ソースを参照

Update documentation for the new user menu

Bob Mottram 9 年 前
コミット
3e75f58d70
共有13 個のファイルを変更した124 個の追加173 個の削除を含む
  1. 3
    6
      README.md
  2. 6
    12
      doc/EN/backups.org
  3. 3
    2
      doc/EN/controlpanel.org
  4. 9
    18
      doc/EN/faq.org
  5. 3
    6
      doc/EN/installation.org
  6. 4
    8
      doc/EN/usage.org
  7. 3
    6
      doc/EN/usage_email.org
  8. 7
    13
      website/EN/backups.html
  9. 6
    3
      website/EN/controlpanel.html
  10. 10
    19
      website/EN/faq.html
  11. 61
    64
      website/EN/installation.html
  12. 5
    9
      website/EN/usage.html
  13. 4
    7
      website/EN/usage_email.html

+ 3
- 6
README.md ファイルの表示

@@ -182,18 +182,16 @@ After installing for the first time it's a good idea to create some keydrives. T
182 182
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the *Disk Utility* application. Then plug it into the Freedombone system, then from your local machine run:
183 183
 
184 184
     ssh myusername@mydomainname -p 2222
185
-    sudo control
186 185
 
187
-Select *Backup and Restore* then *Backup GPG key to USB (master keydrive)*.
186
+Select *Administrator controls* then *Backup and Restore* then *Backup GPG key to USB (master keydrive)*.
188 187
 
189 188
 **Fragment keydrives**
190 189
 
191 190
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the *Disk Utility* application. Plug it into the Freedombone system then from your local machine run the following commands:
192 191
 
193 192
     ssh myusername@mydomainname -p 2222
194
-    sudo control
195 193
 
196
-Select *Backup and Restore* then *Backup GPG key to USB (fragment keydrive)*.
194
+Select *Administrator controls* then *Backup and Restore* then *Backup GPG key to USB (fragment keydrive)*.
197 195
 
198 196
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called *"the web of backups"* or *"the web of encryption"*. Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
199 197
 
@@ -206,6 +204,5 @@ Administering the system
206 204
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
207 205
 
208 206
     ssh fbone@freedombone.local -p 2222
209
-    sudo control
210 207
 
211
-From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
208
+Select *Administrator controls* and from there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.

+ 6
- 12
doc/EN/backups.org ファイルの表示

@@ -30,10 +30,9 @@ As part of the Freedombone installation the GPG key used to encrypt backups will
30 30
 
31 31
 #+BEGIN_SRC bash
32 32
 ssh username@domainname -p 2222
33
-sudo control
34 33
 #+END_SRC
35 34
 
36
-Select /Backup and Restore/ then /Backup GPG key to USB drive (master keydrive)/.
35
+Select /Administrator controls/ then /Backup and Restore/ then /Backup GPG key to USB drive (master keydrive)/.
37 36
 
38 37
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
39 38
 
@@ -47,10 +46,9 @@ Log into the system and become the root user, then run the /backup/ command.
47 46
 
48 47
 #+BEGIN_SRC bash
49 48
 ssh username@domainname -p 2222
50
-sudo control
51 49
 #+END_SRC
52 50
 
53
-Select /Backup and Restore/ and then /Backup data to USB drive/.
51
+Select /Administrator controls/ then /Backup and Restore/ and then /Backup data to USB drive/.
54 52
 
55 53
 Type in the LUKS password for the USB drive, then the backup will begin.
56 54
 
@@ -60,10 +58,9 @@ Log into the system and become the root user:
60 58
 
61 59
 #+BEGIN_SRC bash
62 60
 ssh username@domainname -p 2222
63
-sudo control
64 61
 #+END_SRC
65 62
 
66
-If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting /Backup and Restore/ then /Restore GPG key from USB keydrive/. When that's done remove the keydrive and plug in the backup drive.
63
+Select /Administrator controls/ then if this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting /Backup and Restore/ then /Restore GPG key from USB keydrive/. When that's done remove the keydrive and plug in the backup drive.
67 64
 
68 65
 Select /Backup and Restore/ then /Restore data from USB drive/.
69 66
 
@@ -75,10 +72,9 @@ Firstly you will need to have a user account on one or more of your friends serv
75 72
 
76 73
 #+BEGIN_SRC bash
77 74
 ssh username@domainname -p 2222
78
-sudo control
79 75
 #+END_SRC
80 76
 
81
-Select /Backup and Restore/ then /Configure remote backups/.
77
+Select /Administrator controls/ then /Backup and Restore/ then /Configure remote backups/.
82 78
 
83 79
 You can then enter the usernames, domains and ssh logins for one or more remote servers. The system will try to backup to these remote locations once per day.
84 80
 * Restore from a friend
@@ -89,10 +85,9 @@ First log in and if you don't already have one then create a new friends list:
89 85
 
