X-Git-Url: https://codewiz.org/gitweb?a=blobdiff_plain;f=doc%2FTODO;h=733986e102224cb374510c2cf46adc367381a310;hb=a6e5b1468a7ee5c6b0345c1f3ad65c3831880009;hp=e2fce0e8f7a10f45f4cd43751a835d81a13b905c;hpb=a5066c3a37a84bf47e1e1d6ff8ad755ad5fa9414;p=monkeysphere.git diff --git a/doc/TODO b/doc/TODO index e2fce0e..733986e 100644 --- a/doc/TODO +++ b/doc/TODO @@ -5,36 +5,23 @@ Detail advantages of monkeysphere: detail the race conditions in ssh, and how the monkeysphere can help you reduce these threat vectors: threat model reduction diagrams. -Determine how openssh handles multiple processes writing to - known_hosts/authorized_keys files (lockfile, atomic appends?) - Handle unverified monkeysphere hosts in such a way that they're not always removed from known_hosts file. Ask user to lsign the host key? -Handle multiple hostnames (multiple user IDs?) when generating host - keys with gen-key. - Work out the details (and describe a full use case) for assigning a REVOKER during monkeysphere-server gen_key -- how is this set? How do we export it so it's available when a second-party revocation is needed? -Actually enable server hostkey publication. - -Streamline host key generation, publication, verification. See - doc/george/host-key-publication for what dkg went through on - 2008-06-19 - -Streamline authorized_user_ids setup (including question of where - authorized_user_ids files should go). See - doc/george/user-id-configuration for what dkg went through on - 2008-06-19 - Ensure that authorized_user_ids are under as tight control as ssh expects from authorized_keys: we don't want monkeysphere to be a weak link in the filesystem. +Consider the default permissions for + /var/lib/monkeysphere/authorized_keys/* (and indeed the whole + directory path leading up to that) + Make sure alternate ports are handled for known_hosts. Script to import private key into ssh agent. @@ -45,14 +32,16 @@ Provide a friendly interactive UI for marginal or failing client-side Make sure onak properly escapes user IDs with colons in them. -Build a decent, presentable web site for documentation, evangelism, - etc. Include a mention of how to report trouble or concerns. +Indicate on web site how to report trouble or concerns, and how to + join the project. + +Clean up the style for the web site (pages, icons, etc). Create ssh2openpgp or convert to full-fledged keytrans. Resolve the bugs listed in openpgp2ssh(1):BUGS. -Understand and document alternate trustdb models. +Document alternate trustdb models. Understand and document the output of gpg --check-trustdb: gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model @@ -82,17 +71,27 @@ File bug against ssh-keygen about how "-R" option removes comments File bug against ssh-keygen to see if we can get it to write to hash a known_hosts file to/from stdout/stdin. -Add environment variables sections to man pages. +When using ssh-proxycommand, if only host keys found are expired or + revoked, then output loud warning with prompt, or fail hard. -Environment variable scoping. +File bug against seahorse about how, when creating new primary keys, + it presents option for "RSA (sign only)" but then creates an "esca" + key. -Move environment variable precedence before conf file. +File bug against enigmail about lack of ability to create subkeys. -When using ssh-proxycommand, if only host keys found are expired or - revoked, then output loud warning with prompt, or fail hard. +Test and document what happens when any filesystem that the + monkeysphere-server relies on and modifies (/tmp, /etc, and /var?) + fills up. + +Optimize keyserver access, particularly on monkeysphere-server + update-users -- is there a way to query the keyserver all in a + chunk? + +Create DSA authentication subkey for server during gen-key -Update monkeysphere-ssh-proxycommand man page with new keyserver - checking policy info. +Fix behavior when add-identity-certifier fails to fetch a key from the + keyserver. -Update monkeysphere-ssh-proxycommand man page with info about - no-connect option. +Allow server administrators to add-identity-certifier from a key in + the filesystem (or on stdin, etc)