@@ -469,6 +469,20 @@ following options:
469469* ` restauthkey ` -- the passphrase needed to decrypt the SQLite3 database
470470
471471
472+ If you are enabling the sending of Integrity Check PDUs to any of the
473+ law enforcement agencies that will be managed by this provisioner, you
474+ will need to supply a TLS private key for signing some of the hash digests
475+ included in those PDUs. To do this, you will need to provide the following
476+ option:
477+
478+ * ` integrity-signing-private-key ` -- the path to the file containing the
479+ private key that is to be used to
480+ sign integrity checks.
481+
482+ See https://github.com/OpenLI-NZ/openli/wiki/Integrity-Checks for more
483+ information on how to create a key and enable Integrity Checks for a
484+ particular agency.
485+
472486### Intercept Configuration Syntax
473487Intercept configuration, i.e. current intercepts, recipient agencies and
474488special servers, is stored in a separate YAML file. Ideally, a user would
@@ -507,6 +521,68 @@ key-value elements:
507521 connection. Defaults to 30. If set to zero, the mediator
508522 will not require a response to keep alives to maintain the
509523 handover connections.
524+ * ` connectretrywait ` -- the amount of time (in seconds) to wait between attempts
525+ to connect to an agency handover. Defaults to 10
526+ seconds.
527+ * ` resendwindow ` -- the amount of buffered data to retransmit when a handover
528+ reconnects after a disconnection event (in KBs). Defaults
529+ to zero (i.e. don't retransmit anything that was sent
530+ prior to the disconnection).
531+ * ` timestampformat ` -- the timestamp field to include in the ETSI PS Header
532+ when encoding records to send to this agency. Allowed
533+ options are "microseconds" to use the
534+ "MicroSecondTimeStamp" field, and "generalized" to use
535+ the "GeneralizedTime" field. The default is
536+ "microseconds".
537+ * ` payloadencryption ` -- Specifies if the CC and IRI contents sent to this
538+ agency should be encrypted and, if so, which
539+ encryption method to use. If set to "none", no
540+ encryption is performed.
541+ The only encryption method supported right now is
542+ "aes-192-cbc".
543+ The default setting is "none".
544+ * ` encryptionkey ` -- The encryption key to use when encrypting CC and
545+ IRI contents. This option is mandatory if
546+ ` payloadencryption ` is NOT set to "none". The
547+ ideal key length is 24 characters. Shorter keys
548+ will be padded with null bytes, longer keys will be
549+ truncated to 24 characters.
550+ * ` integrity ` -- a YAML mapping object that defines whether integrity check
551+ messages should be sent to this agency, and how these messages
552+ should be generated.
553+
554+ If Integrity Check records are required, the configuration parameters for
555+ these records can be set by specifying fields inside the ` integrity ` object
556+ mentioned above. Note that the agency will most likely tell you what values
557+ it wants configured for these options, so do not worry too much about having
558+ to decide what to choose for each option.
559+
560+ The available fields are:
561+ * ` enabled ` -- if true, integrity check records will be sent to this agency.
562+ Defaults to false (i.e. no integrity checks).
563+ * ` hashmethod ` -- the algorithm to use when generating message digests from
564+ the intercepted data PDUs. Defaults to ` sha-256 ` , but
565+ ` sha-1 ` , ` sha-384 ` and ` sha-512 ` are also supported.
566+ * ` signedhashmethod ` -- the algorithm to use when generated a digest from
567+ previous message digests that is going to be signed
568+ using a private key. Defaults to ` sha-256 ` but
569+ ` sha-1 ` , ` sha-384 ` and ` sha-512 ` are also supported.
570+ * ` hashtimeout ` -- produce an integrity check containing a message digest hash
571+ within this number of seconds after seeing the oldest
572+ unhashed data PDU. Defaults to 1 second.
573+ * ` datapducount ` -- produce an integrity check containing a message digest hash
574+ as soon as this number of unhashed data PDUs have been seen.
575+ Defaults to 1000 PDUs.
576+ * ` signtimeout ` -- produce an integrity check containing a signed digest hash
577+ of the preceding message digests within this number of
578+ seconds after sending the oldest unsigned digest hash.
579+ Defaults to 30 seconds.
580+ * ` hashpducount ` -- produce an integrity check containing a signed digest hash
581+ of the preceding message digests as soon as the number of
582+ unsigned digest hashes exceeds this value. Defaults to 15
583+ digest hashes.
584+
585+ ---
510586
511587VOIP, Email and IPintercepts are also expressed as a YAML sequence, with a key
512588of ` voipintercepts: ` , ` emailintercepts: ` , and ` ipintercepts: ` respectively.
@@ -670,6 +746,11 @@ All intercept types also support the following optional key-value elements:
670746 ideal key length is 24 characters. Shorter keys
671747 will be padded with null bytes, longer keys will be
672748 truncated to 24 characters.
749+
750+ Note that encryption configuration provided at the intercept level will
751+ override any encryption configuration that has been set at the agency level
752+ for the agency that the intercept is destined for.
753+
673754---
674755
675756The default approach for delivering compressed email content to the agencies
0 commit comments