90 86
 #+BEGIN_SRC bash
91 87
 ssh username@domainname -p 2222
92
-sudo control
93 88
 #+END_SRC
94 89
 
95
-Select /Backup and Restore/ then /Restore GPG key from USB (master keydrive)/. Select the username then plug in your keydrive and restore the key.
90
+Select /Administrator controls/ then /Backup and Restore/ then /Restore GPG key from USB (master keydrive)/. Select the username then plug in your keydrive and restore the key.
96 91
 
97 92
 Now select /Configure remote backups/ and configure the locations and logins for the remote server.
98 93
 
@@ -104,10 +99,9 @@ Log in as root:
104 99
 
105 100
 #+BEGIN_SRC bash
106 101
 ssh username@domainname -p 2222
107
-sudo control
108 102
 #+END_SRC
109 103
 
110
-Select /Backup and Restore/ then /Restore from remote backup/ and enter the domain name of the remote server that you wish to restore from.
104
+Select /Administrator controls/ then /Backup and Restore/ then /Restore from remote backup/ and enter the domain name of the remote server that you wish to restore from.
111 105
 
112 106
 #+BEGIN_EXPORT html
113 107
 <center>

+ 3
- 2
doc/EN/controlpanel.org ファイルの表示

@@ -29,13 +29,14 @@
29 29
 | [[User management menu]]    |
30 30
 
31 31
 * Main menu
32
-You can access the main menu by logging into the system, then running the *control* command with root privileges.
32
+You can access the main menu by logging into the system.
33 33
 
34 34
 #+BEGIN_SRC bash
35 35
 ssh myusername@mydomain -p 2222
36
-sudo control
37 36
 #+END_SRC
38 37
 
38
+Then selecting /Administrator controls/.
39
+
39 40
 It should look like this:
40 41
 
41 42
 #+BEGIN_CENTER

+ 9
- 18
doc/EN/faq.org ファイルの表示

@@ -67,10 +67,9 @@ Yes. Freedombone can support a small number of users, for a "/friends and family
67 67
 
68 68
 #+BEGIN_SRC bash
69 69
 ssh username@mydomainname -p 2222
70
-sudo control
71 70
 #+END_SRC
72 71
 
73
-Select /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
72
+Select /Administrator controls/ then /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
74 73
 
75 74
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have *complete trust* in the administrator.
76 75
 
@@ -80,19 +79,17 @@ To remove a user:
80 79
 
81 80
 #+BEGIN_SRC bash
82 81
 ssh username@mydomainname -p 2222
83
-sudo control
84 82
 #+END_SRC
85 83
 
86
-Select /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
84
+Select /Administrator controls/ then /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
87 85
 * How do I reset the tripwire?
88 86
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
89 87
 
90 88
 #+BEGIN_SRC bash
91 89
 ssh username@mydomain -p 2222
92
-sudo control
93 90
 #+END_SRC
94 91
 
95
-Select "reset tripwire" using cursors and space bar then enter.
92
+Select /Administrator controls/ then "reset tripwire" using cursors and space bar then enter.
96 93
 * Is metadata protected?
97 94
 #+BEGIN_QUOTE
98 95
 "/We kill people based on metadata/"
@@ -104,10 +101,9 @@ Even when using Freedombone metadata analysis by third parties is still possible
104 101
 * How do I create email processing rules?
105 102
 #+BEGIN_SRC bash
106 103
 ssh username@domainname -p 2222
107
-sudo control
108 104
 #+END_SRC
109 105
 
110
-Select /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
106
+Select /Administrator controls/ then /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
111 107
 
112 108
 | freedombone-addlist  | Adds a mailing list                                                  |
113 109
 | freedombone-rmlist   | Removes a mailing list                                               |
@@ -180,10 +176,9 @@ Suppose that some new encryption vulnerability has been announced and that you n
180 176
 
181 177
 #+BEGIN_SRC bash
182 178
 ssh myusername@mydomain -p 2222
183
-sudo control
184 179
 #+END_SRC
185 180
 
186
-Then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
181
+Select /Administrator controls/ then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
187 182
 * How do I get a domain name?
188 183
 Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
189 184
 
@@ -229,10 +224,9 @@ If you did the full install or selected the social variant then the system will
229 224
 
230 225
 #+BEGIN_SRC bash
231 226
 ssh username@mydomainname -p 2222
232
-sudo control
233 227
 #+END_SRC
234 228
 
235
-Select *Security settings* then *Create a new Let's Encrypt certificate*.
229
+Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
236 230
 
