summaryrefslogtreecommitdiff
path: root/doc/TODO
blob: 8be02b93811ea2a23fa324ef10f942429e84690f (plain)
  1. Next-Steps Monkeysphere Projects:
  2. ---------------------------------
  3. Detail advantages of monkeysphere: detail the race conditions in ssh,
  4. and how the monkeysphere can help you reduce these threat vectors:
  5. threat model reduction diagrams.
  6. Handle unverified monkeysphere hosts in such a way that they're not
  7. always removed from known_hosts file. Ask user to lsign the host
  8. key?
  9. Handle multiple hostnames (multiple user IDs?) when generating host
  10. keys with gen-key.
  11. Work out the details (and describe a full use case) for assigning a
  12. REVOKER during monkeysphere-server gen_key -- how is this set? How
  13. do we export it so it's available when a second-party revocation is
  14. needed?
  15. Actually enable server hostkey publication.
  16. Streamline host key generation, publication, verification. See
  17. doc/george/host-key-publication for what dkg went through on
  18. 2008-06-19
  19. Ensure that authorized_user_ids are under as tight control as ssh
  20. expects from authorized_keys: we don't want monkeysphere to be a
  21. weak link in the filesystem.
  22. Consider the default permissions for
  23. /var/lib/monkeysphere/authorized_keys/* (and indeed the whole
  24. directory path leading up to that)
  25. Make sure alternate ports are handled for known_hosts.
  26. Script to import private key into ssh agent.
  27. Provide a friendly interactive UI for marginal or failing client-side
  28. hostkey verifications. Handle the common cases smoothly, and
  29. provide good debugging info for the unusual cases.
  30. Make sure onak properly escapes user IDs with colons in them.
  31. Indicate on web site how to report trouble or concerns, and how to
  32. join the project.
  33. Clean up the style for the web site (pages, icons, etc).
  34. Create ssh2openpgp or convert to full-fledged keytrans.
  35. Resolve the bugs listed in openpgp2ssh(1):BUGS.
  36. Understand and document alternate trustdb models.
  37. Understand and document the output of gpg --check-trustdb:
  38. gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
  39. gpg: depth: 0 valid: 2 signed: 20 trust: 0-, 0q, 0n, 0m, 0f, 2u
  40. gpg: depth: 1 valid: 20 signed: 67 trust: 15-, 0q, 1n, 3m, 1f, 0u
  41. gpg: next trustdb check due at 2008-10-09
  42. Understand and document the numeric values between sig! and the keyid
  43. in "gpg --check-sigs $KEYID" . Compare with the details found from
  44. "gpg --with-colons --check-sigs $KEYID". This has to do with trust
  45. signatures.
  46. Fix gpg's documentation to clarify the difference between validity and
  47. ownertrust. Include better documentation for trust signatures.
  48. Make it easier to do domain-relative ssh host trust signatures with
  49. gnupg. (e.g. "i trust Jamie McClelland (keyID 76CC057D) to properly
  50. identify ssh servers in the mayfirst.org domain") See:
  51. http://tools.ietf.org/html/rfc4880#section-5.2.3.21 and grep for
  52. "tsign" in gpg(1).
  53. Fix the order of questions when user does a tsign in gpg or gpg2.
  54. File bug against ssh-keygen about how "-R" option removes comments
  55. from known_hosts file.
  56. File bug against ssh-keygen to see if we can get it to write to hash a
  57. known_hosts file to/from stdout/stdin.
  58. When using ssh-proxycommand, if only host keys found are expired or
  59. revoked, then output loud warning with prompt, or fail hard.
  60. File bug against seahorse about how, when creating new primary keys,
  61. it presents option for "RSA (sign only)" but then creates an "esca"
  62. key.
  63. File bug against enigmail about lack of ability to create subkeys.
  64. Test and document what happens when any filesystem that the
  65. monkeysphere-server relies on and modifies (/tmp, /etc, and /var?)
  66. fills up.
  67. Optimize keyserver access, particularly on monkeysphere-server
  68. update-users -- is there a way to query the keyserver all in a
  69. chunk?
  70. Create DSA authentication subkey for server during gen-key
  71. Fix behavior when add-identity-certifier fails to fetch a key from the
  72. keyserver.
  73. Allow server administrators to add-identity-certifier from a key in
  74. the filesystem (or on stdin, etc)
  75. Add "monkeysphere-server diagnostics" subcommand to identify missing
  76. pieces of monkeysphere server administration setup.