summaryrefslogtreecommitdiff
path: root/man/man8/monkeysphere-host.8
blob: fd676a466fa85d5cf4d17cf94c65033c005f3b7c (plain)
  1. .TH MONKEYSPHERE-SERVER "8" "June 2008" "monkeysphere" "User Commands"
  2. .SH NAME
  3. monkeysphere-host \- Monkeysphere host admin tool.
  4. .SH SYNOPSIS
  5. .B monkeysphere-host \fIsubcommand\fP [\fIargs\fP]
  6. .br
  7. .B monkeysphere-host expert \fIexpert-subcommand\fP [\fIargs\fP]
  8. .SH DESCRIPTION
  9. \fBMonkeysphere\fP is a framework to leverage the OpenPGP web of trust
  10. for OpenSSH authentication. OpenPGP keys are tracked via GnuPG, and
  11. added to the authorized_keys and known_hosts files used by OpenSSH for
  12. connection authentication.
  13. \fBmonkeysphere-host\fP is a Monkeysphere server admin utility.
  14. .SH SUBCOMMANDS
  15. \fBmonkeysphere-host\fP takes various subcommands:
  16. .TP
  17. .B extend-key EXPIRE
  18. Extend the validity of the OpenPGP key for the host until EXPIRE from
  19. the present. If EXPIRE is not specified, then the user will be
  20. prompted for the extension term. Expiration is specified like GnuPG
  21. does:
  22. .nf
  23. 0 = key does not expire
  24. <n> = key expires in n days
  25. <n>w = key expires in n weeks
  26. <n>m = key expires in n months
  27. <n>y = key expires in n years
  28. .fi
  29. `e' may be used in place of `extend-key'.
  30. .TP
  31. .B add-hostname HOSTNAME
  32. Add a hostname user ID to the server host key. `n+' may be used in
  33. place of `add-hostname'.
  34. .TP
  35. .B revoke-hostname HOSTNAME
  36. Revoke a hostname user ID from the server host key. `n-' may be used
  37. in place of `revoke-hostname'.
  38. .TP
  39. .B add-revoker FINGERPRINT
  40. .TP
  41. .B show-key
  42. Output gpg information about host's OpenPGP key. `s' may be used in
  43. place of `show-key'.
  44. .TP
  45. .B publish-key
  46. Publish the host's OpenPGP key to the keyserver. `p' may be used in
  47. place of `publish-key'.
  48. .TP
  49. .B help
  50. Output a brief usage summary. `h' or `?' may be used in place of
  51. `help'.
  52. .TP
  53. .B version
  54. show version number
  55. .SH "EXPERT" SUBCOMMANDS
  56. Some commands are very unlikely to be needed by most administrators.
  57. These commands must follow the word `expert'.
  58. .TP
  59. .B gen-key [HOSTNAME]
  60. Generate a OpenPGP key for the host. If HOSTNAME is not specified,
  61. then the system fully-qualified domain name will be user. An
  62. alternate key bit length can be specified with the `-l' or `--length'
  63. option (default 2048). An expiration length can be specified with the
  64. `-e' or `--expire' option (prompt otherwise). The expiration format
  65. is the same as that of \fBextend-key\fP, below. A key revoker
  66. fingerprint can be specified with the `-r' or `--revoker' option. `g'
  67. may be used in place of `gen-key'.
  68. .TP
  69. .B diagnostics
  70. Review the state of the server with respect to the MonkeySphere in
  71. general and report on suggested changes. Among other checks, this
  72. includes making sure there is a valid host key, that the key is
  73. published, that the sshd configuration points to the right place, and
  74. that there are at least some valid identity certifiers. `d' may be
  75. used in place of `diagnostics'.
  76. .TP
  77. .B import-key
  78. FIXME:
  79. import-key (i) import existing ssh key to gpg
  80. --hostname (-h) NAME[:PORT] hostname for key user ID
  81. --keyfile (-f) FILE key file to import
  82. --expire (-e) EXPIRE date to expire
  83. .SH SETUP
  84. In order to start using the monkeysphere, you must first generate an
  85. OpenPGP key for the server and convert that key to an ssh key that can
  86. be used by ssh for host authentication. This can be done with the
  87. \fBgen-key\fP subcommand:
  88. $ monkeysphere-server gen-key
  89. To enable host verification via the monkeysphere, you must then
  90. publish the host's key to the Web of Trust using the \fBpublish-key\fP
  91. command to push the key to a keyserver. You must also modify the
  92. sshd_config on the server to tell sshd where the new server host key
  93. is located:
  94. HostKey /var/lib/monkeysphere/ssh_host_rsa_key
  95. In order for users logging into the system to be able to identify the
  96. host via the monkeysphere, at least one person (e.g. a server admin)
  97. will need to sign the host's key. This is done using standard OpenPGP
  98. keysigning techniques, usually: pul the key from the keyserver, verify
  99. and sign the key, and then re-publish the signature. Once an admin's
  100. signature is published, users logging into the host can use it to
  101. validate the host's key.
  102. .TP
  103. MONKEYSPHERE_LOG_LEVEL
  104. Set the log level (INFO). Can be SILENT, ERROR, INFO, VERBOSE, DEBUG, in
  105. increasing order of verbosity.
  106. .TP
  107. MONKEYSPHERE_KEYSERVER
  108. OpenPGP keyserver to use (subkeys.pgp.net).
  109. .SH FILES
  110. .TP
  111. /etc/monkeysphere/monkeysphere-host.conf
  112. System monkeysphere-host config file.
  113. .TP
  114. /var/lib/monkeysphere/ssh_host_rsa_key
  115. Copy of the host's private key in ssh format, suitable for use by
  116. sshd.
  117. .SH AUTHOR
  118. Written by Jameson Rollins <jrollins@fifthhorseman.net>, Daniel Kahn
  119. Gillmor <dkg@fifthhorseman.net>
  120. .SH SEE ALSO
  121. .BR monkeysphere (1),
  122. .BR monkeysphere-authentication (8),
  123. .BR monkeysphere (7),
  124. .BR gpg (1),
  125. .BR ssh (1)