237 231
 One thing to be aware of is that Let's Encrypt doesn't support many dynamic DNS subdomains, such as those from freeDNS, so to run Hubzilla and GNU Social you will need to have your own official domains for those. There are many sites from which you can buy cheap domain names, and while this isn't ideal in terms of making you dependent upon another company it's the only option currently.
238 232
 * How do I renew a Let's Encrypt certificate?
@@ -242,19 +236,17 @@ If you need to manually renew a certificate:
242 236
 
243 237
 #+BEGIN_SRC bash
244 238
 ssh username@mydomainname -p 2222
245
-sudo control
246 239
 #+END_SRC
247 240
 
248
-Select *Security settings* then *Renew Let's Encrypt certificate*.
241
+Select /Administrator controls/ then *Security settings* then *Renew Let's Encrypt certificate*.
249 242
 * I tried to renew a Let's Encrypt certificate and it failed. What should I do?
250 243
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
251 244
 
252 245
 #+BEGIN_SRC bash
253 246
 ssh username@mydomainname -p 2222
254
-sudo control
255 247
 #+END_SRC
256 248
 
257
-Select *Security settings* then *Create a new Let's Encrypt certificate*.
249
+Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
258 250
 * Why use self-signed certificates?
259 251
 Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up /scary-scary looking/ browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is /no certainty about who that connection is with/.
260 252
 
@@ -274,10 +266,9 @@ Often ISPs will run their own SMTP mail server which you can use for proxying, t
274 266
 
275 267
 #+BEGIN_SRC bash
276 268
 ssh username@mydomainname -p 2222
277
-sudo control
278 269
 #+END_SRC
279 270
 
280
-Select *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
271
+Select /Administrator controls/ then *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
281 272
 
282 273
 This may work, at least when using Mutt, and admittedly if it does then it's a compromise in which you are using some infrastructure which is not controlled by the community - with all of the usual hazards which go along with that.
283 274
 

+ 3
- 6
doc/EN/installation.org ファイルの表示

@@ -205,19 +205,17 @@ This is the traditional security model in which you carry your full keyring on a
205 205
 
206 206
 #+BEGIN_SRC bash
207 207
 ssh myusername@mydomainname -p 2222
208
-sudo control
209 208
 #+END_SRC
210 209
 
211
-Select /Backup and Restore/ then /Backup GPG key to USB (master keydrive)/.
210
+Select /Administrator controls/ then /Backup and Restore/ then /Backup GPG key to USB (master keydrive)/.
212 211
 ** Fragment keydrives
213 212
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be done from the /Disk Utility/ application]]. Plug it into the Freedombone system then from your local machine run the following commands:
214 213
 
215 214
 #+BEGIN_SRC bash
216 215
 ssh myusername@mydomainname -p 2222
217
-sudo control
218 216
 #+END_SRC
219 217
 
220
-Select /Backup and Restore/ then /Backup GPG key to USB (fragment keydrive)/.
218
+Select /Administrator controls/ then /Backup and Restore/ then /Backup GPG key to USB (fragment keydrive)/.
221 219
 
222 220
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
223 221
 * On Client Machines
@@ -237,10 +235,9 @@ To administer the system after installation log in via ssh, become the root user
237 235
 
238 236
 #+BEGIN_SRC bash
239 237
 ssh myusername@freedombone.local -p 2222
240
-sudo control
241 238
 #+END_SRC
242 239
 
243
-From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
240
+Select /Administrator controls/ then from there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
244 241
 
245 242
 #+BEGIN_EXPORT html
246 243
 <center>

+ 4
- 8
doc/EN/usage.org ファイルの表示

@@ -59,10 +59,9 @@ Log into your system and open the control panel.
59 59
 
60 60
 #+BEGIN_SRC bash
61 61
 ssh username@domain -p 2222
62
-sudo control
63 62
 #+END_SRC
64 63
 
65
-Select /Manage Users/ then /Change user ssh public key/. Copy and paste the public key here, then exit.
64
+Select /Administrator controls/ then /Manage Users/ then /Change user ssh public key/. Copy and paste the public key here, then exit.
66 65
 
67 66
 It's a good idea to also copy the contents of *~/.ssh/id_rsa* and *~/.ssh/id_rsa.pub* to you password manager, together with the private key password if you created one.
68 67
 
@@ -75,10 +74,9 @@ You can also access your system via the Tor system using an onion address. To fi
75 74
 
76 75
 #+BEGIN_SRC bash
77 76
 ssh username@freedombone.local -p 2222
78
-sudo control
79 77
 #+END_SRC
80 78
 
81
-Then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
79
+Select /Administrator controls/ then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
82 80
 
83 81
 #+BEGIN_SRC bash
84 82
 sudo apt-get install tor connect-proxy
@@ -197,10 +195,9 @@ By default the IRC server is set up to require a password for users to log in. T
197 195
 
198 196
 #+BEGIN_SRC bash
199 197
 ssh myusername@mydomain -p 2222
200
-sudo control
201 198
 #+END_SRC
202 199
 
