1 Next-Steps Monkeysphere Projects:
2 ---------------------------------
4 Detail advantages of monkeysphere: detail the race conditions in ssh,
5 and how the monkeysphere can help you reduce these threat vectors:
6 threat model reduction diagrams.
8 Determine how openssh handles multiple processes writing to
9 known_hosts/authorized_keys files (lockfile, atomic appends?)
11 Handle unverified monkeysphere hosts in such a way that they're not
12 always removed from known_hosts file. Ask user to lsign the host
15 Handle multiple hostnames (multiple user IDs?) when generating host
18 Work out the details (and describe a full use case) for assigning a
19 REVOKER during monkeysphere-server gen_key -- how is this set? How
20 do we export it so it's available when a second-party revocation is
23 Actually enable server hostkey publication.
25 Streamline host key generation, publication, verification. See
26 doc/george/host-key-publication for what dkg went through on
29 Streamline authorized_user_ids setup (including question of where
30 authorized_user_ids files should go). See
31 doc/george/user-id-configuration for what dkg went through on
34 Ensure that authorized_user_ids are under as tight control as ssh
35 expects from authorized_keys: we don't want monkeysphere to be a
36 weak link in the filesystem.
38 Make sure alternate ports are handled for known_hosts.
40 Script to import private key into ssh agent.
42 Provide a friendly interactive UI for marginal or failing client-side
43 hostkey verifications. Handle the common cases smoothly, and
44 provide good debugging info for the unusual cases.
46 Make sure onak properly escapes user IDs with colons in them.
48 Build a decent, presentable web site for documentation, evangelism,
49 etc. Include a mention of how to report trouble or concerns.
51 Create ssh2openpgp or convert to full-fledged keytrans.
53 Resolve the bugs listed in openpgp2ssh(1):BUGS.
55 Understand and document alternate trustdb models.
57 Understand and document the output of gpg --check-trustdb:
58 gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
59 gpg: depth: 0 valid: 2 signed: 20 trust: 0-, 0q, 0n, 0m, 0f, 2u
60 gpg: depth: 1 valid: 20 signed: 67 trust: 15-, 0q, 1n, 3m, 1f, 0u
61 gpg: next trustdb check due at 2008-10-09
63 Understand and document the numeric values between sig! and the keyid
64 in "gpg --check-sigs $KEYID" . Compare with the details found from
65 "gpg --with-colons --check-sigs $KEYID". This has to do with trust
68 Fix gpg's documentation to clarify the difference between validity and
69 ownertrust. Include better documentation for trust signatures.
71 Make it easier to do domain-relative ssh host trust signatures with
72 gnupg. (e.g. "i trust Jamie McClelland (keyID 76CC057D) to properly
73 identify ssh servers in the mayfirst.org domain") See:
74 http://tools.ietf.org/html/rfc4880#section-5.2.3.21 and grep for
77 Fix the order of questions when user does a tsign in gpg or gpg2.
79 File bug against ssh-keygen about how "-R" option removes comments
80 from known_hosts file.
82 File bug against ssh-keygen to see if we can get it to write to hash a
83 known_hosts file to/from stdout/stdin.
85 Add environment variables sections to man pages.
87 Environment variable scoping.
89 Move environment variable precedence before conf file.
91 When using ssh-proxycommand, if only host keys found are expired or
92 revoked, then output loud warning with prompt, or fail hard.
94 Update monkeysphere-ssh-proxycommand man page with new keyserver
97 Update monkeysphere-ssh-proxycommand man page with info about