75
75
<command>&COMMANDNAME;</command>
76
<arg choice="opt">--interface<arg choice="plain">IF</arg></arg>
77
<arg choice="opt">--address<arg choice="plain">ADDRESS</arg></arg>
78
<arg choice="opt">--port<arg choice="plain">PORT</arg></arg>
79
<arg choice="opt">--priority<arg choice="plain">PRIORITY</arg></arg>
80
<arg choice="opt">--servicename<arg choice="plain">NAME</arg></arg>
81
<arg choice="opt">--configdir<arg choice="plain">DIRECTORY</arg></arg>
82
<arg choice="opt">--debug</arg>
85
<command>&COMMANDNAME;</command>
86
<arg choice="opt">-i<arg choice="plain">IF</arg></arg>
87
<arg choice="opt">-a<arg choice="plain">ADDRESS</arg></arg>
88
<arg choice="opt">-p<arg choice="plain">PORT</arg></arg>
89
<arg choice="opt">--priority<arg choice="plain">PRIORITY</arg></arg>
90
<arg choice="opt">--servicename<arg choice="plain">NAME</arg></arg>
91
<arg choice="opt">--configdir<arg choice="plain">DIRECTORY</arg></arg>
92
<arg choice="opt">--debug</arg>
95
<command>&COMMANDNAME;</command>
96
<arg choice="plain">--help</arg>
76
<arg>--interface<arg choice="plain">IF</arg></arg>
77
<arg>--address<arg choice="plain">ADDRESS</arg></arg>
78
<arg>--port<arg choice="plain">PORT</arg></arg>
79
<arg>--priority<arg choice="plain">PRIORITY</arg></arg>
80
<arg>--servicename<arg choice="plain">NAME</arg></arg>
81
<arg>--configdir<arg choice="plain">DIRECTORY</arg></arg>
85
<command>&COMMANDNAME;</command>
86
<arg>-i<arg choice="plain">IF</arg></arg>
87
<arg>-a<arg choice="plain">ADDRESS</arg></arg>
88
<arg>-p<arg choice="plain">PORT</arg></arg>
89
<arg>--priority<arg choice="plain">PRIORITY</arg></arg>
90
<arg>--servicename<arg choice="plain">NAME</arg></arg>
91
<arg>--configdir<arg choice="plain">DIRECTORY</arg></arg>
95
<command>&COMMANDNAME;</command>
97
<arg choice="plain">-h</arg>
98
<arg choice="plain">--help</arg>
99
102
<command>&COMMANDNAME;</command>
155
158
Only announce the server and listen to requests on network
156
159
interface <replaceable>IF</replaceable>. Default is to
157
use all available interfaces.
160
use all available interfaces. <emphasis>Note:</emphasis>
161
a failure to bind to the specified interface is not
162
considered critical, and the server does not exit.
380
<refsect1 id="environment">
381
<title>ENVIRONMENT</title>
384
<term><varname>PATH</varname></term>
387
To start the configured checker (see <xref
388
linkend="checking"/>), the server uses
389
<filename>/bin/sh</filename>, which in turn uses
390
<varname>PATH</varname> to search for matching commands if
391
an absolute path is not given. See <citerefentry>
392
<refentrytitle>sh</refentrytitle><manvolnum>1</manvolnum>
375
400
<refsect1 id="file">
376
401
<title>FILES</title>
447
<term><filename>/bin/sh</filename></term>
450
This is used to start the configured checker command for
451
each client. See <citerefentry>
452
<refentrytitle>mandos-clients.conf</refentrytitle>
453
<manvolnum>5</manvolnum></citerefentry> for details.
424
460
<refsect1 id="bugs">
425
461
<title>BUGS</title>
427
463
This server might, on especially fatal errors, emit a Python
428
464
backtrace. This could be considered a feature.
467
Currently, if a client is declared <quote>invalid</quote> due to
468
having timed out, the server does not record this fact onto
469
permanent storage. This has some security implications, see
470
<xref linkend="CLIENTS"/>.
473
There is currently no way of querying the server of the current
474
status of clients, other than analyzing its <systemitem
475
class="service">syslog</systemitem> output.
478
There is no fine-grained control over logging and debug output.
481
Debug mode is conflated with running in the foreground.
484
The console log messages does not show a timestamp.
432
<refsect1 id="examples">
433
<title>EXAMPLES</title>
488
<refsect1 id="example">
489
<title>EXAMPLE</title>
434
490
<informalexample>
436
492
Normal invocation needs no options:
470
526
<refsect1 id="security">
471
527
<title>SECURITY</title>
528
<refsect2 id="SERVER">
473
529
<title>SERVER</title>
475
Running this &COMMANDNAME; server program should not in itself
476
present any security risk to the host computer running it.
477
The program does not need any special privileges to run, and
478
is designed to run as a non-root user.
531
Running this <command>&COMMANDNAME;</command> server program
532
should not in itself present any security risk to the host
533
computer running it. The program does not need any special
534
privileges to run, and is designed to run as a non-root user.
537
<refsect2 id="CLIENTS">
482
538
<title>CLIENTS</title>
484
540
The server only gives out its stored data to clients which
499
555
compromised if they are gone for too long.
558
If a client is compromised, its downtime should be duly noted
559
by the server which would therefore declare the client
560
invalid. But if the server was ever restarted, it would
561
re-read its client list from its configuration file and again
562
regard all clients therein as valid, and hence eligible to
563
receive their passwords. Therefore, be careful when
564
restarting servers if you suspect that a client has, in fact,
565
been compromised by parties who may now be running a fake
566
Mandos client with the keys from the non-encrypted initial RAM
567
image of the client host. What should be done in that case
568
(if restarting the server program really is necessary) is to
569
stop the server program, edit the configuration file to omit
570
any suspect clients, and restart the server program.
502
573
For more details on client-side security, see
503
574
<citerefentry><refentrytitle>password-request</refentrytitle>
504
575
<manvolnum>8mandos</manvolnum></citerefentry>.