/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to mandos-clients.conf.xml

  • Committer: Teddy Hogeborn
  • Date: 2019-02-10 03:50:20 UTC
  • Revision ID: teddy@recompile.se-20190210035020-nttr1tybgwwixueu
Show debconf note about new TLS key IDs

If mandos-client did not see TLS keys and had to create them, or if
mandos sees GnuTLS version 3.6.6 or later, show an important notice on
package installation about the importance of adding the new key_id
options to clients.conf on the Mandos server.

* debian/control (Package: mandos, Package: mandos-client): Depend on
                                                            debconf.
* debian/mandos-client.lintian-overrides: Override warnings.
* debian/mandos-client.postinst (create_keys): Show notice if new TLS
                                               key files were created.
* debian/mandos-client.templates: New.
* debian/mandos.lintian-overrides: Override warnings.
* debian/mandos.postinst (configure): If GnuTLS 3.6.6 or later is
                                      detected, show an important
                                      notice (once) about the new
                                      key_id option required in
                                      clients.conf.
* debian/mandos.templates: New.

Show diffs side-by-side

added added

removed removed

Lines of Context:
3
3
        "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4
4
<!ENTITY CONFNAME "mandos-clients.conf">
5
5
<!ENTITY CONFPATH "<filename>/etc/mandos/clients.conf</filename>">
6
 
<!ENTITY TIMESTAMP "2018-02-08">
 
6
<!ENTITY TIMESTAMP "2019-02-09">
7
7
<!ENTITY % common SYSTEM "common.ent">
8
8
%common;
9
9
]>
186
186
            >--</option> %%(host)s</literal></quote>.  Note that
187
187
            <command>mandos-keygen</command>, when generating output
188
188
            to be inserted into this file, normally looks for an SSH
189
 
            server on the Mandos client, and, if it find one, outputs
 
189
            server on the Mandos client, and, if it finds one, outputs
190
190
            a <option>checker</option> option to check for the
191
 
            client’s key fingerprint – this is more secure against
 
191
            client’s SSH key fingerprint – this is more secure against
192
192
            spoofing.
193
193
          </para>
194
194
          <para>
239
239
      </varlistentry>
240
240
      
241
241
      <varlistentry>
 
242
        <term><option>key_id<literal> = </literal
 
243
        ><replaceable>HEXSTRING</replaceable></option></term>
 
244
        <listitem>
 
245
          <para>
 
246
            This option is <emphasis>optional</emphasis>.
 
247
          </para>
 
248
          <para>
 
249
            This option sets the certificate key ID that identifies
 
250
            the public key that clients authenticate themselves with
 
251
            through TLS.  The string needs to be in hexadecimal form,
 
252
            but spaces or upper/lower case are not significant.
 
253
          </para>
 
254
        </listitem>
 
255
      </varlistentry>
 
256
      
 
257
      <varlistentry>
242
258
        <term><option><literal>host = </literal><replaceable
243
259
        >STRING</replaceable></option></term>
244
260
        <listitem>
314
330
          <para>
315
331
            If present, this option must be set to a string of
316
332
            base64-encoded binary data.  It will be decoded and sent
317
 
            to the client matching the above
318
 
            <option>fingerprint</option>.  This should, of course, be
319
 
            OpenPGP encrypted data, decryptable only by the client.
 
333
            to the client matching the above <option>key_id</option>
 
334
            or <option>fingerprint</option>.  This should, of course,
 
335
            be OpenPGP encrypted data, decryptable only by the client.
320
336
            The program <citerefentry><refentrytitle><command
321
337
            >mandos-keygen</command></refentrytitle><manvolnum
322
338
            >8</manvolnum></citerefentry> can, using its
417
433
        <quote><literal>created</literal></quote>,
418
434
        <quote><literal>enabled</literal></quote>,
419
435
        <quote><literal>expires</literal></quote>,
 
436
        <quote><literal>key_id</literal></quote>,
420
437
        <quote><literal>fingerprint</literal></quote>,
421
438
        <quote><literal>host</literal></quote>,
422
439
        <quote><literal>interval</literal></quote>,
479
496
 
480
497
# Client "foo"
481
498
[foo]
 
499
key_id = 788cd77115cd0bb7b2d5e0ae8496f6b48149d5e712c652076b1fd2d957ef7c1f
482
500
fingerprint =  7788 2722 5BA7 DE53 9C5A  7CFA 59CF F7CD BD9A 5920
483
501
secret =
484
502
        hQIOA6QdEjBs2L/HEAf/TCyrDe5Xnm9esa+Pb/vWF9CUqfn4srzVgSu234
501
519
 
502
520
# Client "bar"
503
521
[bar]
 
522
key_id = F90C7A81D72D1EA69A51031A91FF8885F36C8B46D155C8C58709A4C99AE9E361
504
523
fingerprint = 3e393aeaefb84c7e89e2f547b3a107558fca3a27
505
524
secfile = /etc/mandos/bar-secret
506
525
timeout = PT15M