summaryrefslogtreecommitdiff
path: root/man/man8/monkeysphere-host.8
blob: 330b6107a20a28c2b4c2ce355039e62b90fa8a41 (plain)
  1. .TH MONKEYSPHERE-SERVER "8" "June 2008" "monkeysphere" "User Commands"
  2. .SH NAME
  3. monkeysphere-host \- Monkeysphere host admin tool.
  4. .SH SYNOPSIS
  5. .B monkeysphere-host \fIsubcommand\fP [\fIargs\fP]
  6. .br
  7. .B monkeysphere-host expert \fIexpert-subcommand\fP [\fIargs\fP]
  8. .SH DESCRIPTION
  9. \fBMonkeysphere\fP is a framework to leverage the OpenPGP web of trust
  10. for OpenSSH authentication. OpenPGP keys are tracked via GnuPG, and
  11. added to the authorized_keys and known_hosts files used by OpenSSH for
  12. connection authentication.
  13. \fBmonkeysphere-host\fP is a Monkeysphere server admin utility.
  14. .SH SUBCOMMANDS
  15. \fBmonkeysphere-host\fP takes various subcommands:
  16. .TP
  17. .B import-key [NAME[:PORT]]
  18. Import a pem-encoded ssh secret host key, from stdin. NAME[:PORT] is
  19. used to specify the hostname (and port) used in the user ID of the new
  20. OpenPGP key. If NAME is not specified, then the system
  21. fully-qualified domain name will be used (ie. `hostname -f'). If PORT
  22. is not specified, the no port is added to the user ID, which means
  23. port 22 is assumed. `i' may be used in place of `import-key'.
  24. .TP
  25. .B show-key
  26. Output information about host's OpenPGP and SSH keys. `s' may be used
  27. in place of `show-key'.
  28. .TP
  29. .B extend-key EXPIRE
  30. Extend the validity of the OpenPGP key for the host until EXPIRE from
  31. the present. If EXPIRE is not specified, then the user will be
  32. prompted for the extension term. Expiration is specified like GnuPG
  33. does:
  34. .nf
  35. 0 = key does not expire
  36. <n> = key expires in n days
  37. <n>w = key expires in n weeks
  38. <n>m = key expires in n months
  39. <n>y = key expires in n years
  40. .fi
  41. `e' may be used in place of `extend-key'.
  42. .TP
  43. .B add-hostname HOSTNAME
  44. Add a hostname user ID to the server host key. `n+' may be used in
  45. place of `add-hostname'.
  46. .TP
  47. .B revoke-hostname HOSTNAME
  48. Revoke a hostname user ID from the server host key. `n-' may be used
  49. in place of `revoke-hostname'.
  50. .TP
  51. .B add-revoker FINGERPRINT
  52. Add a revoker to the host's OpenPGP key. `o' may be be used in place
  53. of `add-revoker'.
  54. .TP
  55. .B revoke-key
  56. Revoke the host's OpenPGP key. `r' may be used in place of
  57. `revoke-key'.
  58. .TP
  59. .B publish-key
  60. Publish the host's OpenPGP key to the keyserver. `p' may be used in
  61. place of `publish-key'.
  62. .TP
  63. .B help
  64. Output a brief usage summary. `h' or `?' may be used in place of
  65. `help'.
  66. .TP
  67. .B version
  68. show version number
  69. Other commands:
  70. .TP
  71. .B diagnostics
  72. Review the state of the monkeysphere server host key and report on
  73. suggested changes. Among other checks, this includes making sure
  74. there is a valid host key, that the key is published, that the sshd
  75. configuration points to the right place, etc. `d' may be used in
  76. place of `diagnostics'.
  77. .SH SETUP HOST AUTHENTICATION
  78. To enable host verification via the monkeysphere, the host's key must
  79. be published to the Web of Trust. This is not done by default. To
  80. publish the host key to the keyservers, run the following command:
  81. $ monkeysphere-host publish-key
  82. In order for users logging into the system to be able to identify the
  83. host via the monkeysphere, at least one person (e.g. a server admin)
  84. will need to sign the host's key. This is done using standard OpenPGP
  85. keysigning techniques, usually: pull the key from the keyserver,
  86. verify and sign the key, and then re-publish the signature. Once an
  87. admin's signature is published, users logging into the host can use it
  88. to validate the host's key.
  89. .SH ENVIRONMENT
  90. The following environment variables will override those specified in
  91. the config file (defaults in parentheses):
  92. .TP
  93. MONKEYSPHERE_LOG_LEVEL
  94. Set the log level (INFO). Can be SILENT, ERROR, INFO, VERBOSE, DEBUG, in
  95. increasing order of verbosity.
  96. .TP
  97. MONKEYSPHERE_KEYSERVER
  98. OpenPGP keyserver to use (pool.sks-keyservers.net).
  99. .SH FILES
  100. .TP
  101. /etc/monkeysphere/monkeysphere-host.conf
  102. System monkeysphere-host config file.
  103. .TP
  104. /var/lib/monkeysphere/host/ssh_host_rsa_key
  105. Copy of the host's private key in ssh format, suitable for use by
  106. sshd.
  107. .SH AUTHOR
  108. Written by:
  109. Jameson Rollins <jrollins@fifthhorseman.net>,
  110. Daniel Kahn Gillmor <dkg@fifthhorseman.net>,
  111. Matthew Goins <mjgoins@openflows.com>
  112. .SH SEE ALSO
  113. .BR monkeysphere (1),
  114. .BR monkeysphere-authentication (8),
  115. .BR monkeysphere (7),
  116. .BR gpg (1),
  117. .BR ssh (1)