1 Next-Steps Monkeysphere Projects:
2 ---------------------------------
4 Detail advantages of monkeysphere: detail the race conditions in ssh,
5 and how the monkeysphere can help you reduce these threat vectors:
6 threat model reduction diagrams.
8 Handle unverified monkeysphere hosts in such a way that they're not
9 always removed from known_hosts file. Ask user to lsign the host
12 Work out the details (and describe a full use case) for assigning a
13 REVOKER during monkeysphere-server gen_key -- how is this set? How
14 do we export it so it's available when a second-party revocation is
17 Provide a friendly interactive UI for marginal or failing client-side
18 hostkey verifications. Handle the common cases smoothly, and
19 provide good debugging info for the unusual cases.
21 Create ssh2openpgp or convert to full-fledged keytrans.
23 Resolve the bugs listed in openpgp2ssh(1):BUGS.
25 Understand and document the output of gpg --check-trustdb:
26 gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
27 gpg: depth: 0 valid: 2 signed: 20 trust: 0-, 0q, 0n, 0m, 0f, 2u
28 gpg: depth: 1 valid: 20 signed: 67 trust: 15-, 0q, 1n, 3m, 1f, 0u
29 gpg: next trustdb check due at 2008-10-09
31 Understand and document the numeric values between sig! and the keyid
32 in "gpg --check-sigs $KEYID" . Compare with the details found from
33 "gpg --with-colons --check-sigs $KEYID". This has to do with trust
36 Fix gpg's documentation to clarify the difference between validity and
37 ownertrust. Include better documentation for trust signatures.
39 Make it easier to do domain-relative ssh host trust signatures with
40 gnupg. (e.g. "i trust Jamie McClelland (keyID 76CC057D) to properly
41 identify ssh servers in the mayfirst.org domain") See:
42 http://tools.ietf.org/html/rfc4880#section-5.2.3.21 and grep for
45 Fix the order of questions when user does a tsign in gpg or gpg2.
47 File bug against ssh-keygen about how "-R" option removes comments
48 from known_hosts file.
50 File bug against ssh-keygen to see if we can get it to write to hash a
51 known_hosts file to/from stdout/stdin.
53 When using ssh-proxycommand, if only host keys found are expired or
54 revoked, then output loud warning with prompt, or fail hard.
56 File bug against seahorse about how, when creating new primary keys,
57 it presents option for "RSA (sign only)" but then creates an "esca"
60 File bug against enigmail about lack of ability to create subkeys.
62 Test and document what happens when any filesystem that the
63 monkeysphere-server relies on and modifies (/tmp, /etc, and /var?)
66 Optimize keyserver access, particularly on monkeysphere-server
67 update-users -- is there a way to query the keyserver all in a
70 Create DSA authentication subkey for server during gen-key
72 Fix behavior when add-identity-certifier fails to fetch a key from the
75 Allow server administrators to add-identity-certifier from a key in
76 the filesystem (or on stdin, etc)
78 Think about packaging monkeysphere for other (non-apt-based) operating
79 systems. RPM-based linux systems, FreeBSD ports, and Mac OS X seem
80 like the most likely candidates.