203
-Select the *IRC Menu* and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
200
+Select /Administrator controls/ then *IRC Menu* and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
204 201
 
205 202
 ** XMPP/Jabber
206 203
 *** Using with Profanity
@@ -368,10 +365,9 @@ See the control panel for the RSS reader onion address.
368 365
 
369 366
 #+BEGIN_SRC bash
370 367
 ssh username@domainname -p 2222
371
-sudo control
372 368
 #+END_SRC
373 369
 
374
-Then select the *About* screen.
370
+Select /Administrator controls/ then select the *About* screen.
375 371
 
376 372
 The RSS reader is accessible only via an onion address. This provides a reasonable degree of reading privacy, making it difficult for passive adversaries such as governments, corporations or criminals to create lists of sites which you are subscribed to.
377 373
 

+ 3
- 6
doc/EN/usage_email.org ファイルの表示

@@ -430,28 +430,25 @@ To subscribe to a mailing list log in as your user (i.e. not the root user).
430 430
 
431 431
 #+BEGIN_SRC bash
432 432
 ssh username@domainname -p 2222
433
-sudo control
434 433
 #+END_SRC
435 434
 
436
-Select *Email filtering rules* then *Add a user to a mailing list*. If you want to do it purely from the commandline then see the manpage for *freedombone-addlist*.
435
+Select /Administrator controls/ then *Email filtering rules* then *Add a user to a mailing list*. If you want to do it purely from the commandline then see the manpage for *freedombone-addlist*.
437 436
 * Adding email addresses to a group/folder
438 437
 Similar to adding mailing list folders you can also add specified email addresses into a group/folder.
439 438
 
440 439
 #+BEGIN_SRC bash
441 440
 ssh username@domainname -p 2222
442
-sudo control
443 441
 #+END_SRC
444 442
 
445
-Select *Email filtering rules* then *Add email rule*. To do the same from the commandline see the manpage for *freedombone-addemail*.
443
+Select /Administrator controls/ then *Email filtering rules* then *Add email rule*. To do the same from the commandline see the manpage for *freedombone-addemail*.
446 444
 * Ignoring incoming emails
447 445
 It is possible to ignore incoming emails if they are from a particular email address or if the subject line contains particular text.
448 446
 
449 447
 #+BEGIN_SRC bash
450 448
 ssh username@domainname -p 2222
451
-sudo control
452 449
 #+END_SRC
453 450
 
454
-Select *Email filtering rules* then *Block/Unblock and email address* or *Block/Unblock email with subject line*. Also see the manpage for *freedombone-ignore*.
451
+Select /Administrator controls/ then *Email filtering rules* then *Block/Unblock and email address* or *Block/Unblock email with subject line*. Also see the manpage for *freedombone-ignore*.
455 452
 * Your own mailing list
456 453
 If you want to set up a public mailing list then when installing the system remember to set the *PUBLIC_MAILING_LIST* variable within *freedombone.cfg* to the name of your list. The name should have no spaces in it. Public mailing lists are unencrypted so anyone will be able to read the contents, including non subscribers.
457 454
 

+ 7
- 13
website/EN/backups.html ファイルの表示

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-02-27 Sat 22:05 -->
6
+<!-- 2016-04-06 Wed 18:52 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -203,12 +203,11 @@ As part of the Freedombone installation the GPG key used to encrypt backups will
203 203
 <div class="org-src-container">
204 204
 
205 205
 <pre class="src src-bash">ssh username@domainname -p 2222
206
-sudo control
207 206
 </pre>
208 207
 </div>
209 208
 
210 209
 <p>
211
-Select <i>Backup and Restore</i> then <i>Backup GPG key to USB drive (master keydrive)</i>.
210
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Backup GPG key to USB drive (master keydrive)</i>.
212 211
 </p>
213 212
 
214 213
 <p>
@@ -238,12 +237,11 @@ Log into the system and become the root user, then run the <i>backup</i> command
238 237
 <div class="org-src-container">
239 238
 
240 239
 <pre class="src src-bash">ssh username@domainname -p 2222
241
-sudo control
242 240
 </pre>
243 241
 </div>
244 242
 
245 243
 <p>
246
-Select <i>Backup and Restore</i> and then <i>Backup data to USB drive</i>.
244
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> and then <i>Backup data to USB drive</i>.
247 245
 </p>
248 246
 
249 247
 <p>
@@ -265,12 +263,11 @@ Log into the system and become the root user:
265 263
 <div class="org-src-container">
266 264
 
267 265
 <pre class="src src-bash">ssh username@domainname -p 2222
268
-sudo control
269 266
 </pre>
270 267
 </div>
271 268
 
