11
12
<title>Mandos Manual</title>
12
13
<!-- NWalsh’s docbook scripts use this to generate the footer: -->
13
14
<productname>Mandos</productname>
14
<productnumber>&VERSION;</productnumber>
15
<productnumber>&version;</productnumber>
15
16
<date>&TIMESTAMP;</date>
18
19
<firstname>Björn</firstname>
19
20
<surname>Påhlsson</surname>
21
<email>belorn@fukt.bsnet.se</email>
22
<email>belorn@recompile.se</email>
25
26
<firstname>Teddy</firstname>
26
27
<surname>Hogeborn</surname>
28
<email>teddy@fukt.bsnet.se</email>
29
<email>teddy@recompile.se</email>
34
45
<holder>Teddy Hogeborn</holder>
35
46
<holder>Björn Påhlsson</holder>
39
This manual page is free software: you can redistribute it
40
and/or modify it under the terms of the GNU General Public
41
License as published by the Free Software Foundation,
42
either version 3 of the License, or (at your option) any
47
This manual page is distributed in the hope that it will
48
be useful, but WITHOUT ANY WARRANTY; without even the
49
implied warranty of MERCHANTABILITY or FITNESS FOR A
50
PARTICULAR PURPOSE. See the GNU General Public License
55
You should have received a copy of the GNU General Public
56
License along with this program; If not, see
57
<ulink url="http://www.gnu.org/licenses/"/>.
48
<xi:include href="legalnotice.xml"/>
63
52
<refentrytitle>&COMMANDNAME;</refentrytitle>
64
53
<manvolnum>8</manvolnum>
178
177
</refsynopsisdiv>
180
179
<refsect1 id="description">
181
180
<title>DESCRIPTION</title>
183
182
<command>&COMMANDNAME;</command> is a program to generate the
185
<citerefentry><refentrytitle>password-request</refentrytitle>
186
<manvolnum>8mandos</manvolnum></citerefentry>. The keys are
184
<citerefentry><refentrytitle>mandos-client</refentrytitle>
185
<manvolnum>8mandos</manvolnum></citerefentry>. The key is
187
186
normally written to /etc/mandos for later installation into the
188
initrd image, but this, like most things, can be changed with
189
command line options.
187
initrd image, but this, and most other things, can be changed
188
with command line options.
192
It can also be used to generate ready-made sections for
191
This program can also be used with the
192
<option>--password</option> or <option>--passfile</option>
193
options to generate a ready-made section for
194
<filename>clients.conf</filename> (see
193
195
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
194
<manvolnum>5</manvolnum></citerefentry> using the
195
<option>--password</option> option.
196
<manvolnum>5</manvolnum></citerefentry>).
199
200
<refsect1 id="purpose">
200
201
<title>PURPOSE</title>
203
203
The purpose of this is to enable <emphasis>remote and unattended
204
204
rebooting</emphasis> of client host computer with an
205
205
<emphasis>encrypted root file system</emphasis>. See <xref
206
206
linkend="overview"/> for details.
211
210
<refsect1 id="options">
212
211
<title>OPTIONS</title>
216
<term><literal>-h</literal>, <literal>--help</literal></term>
215
<term><option>--help</option></term>
216
<term><option>-h</option></term>
219
219
Show a help message and exit
225
<term><literal>-d</literal>, <literal>--dir
226
<replaceable>directory</replaceable></literal></term>
226
<replaceable>DIRECTORY</replaceable></option></term>
228
<replaceable>DIRECTORY</replaceable></option></term>
229
231
Target directory for key files. Default is
230
<filename>/etc/mandos</filename>.
236
<term><literal>-t</literal>, <literal>--type
237
<replaceable>type</replaceable></literal></term>
240
Key type. Default is <quote>DSA</quote>.
246
<term><literal>-l</literal>, <literal>--length
247
<replaceable>bits</replaceable></literal></term>
250
Key length in bits. Default is 2048.
256
<term><literal>-s</literal>, <literal>--subtype
257
<replaceable>type</replaceable></literal></term>
260
Subkey type. Default is <quote>ELG-E</quote> (Elgamal
232
<filename class="directory">/etc/mandos</filename>.
239
<replaceable>TYPE</replaceable></option></term>
241
<replaceable>TYPE</replaceable></option></term>
244
Key type. Default is <quote>RSA</quote>.
250
<term><option>--length
251
<replaceable>BITS</replaceable></option></term>
253
<replaceable>BITS</replaceable></option></term>
256
Key length in bits. Default is 4096.
262
<term><option>--subtype
263
<replaceable>KEYTYPE</replaceable></option></term>
265
<replaceable>KEYTYPE</replaceable></option></term>
268
Subkey type. Default is <quote>RSA</quote> (Elgamal
261
269
encryption-only).
267
<term><literal>-L</literal>, <literal>--sublength
268
<replaceable>bits</replaceable></literal></term>
275
<term><option>--sublength
276
<replaceable>BITS</replaceable></option></term>
278
<replaceable>BITS</replaceable></option></term>
271
Subkey length in bits. Default is 2048.
