summaryrefslogtreecommitdiff
path: root/doc/README.admin
blob: a644bbefb34ada670ed25b24214094652afb5f3a (plain)
  1. Monkeysphere Server Administrator README
  2. ========================================
  3. FIXME: distinguish between publishing a new monkeysphere-enabled host
  4. key and accepting user identification via the web-of-trust.
  5. server service publication
  6. --------------------------
  7. To publish a server host key:
  8. # monkeysphere-server gen-key
  9. # monkeysphere-server publish-key
  10. This will generate the key for server with the service URI
  11. (ssh://server.hostname). The server admin should now sign the server
  12. key so that people in the admin's web of trust can authenticate the
  13. server without manual host key checking:
  14. $ gpg --search ='ssh://server.hostname'
  15. $ gpg --sign-key ='ssh://server.hostname'
  16. Update OpenSSH configuration files
  17. ----------------------------------
  18. To use the newly-generated host key for ssh connections, put the
  19. following line in /etc/ssh/sshd_config (be sure to remove references
  20. to any other key):
  21. HostKey /var/lib/monkeysphere/ssh_host_rsa_key
  22. FIXME: should we just suggest symlinks in the filesystem here instead?
  23. FIXME: What about DSA host keys? The SSH RFC seems to require that DSA be available, though OpenSSH will work without a DSA host key.
  24. To enable users to use the monkeysphere to authenticate against the
  25. web-of-trust, add this line to /etc/ssh/sshd_config (again, making
  26. sure that no other AuthorizedKeysFile directive exists):
  27. AuthorizedKeysFile /var/lib/monkeysphere/authorized_keys/%u
  28. MonkeySphere authorized_keys maintenance
  29. ----------------------------------------
  30. A system can maintain monkeysphere authorized_keys files for it's
  31. users.
  32. For each user account on the server, the userids of people authorized
  33. to log into that account would be placed in:
  34. ~/.config/monkeysphere/authorized_user_ids
  35. However, in order for users to become authenticated, the server must
  36. determine that the user keys have "full" validity. This means that
  37. the server must fully trust at least one person whose signature on the
  38. connecting user's key would validate the user. This would generally be
  39. the server admin. If the server admin's keyid is XXXXXXXX, then on
  40. the server run:
  41. # monkeysphere-server add-identity-certifier XXXXXXXX
  42. To update the monkeysphere authorized_keys file for user "bob", the
  43. system would then run the following:
  44. # monkeysphere-server update-users bob
  45. To update the monkeysphere authorized_keys file for all users on the
  46. the system, run the same command with no arguments:
  47. # monkeysphere-server update-users
  48. You probably want to set up a regularly scheduled job (e.g. with cron)
  49. to take care of this regularly.
  50. FIXME: document other likely problems and troubleshooting techniques