272 269
 <p>
273
-If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting <i>Backup and Restore</i> then <i>Restore GPG key from USB keydrive</i>. When that's done remove the keydrive and plug in the backup drive.
270
+Select <i>Administrator controls</i> then if this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting <i>Backup and Restore</i> then <i>Restore GPG key from USB keydrive</i>. When that's done remove the keydrive and plug in the backup drive.
274 271
 </p>
275 272
 
276 273
 <p>
@@ -296,12 +293,11 @@ Firstly you will need to have a user account on one or more of your friends serv
296 293
 <div class="org-src-container">
297 294
 
298 295
 <pre class="src src-bash">ssh username@domainname -p 2222
299
-sudo control
300 296
 </pre>
301 297
 </div>
302 298
 
303 299
 <p>
304
-Select <i>Backup and Restore</i> then <i>Configure remote backups</i>.
300
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Configure remote backups</i>.
305 301
 </p>
306 302
 
307 303
 <p>
@@ -326,12 +322,11 @@ First log in and if you don't already have one then create a new friends list:
326 322
 <div class="org-src-container">
327 323
 
328 324
 <pre class="src src-bash">ssh username@domainname -p 2222
329
-sudo control
330 325
 </pre>
331 326
 </div>
332 327
 
333 328
 <p>
334
-Select <i>Backup and Restore</i> then <i>Restore GPG key from USB (master keydrive)</i>. Select the username then plug in your keydrive and restore the key.
329
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Restore GPG key from USB (master keydrive)</i>. Select the username then plug in your keydrive and restore the key.
335 330
 </p>
336 331
 
337 332
 <p>
@@ -357,12 +352,11 @@ Log in as root:
357 352
 <div class="org-src-container">
358 353
 
359 354
 <pre class="src src-bash">ssh username@domainname -p 2222
360
-sudo control
361 355
 </pre>
362 356
 </div>
363 357
 
364 358
 <p>
365
-Select <i>Backup and Restore</i> then <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
359
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
366 360
 </p>
367 361
 
368 362
 <center>

+ 6
- 3
website/EN/controlpanel.html ファイルの表示

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-02-27 Sat 23:18 -->
6
+<!-- 2016-04-06 Wed 18:54 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -219,17 +219,20 @@ for the JavaScript code in this tag.
219 219
 <h2 id="orgheadline1">Main menu</h2>
220 220
 <div class="outline-text-2" id="text-orgheadline1">
221 221
 <p>
222
-You can access the main menu by logging into the system, then running the <b>control</b> command with root privileges.
222
+You can access the main menu by logging into the system.
223 223
 </p>
224 224
 
225 225
 <div class="org-src-container">
226 226
 
227 227
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
228
-sudo control
229 228
 </pre>
230 229
 </div>
231 230
 
232 231
 <p>
232
+Then selecting <i>Administrator controls</i>.
233
+</p>
234
+
235
+<p>
233 236
 It should look like this:
234 237
 </p>
235 238
 

+ 10
- 19
website/EN/faq.html ファイルの表示

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-03-23 Wed 21:10 -->
6
+<!-- 2016-04-06 Wed 18:58 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -327,12 +327,11 @@ Yes. Freedombone can support a small number of users, for a "<i>friends and fami
327 327
 <div class="org-src-container">
328 328
 
329 329
 <pre class="src src-bash">ssh username@mydomainname -p 2222
330
-sudo control
331 330
 </pre>
332 331
 </div>
333 332
 
334 333
 <p>
335
-Select <i>Manage Users</i> and then <i>Add a user</i>. You will be prompted for a username and you can also optionally provide their ssh public key.
334
+Select <i>Administrator controls</i> then <i>Manage Users</i> and then <i>Add a user</i>. You will be prompted for a username and you can also optionally provide their ssh public key.
336 335
 </p>
337 336
 
338 337
 <p>
@@ -354,12 +353,11 @@ To remove a user:
354 353
 <div class="org-src-container">
355 354
 
356 355
 <pre class="src src-bash">ssh username@mydomainname -p 2222
357
-sudo control
358 356
 </pre>
359 357
 </div>
360 358
 
361 359
 <p>
362
-Select <i>Manage Users</i> and then <i>Delete a user</i>. Note that this will delete all of that user's files and email.
360
+Select <i>Administrator controls</i> then <i>Manage Users</i> and then <i>Delete a user</i>. Note that this will delete all of that user's files and email.
363 361
 </p>
364 362
 </div>
365 363
 </div>
@@ -373,12 +371,11 @@ The tripwire will be automatically reset once per week. If you want to reset it
373 371
 <div class="org-src-container">
374 372
 
375 373
 <pre class="src src-bash">ssh username@mydomain -p 2222
376
-sudo control
377 374
 </pre>
378 375
 </div>
379 376
 
