228
this may make the TLS handshake fail, making communication
229
with clients impossible.
228
<emphasis>Warning</emphasis>: changing this may make the
229
TLS handshake fail, making communication with clients
239
240
Zeroconf service name. The default is
240
<quote><literal>Mandos</literal></quote>. This only needs
241
to be changed this if it, for some reason, is necessary to
242
run more than one server on the same
243
<emphasis>host</emphasis>, which would not normally be
244
useful. If there are name collisions on the same
245
<emphasis>network</emphasis>, the newer server will
246
automatically rename itself to <quote><literal>Mandos
247
#2</literal></quote>, and so on; therefore, this option is
248
not needed in that case.
241
<quote><literal>Mandos</literal></quote>. You only need
242
to change this if you for some reason want to run more
243
than one server on the same <emphasis>host</emphasis>,
244
which would not normally be useful. If there are name
245
collisions on the same <emphasis>network</emphasis>, the
246
newer server will automatically rename itself to
247
<quote><literal>Mandos #2</literal></quote>, and so on,
248
therefore this option is not needed in that case.
351
341
are still up. If a client has not been confirmed as being up
352
342
for some time, the client is assumed to be compromised and is no
353
343
longer eligible to receive the encrypted password. The timeout,
354
checker program, and interval between checks can be configured
344
checker program and interval between checks can be configured
355
345
both globally and per client; see <citerefentry>
356
346
<refentrytitle>mandos.conf</refentrytitle>
357
347
<manvolnum>5</manvolnum></citerefentry> and <citerefentry>
381
<refsect1 id="environment">
382
<title>ENVIRONMENT</title>
385
<term><varname>PATH</varname></term>
388
To start the configured checker (see <xref
389
linkend="checking"/>), the server uses
390
<filename>/bin/sh</filename>, which in turn uses
391
<varname>PATH</varname> to search for matching commands if
392
an absolute path is not given. See <citerefentry>
393
<refentrytitle>sh</refentrytitle><manvolnum>1</manvolnum>
401
371
<refsect1 id="file">
402
372
<title>FILES</title>
448
<term><filename>/bin/sh</filename></term>
451
This is used to start the configured checker command for
452
each client. See <citerefentry>
453
<refentrytitle>mandos-clients.conf</refentrytitle>
454
<manvolnum>5</manvolnum></citerefentry> for details.
461
420
<refsect1 id="bugs">
462
421
<title>BUGS</title>
464
423
This server might, on especially fatal errors, emit a Python
465
424
backtrace. This could be considered a feature.
468
Currently, if a client is declared <quote>invalid</quote> due to
469
having timed out, the server does not record this fact onto
470
permanent storage. This has some security implications, see
471
<xref linkend="CLIENTS"/>.
474
There is currently no way of querying the server of the current
475
status of clients, other than analyzing its <systemitem
476
class="service">syslog</systemitem> output.
479
There is no fine-grained control over logging and debug output.
482
Debug mode is conflated with running in the foreground.
485
The console log messages does not show a timestamp.
489
<refsect1 id="example">
490
<title>EXAMPLE</title>
428
<refsect1 id="examples">
429
<title>EXAMPLES</title>
491
430
<informalexample>
493
432
Normal invocation needs no options:
498
437
</informalexample>
499
438
<informalexample>
501
Run the server in debug mode, read configuration files from
502
the <filename>~/mandos</filename> directory, and use the
503
Zeroconf service name <quote>Test</quote> to not collide with
504
any other official Mandos server on this host:
440
Run the server in debug mode and read configuration files from
441
the <filename>~/mandos</filename> directory:
527
464
<refsect1 id="security">
528
465
<title>SECURITY</title>
529
<refsect2 id="SERVER">
530
467
<title>SERVER</title>
532
Running this <command>&COMMANDNAME;</command> server program
533
should not in itself present any security risk to the host
534
computer running it. The program does not need any special
535
privileges to run, and is designed to run as a non-root user.
469
Running the server should not in itself present any security
470
risk to the host computer running it.
