X-Git-Url: https://codewiz.org/gitweb?a=blobdiff_plain;f=doc%2FTODO;h=b41d2be4b906d0116e8ab359b2a1fbf2e1ab4f55;hb=39ad3cccd2307fe3c43892376ab1a4e57b53b6d6;hp=c17ef617d77636211ca9b7f69d2ce7d50906629a;hpb=48cb8a96becb8cf089b78f594c6b5264f1878e99;p=monkeysphere.git diff --git a/doc/TODO b/doc/TODO index c17ef61..b41d2be 100644 --- a/doc/TODO +++ b/doc/TODO @@ -3,16 +3,24 @@ Next-Steps Monkeysphere Projects: Detail advantages of monkeysphere: detail the race conditions in ssh, and how the monkeysphere can help you reduce these threat vectors: - threat model reduction diagrams + threat model reduction diagrams. -Determine how openssh handles multiple processes writing to - known_hosts file (atomic appends?) +Handle unverified monkeysphere hosts in such a way that they're not + always removed from known_hosts file. Ask user to lsign the host + key? -Handle unknown hosts in such a way that they're not always removed - from known_hosts file. Ask user to lsign the host key? +Work out the details (and describe a full use case) for assigning a + REVOKER during monkeysphere-server gen_key -- how is this set? How + do we export it so it's available when a second-party revocation is + needed? -Handle multiple hostnames (multiple user IDs?) when generating host - keys with gen-key. +Ensure that authorized_user_ids are under as tight control as ssh + expects from authorized_keys: we don't want monkeysphere to be a + weak link in the filesystem. + +Consider the default permissions for + /var/lib/monkeysphere/authorized_keys/* (and indeed the whole + directory path leading up to that) Make sure alternate ports are handled for known_hosts. @@ -24,14 +32,16 @@ Provide a friendly interactive UI for marginal or failing client-side Make sure onak properly escapes user IDs with colons in them. -Build a decent, presentable web site for documentation, evangelism, - etc. Include a mention of how to report trouble or concerns. +Indicate on web site how to report trouble or concerns, and how to + join the project. + +Clean up the style for the web site (pages, icons, etc). Create ssh2openpgp or convert to full-fledged keytrans. Resolve the bugs listed in openpgp2ssh(1):BUGS. -Understand and document alternate trustdb models. +Document alternate trustdb models. Understand and document the output of gpg --check-trustdb: gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model @@ -61,21 +71,31 @@ File bug against ssh-keygen about how "-R" option removes comments File bug against ssh-keygen to see if we can get it to write to hash a known_hosts file to/from stdout/stdin. -Note all threat model reductions (with diagrams). +When using ssh-proxycommand, if only host keys found are expired or + revoked, then output loud warning with prompt, or fail hard. -Add environment variables sections to man pages. +File bug against seahorse about how, when creating new primary keys, + it presents option for "RSA (sign only)" but then creates an "esca" + key. -Environment variable scoping. +File bug against enigmail about lack of ability to create subkeys. -Move environment variable precedence before conf file. +Test and document what happens when any filesystem that the + monkeysphere-server relies on and modifies (/tmp, /etc, and /var?) + fills up. -Handle lockfiles when modifying known_hosts or authorized_keys. +Optimize keyserver access, particularly on monkeysphere-server + update-users -- is there a way to query the keyserver all in a + chunk? -When using ssh-proxycommand, if only host keys found are expired or - revoked, then output loud warning with prompt, or fail hard. +Create DSA authentication subkey for server during gen-key + +Fix behavior when add-identity-certifier fails to fetch a key from the + keyserver. -Update monkeysphere-ssh-proxycommand man page with new keyserver - checking policy info. +Allow server administrators to add-identity-certifier from a key in + the filesystem (or on stdin, etc) -Update monkeysphere-ssh-proxycommand man page with info about - no-connect option. +Think about packaging monkeysphere for other (non-apt-based) operating + systems. RPM-based linux systems, FreeBSD ports, and Mac OS X seem + like the most likely candidates.