380 377
 <p>
381
-Select "reset tripwire" using cursors and space bar then enter.
378
+Select <i>Administrator controls</i> then "reset tripwire" using cursors and space bar then enter.
382 379
 </p>
383 380
 </div>
384 381
 </div>
@@ -406,12 +403,11 @@ Even when using Freedombone metadata analysis by third parties is still possible
406 403
 <div class="org-src-container">
407 404
 
408 405
 <pre class="src src-bash">ssh username@domainname -p 2222
409
-sudo control
410 406
 </pre>
411 407
 </div>
412 408
 
413 409
 <p>
414
-Select <i>Email Filtering Rules</i> then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
410
+Select <i>Administrator controls</i> then <i>Email Filtering Rules</i> then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
415 411
 </p>
416 412
 
417 413
 <table border="2" cellspacing="0" cellpadding="6" rules="groups" frame="hsides">
@@ -540,12 +536,11 @@ Suppose that some new encryption vulnerability has been announced and that you n
540 536
 <div class="org-src-container">
541 537
 
542 538
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
543
-sudo control
544 539
 </pre>
545 540
 </div>
546 541
 
547 542
 <p>
548
-Then select <i>Security Settings</i>. You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
543
+Select <i>Administrator controls</i> then select <i>Security Settings</i>. You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
549 544
 </p>
550 545
 </div>
551 546
 </div>
@@ -629,12 +624,11 @@ If you did the full install or selected the social variant then the system will
629 624
 <div class="org-src-container">
630 625
 
631 626
 <pre class="src src-bash">ssh username@mydomainname -p 2222
632
-sudo control
633 627
 </pre>
634 628
 </div>
635 629
 
636 630
 <p>
637
-Select <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
631
+Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
638 632
 </p>
639 633
 
640 634
 <p>
@@ -656,12 +650,11 @@ If you need to manually renew a certificate:
656 650
 <div class="org-src-container">
657 651
 
658 652
 <pre class="src src-bash">ssh username@mydomainname -p 2222
659
-sudo control
660 653
 </pre>
661 654
 </div>
662 655
 
663 656
 <p>
664
-Select <b>Security settings</b> then <b>Renew Let's Encrypt certificate</b>.
657
+Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Renew Let's Encrypt certificate</b>.
665 658
 </p>
666 659
 </div>
667 660
 </div>
@@ -675,12 +668,11 @@ Most likely it's because Let's Encrypt doesn't support your particular domain or
675 668
 <div class="org-src-container">
676 669
 
677 670
 <pre class="src src-bash">ssh username@mydomainname -p 2222
678
-sudo control
679 671
 </pre>
680 672
 </div>
681 673
 
682 674
 <p>
683
-Select <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
675
+Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
684 676
 </p>
685 677
 </div>
686 678
 </div>
@@ -730,12 +722,11 @@ Often ISPs will run their own SMTP mail server which you can use for proxying, t
730 722
 <div class="org-src-container">
731 723
 
732 724
 <pre class="src src-bash">ssh username@mydomainname -p 2222
733
-sudo control
734 725
 </pre>
735 726
 </div>
736 727
 
737 728
 <p>
738
-Select <b>Outgoing Email Proxy</b> and enter the details for your ISP SMTP server.
729
+Select <i>Administrator controls</i> then <b>Outgoing Email Proxy</b> and enter the details for your ISP SMTP server.
739 730
 </p>
740 731
 
741 732
 <p>

+ 61
- 64
website/EN/installation.html ファイルの表示

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-04-06 Wed 14:35 -->
6
+<!-- 2016-04-06 Wed 18:50 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -170,11 +170,11 @@ for the JavaScript code in this tag.
170 170
 </colgroup>
171 171
 <tbody>
172 172
 <tr>
173
-<td class="org-left"><a href="#orgcbeb5c6">Building an image for a Single Board Computer or Virtual Machine</a></td>
173
+<td class="org-left"><a href="#orgheadline1">Building an image for a Single Board Computer or Virtual Machine</a></td>
174 174
 </tr>
175 175
 
176 176
 <tr>
177
-<td class="org-left"><a href="#org561a41c">Checklist</a></td>
177
+<td class="org-left"><a href="#orgheadline2">Checklist</a></td>
178 178
 </tr>
179 179
 
180 180
 <tr>
@@ -182,34 +182,34 @@ for the JavaScript code in this tag.
182 182
 </tr>
183 183
 
184 184
 <tr>
185
-<td class="org-left"><a href="#org84e979f">Installation</a></td>
185
+<td class="org-left"><a href="#orgheadline3">Installation</a></td>
186 186
 </tr>
187 187
 
188 188
 <tr>
189
-<td class="org-left"><a href="#org2acc932">Social Key Management - the 'Unforgettable Key'</a></td>
189
+<td class="org-left"><a href="#orgheadline4">Social Key Management - the 'Unforgettable Key'</a></td>
190 190
 </tr>
191 191
 
