X-Git-Url: https://codewiz.org/gitweb?a=blobdiff_plain;f=doc%2FTODO;h=733986e102224cb374510c2cf46adc367381a310;hb=e6d6c460cbe45ef8e87020bc775772cb71a5b861;hp=905d1980804b8a009ca6c42fa2738f4add79c8b8;hpb=79e9e7214bcbd4ecf4d555a1be413532b216c2e7;p=monkeysphere.git diff --git a/doc/TODO b/doc/TODO index 905d198..733986e 100644 --- a/doc/TODO +++ b/doc/TODO @@ -1,15 +1,28 @@ Next-Steps Monkeysphere Projects: --------------------------------- -Handle unknown hosts in such a way that they're not always removed - from known_hosts file. Ask user to lsign the host key? +Detail advantages of monkeysphere: detail the race conditions in ssh, + and how the monkeysphere can help you reduce these threat vectors: + threat model reduction diagrams. -Handle multiple multiple hostnames (multiple user IDs?) when - generating host keys with gen-key. +Handle unverified monkeysphere hosts in such a way that they're not + always removed from known_hosts file. Ask user to lsign the host + key? -Make sure alternate ports are handled for known_hosts. +Work out the details (and describe a full use case) for assigning a + REVOKER during monkeysphere-server gen_key -- how is this set? How + do we export it so it's available when a second-party revocation is + needed? + +Ensure that authorized_user_ids are under as tight control as ssh + expects from authorized_keys: we don't want monkeysphere to be a + weak link in the filesystem. -Add environment variables sections to man pages. +Consider the default permissions for + /var/lib/monkeysphere/authorized_keys/* (and indeed the whole + directory path leading up to that) + +Make sure alternate ports are handled for known_hosts. Script to import private key into ssh agent. @@ -19,14 +32,16 @@ Provide a friendly interactive UI for marginal or failing client-side Make sure onak properly escapes user IDs with colons in them. -Build a decent, presentable web site for documentation, evangelism, - etc. Include a mention of how to report trouble or concerns. +Indicate on web site how to report trouble or concerns, and how to + join the project. + +Clean up the style for the web site (pages, icons, etc). Create ssh2openpgp or convert to full-fledged keytrans. Resolve the bugs listed in openpgp2ssh(1):BUGS. -Understand and document alternate trustdb models. +Document alternate trustdb models. Understand and document the output of gpg --check-trustdb: gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model @@ -49,3 +64,34 @@ Make it easier to do domain-relative ssh host trust signatures with "tsign" in gpg(1). Fix the order of questions when user does a tsign in gpg or gpg2. + +File bug against ssh-keygen about how "-R" option removes comments + from known_hosts file. + +File bug against ssh-keygen to see if we can get it to write to hash a + known_hosts file to/from stdout/stdin. + +When using ssh-proxycommand, if only host keys found are expired or + revoked, then output loud warning with prompt, or fail hard. + +File bug against seahorse about how, when creating new primary keys, + it presents option for "RSA (sign only)" but then creates an "esca" + key. + +File bug against enigmail about lack of ability to create subkeys. + +Test and document what happens when any filesystem that the + monkeysphere-server relies on and modifies (/tmp, /etc, and /var?) + fills up. + +Optimize keyserver access, particularly on monkeysphere-server + update-users -- is there a way to query the keyserver all in a + chunk? + +Create DSA authentication subkey for server during gen-key + +Fix behavior when add-identity-certifier fails to fetch a key from the + keyserver. + +Allow server administrators to add-identity-certifier from a key in + the filesystem (or on stdin, etc)