summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorIvan Alejandro <ivanalejandro0@yahoo.com.ar>2013-05-21 11:56:50 -0300
committerIvan Alejandro <ivanalejandro0@yahoo.com.ar>2013-05-22 09:36:14 -0300
commit0f77a09df54e38ef311c577297358a2563bfdd27 (patch)
tree7b2237935ba87918afa6668b00116b8446fde5cb
parent0d8eb72fbe11dd9e5d59451fa4d49697213629cf (diff)
Add command to run the client in hacking section
Also document the --danger flag for the client run
-rw-r--r--README.rst16
1 files changed, 15 insertions, 1 deletions
diff --git a/README.rst b/README.rst
index 887552b3..72448ca4 100644
--- a/README.rst
+++ b/README.rst
@@ -41,7 +41,11 @@ If you are testing a new provider and do not have a CA certificate chain tied to
$ leap-client --danger
-Beware this is only for testing, its usage is *highly* discouraged.
+But **DO NOT use it on a regular bases**.
+
+**WARNING**: If you use the --danger flag you may be victim to a MITM_ attack without noticing. Use at your own risk.
+
+.. _MITM: http://en.wikipedia.org/wiki/Man-in-the-middle_attack
Hacking
=======
@@ -69,6 +73,16 @@ And make your working tree available to your pythonpath::
(leap_client)$ python setup.py develop
+Run the client::
+
+ (leap_client)$ python src/leap/app.py -d
+
+
+If you are testing a new provider that doesn't have the proper certificates yet, you can use --danger flag, but **DO NOT use it on a regular bases**.
+
+**WARNING**: If you use the --danger flag you may be victim to a MITM_ attack without noticing. Use at your own risk.
+
+.. _MITM: http://en.wikipedia.org/wiki/Man-in-the-middle_attack
Testing
=======