192 192
 <tr>
193
-<td class="org-left"><a href="#org7ba815b">Final Setup</a></td>
193
+<td class="org-left"><a href="#orgheadline5">Final Setup</a></td>
194 194
 </tr>
195 195
 
196 196
 <tr>
197
-<td class="org-left"><a href="#orgca4804f">Keydrives</a></td>
197
+<td class="org-left"><a href="#orgheadline6">Keydrives</a></td>
198 198
 </tr>
199 199
 
200 200
 <tr>
201
-<td class="org-left"><a href="#orgb1a9030">On Client Machines</a></td>
201
+<td class="org-left"><a href="#orgheadline7">On Client Machines</a></td>
202 202
 </tr>
203 203
 
204 204
 <tr>
205
-<td class="org-left"><a href="#org6fc0eae">Administering the system</a></td>
205
+<td class="org-left"><a href="#orgheadline8">Administering the system</a></td>
206 206
 </tr>
207 207
 </tbody>
208 208
 </table>
209 209
 
210
-<div id="outline-container-orgcbeb5c6" class="outline-2">
211
-<h2 id="orgcbeb5c6">Building an image for a Single Board Computer or Virtual Machine</h2>
212
-<div class="outline-text-2" id="text-orgcbeb5c6">
210
+<div id="outline-container-orgheadline1" class="outline-2">
211
+<h2 id="orgheadline1">Building an image for a Single Board Computer or Virtual Machine</h2>
212
+<div class="outline-text-2" id="text-orgheadline1">
213 213
 <p>
214 214
 You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
215 215
 </p>
@@ -295,9 +295,9 @@ If the image build fails with an error such as "<i>Error reading from server. Re
295 295
 </div>
296 296
 </div>
297 297
 
298
-<div id="outline-container-org561a41c" class="outline-2">
299
-<h2 id="org561a41c">Checklist</h2>
300
-<div class="outline-text-2" id="text-org561a41c">
298
+<div id="outline-container-orgheadline2" class="outline-2">
299
+<h2 id="orgheadline2">Checklist</h2>
300
+<div class="outline-text-2" id="text-orgheadline2">
301 301
 <p>
302 302
 Before installing Freedombone you will need a few things.
303 303
 </p>
@@ -311,17 +311,17 @@ Before installing Freedombone you will need a few things.
311 311
 </ul>
312 312
 </div>
313 313
 </div>
314
-<div id="outline-container-org84e979f" class="outline-2">
315
-<h2 id="org84e979f">Installation</h2>
316
-<div class="outline-text-2" id="text-org84e979f">
314
+<div id="outline-container-orgheadline3" class="outline-2">
315
+<h2 id="orgheadline3">Installation</h2>
316
+<div class="outline-text-2" id="text-orgheadline3">
317 317
 <p>
318 318
 There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
319 319
 </p>
320 320
 </div>
321 321
 
322
-<div id="outline-container-org7ed0a15" class="outline-3">
323
-<h3 id="org7ed0a15">On a Laptop, Netbook or Desktop machine</h3>
324
-<div class="outline-text-3" id="text-org7ed0a15">
322
+<div id="outline-container-orgheadline9" class="outline-3">
323
+<h3 id="orgheadline9">On a Laptop, Netbook or Desktop machine</h3>
324
+<div class="outline-text-3" id="text-orgheadline9">
325 325
 <p>
326 326
 If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
327 327
 </p>
@@ -340,9 +340,9 @@ freedombone menuconfig
340 340
 </div>
341 341
 </div>
342 342
 
343
-<div id="outline-container-orge190975" class="outline-3">
344
-<h3 id="orge190975">On a single board computer (SBC)</h3>
345
-<div class="outline-text-3" id="text-orge190975">
343
+<div id="outline-container-orgheadline10" class="outline-3">
344
+<h3 id="orgheadline10">On a single board computer (SBC)</h3>
345
+<div class="outline-text-3" id="text-orgheadline10">
346 346
 <p>
347 347
 Currently the following boards are supported:
348 348
 </p>
@@ -426,9 +426,9 @@ Using the password 'freedombone'. Take a note of the new login password and then
426 426
 </div>
427 427
 </div>
428 428
 
429
-<div id="outline-container-org8cf8e11" class="outline-3">
430
-<h3 id="org8cf8e11">As a Virtual Machine</h3>
431
-<div class="outline-text-3" id="text-org8cf8e11">
429
+<div id="outline-container-orgheadline11" class="outline-3">
430
+<h3 id="orgheadline11">As a Virtual Machine</h3>
431
+<div class="outline-text-3" id="text-orgheadline11">
432 432
 <p>
433 433
 Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
434 434
 </p>
@@ -450,42 +450,42 @@ The default login will be username 'fbone' and password 'freedombone'. Take a no
450 450
 </div>
451 451
 </div>
452 452
 