281
Subkey length in bits. Default is 4096.
277
<term><literal>-e</literal>, <literal>--email</literal>
278
<replaceable>address</replaceable></term>
287
<term><option>--email
288
<replaceable>ADDRESS</replaceable></option></term>
290
<replaceable>ADDRESS</replaceable></option></term>
281
293
Email address of key. Default is empty.
287
<term><literal>-c</literal>, <literal>--comment</literal>
288
<replaceable>comment</replaceable></term>
299
<term><option>--comment
300
<replaceable>TEXT</replaceable></option></term>
302
<replaceable>TEXT</replaceable></option></term>
291
Comment field for key. The default value is
292
<quote><literal>Mandos client key</literal></quote>.
305
Comment field for key. Default is empty.
298
<term><literal>-x</literal>, <literal>--expire</literal>
299
<replaceable>time</replaceable></term>
311
<term><option>--expire
312
<replaceable>TIME</replaceable></option></term>
314
<replaceable>TIME</replaceable></option></term>
302
317
Key expire time. Default is no expiration. See
328
344
>8</manvolnum></citerefentry>. The host name or the name
329
345
specified with the <option>--name</option> option is used
330
346
for the section header. All other options are ignored,
331
and no keys are created.
347
and no key is created.
352
<term><option>--passfile
353
<replaceable>FILE</replaceable></option></term>
355
<replaceable>FILE</replaceable></option></term>
358
The same as <option>--password</option>, but read from
359
<replaceable>FILE</replaceable>, not the terminal.
364
<term><option>--no-ssh</option></term>
365
<term><option>-S</option></term>
368
When <option>--password</option> or
369
<option>--passfile</option> is given, this option will
370
prevent <command>&COMMANDNAME;</command> from calling
371
<command>ssh-keyscan</command> to get an SSH fingerprint
372
for this host and, if successful, output suitable config
373
options to use this fingerprint as a
374
<option>checker</option> option in the output. This is
375
otherwise the default behavior.
338
382
<refsect1 id="overview">
339
383
<title>OVERVIEW</title>
340
384
<xi:include href="overview.xml"/>
342
386
This program is a small utility to generate new OpenPGP keys for
387
new Mandos clients, and to generate sections for inclusion in
388
<filename>clients.conf</filename> on the server.
347
392
<refsect1 id="exit_status">
348
393
<title>EXIT STATUS</title>
350
The exit status will be 0 if new keys were successfully created,
395
The exit status will be 0 if a new key (or password, if the
396
<option>--password</option> option was used) was successfully
397
created, otherwise not.
437
481
</informalexample>
484
Prompt for a password, encrypt it with the key in <filename
485
class="directory">/etc/mandos</filename> and output a section
486
suitable for <filename>clients.conf</filename>.
489
<userinput>&COMMANDNAME; --password</userinput>
494
Prompt for a password, encrypt it with the key in the
495
<filename>client-key</filename> directory and output a section
496
suitable for <filename>clients.conf</filename>.
500
<!-- do not wrap this line -->
501
<userinput>&COMMANDNAME; --password --dir client-key</userinput>
440
507
<refsect1 id="security">
441
508
<title>SECURITY</title>
443
510
The <option>--type</option>, <option>--length</option>,
444
511
<option>--subtype</option>, and <option>--sublength</option>
445
options can be used to create keys of insufficient security. If
446
in doubt, leave them to the default values.
512
options can be used to create keys of low security. If in
513
doubt, leave them to the default values.
449
The key expire time is not guaranteed to be honored by
450
<citerefentry><refentrytitle>mandos</refentrytitle>
516
The key expire time is <emphasis>not</emphasis> guaranteed to be
517
honored by <citerefentry><refentrytitle>mandos</refentrytitle>
451
518
<manvolnum>8</manvolnum></citerefentry>.
455
522
<refsect1 id="see_also">
456
523
<title>SEE ALSO</title>
525
<citerefentry><refentrytitle>intro</refentrytitle>
526
<manvolnum>8mandos</manvolnum></citerefentry>,
458
527
<citerefentry><refentrytitle>gpg</refentrytitle>
459
528
<manvolnum>1</manvolnum></citerefentry>,
529
<citerefentry><refentrytitle>mandos-clients.conf</refentrytitle>
530
<manvolnum>5</manvolnum></citerefentry>,
460
531
<citerefentry><refentrytitle>mandos</refentrytitle>
461
532
<manvolnum>8</manvolnum></citerefentry>,
462
<citerefentry><refentrytitle>password-request</refentrytitle>
463
<manvolnum>8mandos</manvolnum></citerefentry>
533
<citerefentry><refentrytitle>mandos-client</refentrytitle>
534
<manvolnum>8mandos</manvolnum></citerefentry>,
535
<citerefentry><refentrytitle>ssh-keyscan</refentrytitle>
536
<manvolnum>1</manvolnum></citerefentry>