538
<refsect2 id="CLIENTS">
539
474
<title>CLIENTS</title>
541
476
The server only gives out its stored data to clients which
546
481
itself and looks up the fingerprint in its list of
547
482
clients. The <filename>clients.conf</filename> file (see
548
483
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
549
<manvolnum>5</manvolnum></citerefentry>)
550
<emphasis>must</emphasis> be made non-readable by anyone
551
except the user running the server.
554
As detailed in <xref linkend="checking"/>, the status of all
555
client computers will continually be checked and be assumed
556
compromised if they are gone for too long.
559
If a client is compromised, its downtime should be duly noted
560
by the server which would therefore declare the client
561
invalid. But if the server was ever restarted, it would
562
re-read its client list from its configuration file and again
563
regard all clients therein as valid, and hence eligible to
564
receive their passwords. Therefore, be careful when
565
restarting servers if it is suspected that a client has, in
566
fact, been compromised by parties who may now be running a
567
fake Mandos client with the keys from the non-encrypted
568
initial RAM image of the client host. What should be done in
569
that case (if restarting the server program really is
570
necessary) is to stop the server program, edit the
571
configuration file to omit any suspect clients, and restart
484
<manvolnum>5</manvolnum></citerefentry>) must be non-readable
485
by anyone except the user running the server.
575
488
For more details on client-side security, see
582
495
<refsect1 id="see_also">
583
496
<title>SEE ALSO</title>
588
<refentrytitle>password-request</refentrytitle>
589
<manvolnum>8mandos</manvolnum>
594
This is the actual program which talks to this server.
595
Note that it is normally not invoked directly, and is only
596
run in the initial RAM disk environment, and not on a
597
fully started system.
603
<ulink url="http://www.zeroconf.org/">Zeroconf</ulink>
607
Zeroconf is the network protocol standard used by clients
608
for finding this Mandos server on the local network.
614
<ulink url="http://www.avahi.org/">Avahi</ulink>
618
Avahi is the library this server calls to implement
619
Zeroconf service announcements.
626
url="http://www.gnu.org/software/gnutls/">GnuTLS</ulink>
630
GnuTLS is the library this server uses to implement TLS for
631
communicating securely with the client, and at the same time
632
confidently get the client’s public OpenPGP key.
638
<citation>RFC 4291: <citetitle>IP Version 6 Addressing
639
Architecture</citetitle>, section 2.5.6, Link-Local IPv6
640
Unicast Addresses</citation>
644
The clients use IPv6 link-local addresses, which are
645
immediately usable since a link-local addresses is
646
automatically assigned to a network interfaces when it is
653
<citation>RFC 4346: <citetitle>The Transport Layer Security
654
(TLS) Protocol Version 1.1</citetitle></citation>
658
TLS 1.1 is the protocol implemented by GnuTLS.
664
<citation>RFC 4880: <citetitle>OpenPGP Message
665
Format</citetitle></citation>
669
The data sent to clients is binary encrypted OpenPGP data.
675
<citation>RFC 5081: <citetitle>Using OpenPGP Keys for
676
Transport Layer Security</citetitle></citation>
680
This is implemented by GnuTLS and used by this server so
681
that OpenPGP keys can be used.
497
<itemizedlist spacing="compact">
499
<citerefentry><refentrytitle>password-request</refentrytitle>
500
<manvolnum>8mandos</manvolnum></citerefentry>
504
<citerefentry><refentrytitle>plugin-runner</refentrytitle>
505
<manvolnum>8mandos</manvolnum></citerefentry>
509
<ulink url="http://www.zeroconf.org/">Zeroconf</ulink>
513
<ulink url="http://www.avahi.org/">Avahi</ulink>
518
url="http://www.gnu.org/software/gnutls/">GnuTLS</ulink>
522
<citation>RFC 4880: <citetitle>OpenPGP Message
523
Format</citetitle></citation>
527
<citation>RFC 5081: <citetitle>Using OpenPGP Keys for
528
Transport Layer Security</citetitle></citation>
532
<citation>RFC 4291: <citetitle>IP Version 6 Addressing
533
Architecture</citetitle>, section 2.5.6, Link-Local IPv6
534
Unicast Addresses</citation>