453
-<div id="outline-container-org2acc932" class="outline-2">
454
-<h2 id="org2acc932">Social Key Management - the 'Unforgettable Key'</h2>
455
-<div class="outline-text-2" id="text-org2acc932">
453
+<div id="outline-container-orgheadline4" class="outline-2">
454
+<h2 id="orgheadline4">Social Key Management - the 'Unforgettable Key'</h2>
455
+<div class="outline-text-2" id="text-orgheadline4">
456 456
 <p>
457 457
 During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
458 458
 </p>
459 459
 </div>
460 460
 
461
-<div id="outline-container-org67b9067" class="outline-3">
462
-<h3 id="org67b9067">You have the gnupg keyring on an encrypted USB drive</h3>
463
-<div class="outline-text-3" id="text-org67b9067">
461
+<div id="outline-container-orgheadline12" class="outline-3">
462
+<h3 id="orgheadline12">You have the gnupg keyring on an encrypted USB drive</h3>
463
+<div class="outline-text-3" id="text-orgheadline12">
464 464
 <p>
465 465
 If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
466 466
 </p>
467 467
 </div>
468 468
 </div>
469
-<div id="outline-container-org633470b" class="outline-3">
470
-<h3 id="org633470b">You have a number of key fragments on USB drives retrieved from friends</h3>
471
-<div class="outline-text-3" id="text-org633470b">
469
+<div id="outline-container-orgheadline13" class="outline-3">
470
+<h3 id="orgheadline13">You have a number of key fragments on USB drives retrieved from friends</h3>
471
+<div class="outline-text-3" id="text-orgheadline13">
472 472
 <p>
473
-If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#orgca4804f">Keydrives</a>.
473
+If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#orgheadline6">Keydrives</a>.
474 474
 </p>
475 475
 </div>
476 476
 </div>
477
-<div id="outline-container-org1fe74d2" class="outline-3">
478
-<h3 id="org1fe74d2">You can specify some ssh login details for friends servers containing key fragments</h3>
479
-<div class="outline-text-3" id="text-org1fe74d2">
477
+<div id="outline-container-orgheadline14" class="outline-3">
478
+<h3 id="orgheadline14">You can specify some ssh login details for friends servers containing key fragments</h3>
479
+<div class="outline-text-3" id="text-orgheadline14">
480 480
 <p>
481 481
 Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
482 482
 </p>
483 483
 </div>
484 484
 </div>
485 485
 </div>
486
-<div id="outline-container-org7ba815b" class="outline-2">
487
-<h2 id="org7ba815b">Final Setup</h2>
488
-<div class="outline-text-2" id="text-org7ba815b">
486
+<div id="outline-container-orgheadline5" class="outline-2">
487
+<h2 id="orgheadline5">Final Setup</h2>
488
+<div class="outline-text-2" id="text-orgheadline5">
489 489
 <p>
490 490
 Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
491 491
 </p>
@@ -598,16 +598,16 @@ On your internet router, typically under firewall settings, open the following p
598 598
 </div>
599 599
 </div>
600 600
 
601
-<div id="outline-container-orgca4804f" class="outline-2">
602
-<h2 id="orgca4804f">Keydrives</h2>
603
-<div class="outline-text-2" id="text-orgca4804f">
601
+<div id="outline-container-orgheadline6" class="outline-2">
602
+<h2 id="orgheadline6">Keydrives</h2>
603
+<div class="outline-text-2" id="text-orgheadline6">
604 604
 <p>
605 605
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
606 606
 </p>
607 607
 </div>
608
-<div id="outline-container-orge7fc013" class="outline-3">
609
-<h3 id="orge7fc013">Master Keydrive</h3>
610
-<div class="outline-text-3" id="text-orge7fc013">
608
+<div id="outline-container-orgheadline15" class="outline-3">
609
+<h3 id="orgheadline15">Master Keydrive</h3>
610
+<div class="outline-text-3" id="text-orgheadline15">
611 611
 <p>
612 612
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
613 613
 </p>
@@ -615,18 +615,17 @@ This is the traditional security model in which you carry your full keyring on a
615 615
 <div class="org-src-container">
616 616
 
617 617
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
618
-sudo control
619 618
 </pre>
620 619
 </div>
621 620
 
622 621
 <p>
623
-Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (master keydrive)</i>.
622
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Backup GPG key to USB (master keydrive)</i>.
624 623
 </p>
625 624
 </div>
626 625
 </div>
627
-<div id="outline-container-orgf721691" class="outline-3">
628
-<h3 id="orgf721691">Fragment keydrives</h3>
629
-<div class="outline-text-3" id="text-orgf721691">
626
+<div id="outline-container-orgheadline16" class="outline-3">
627
+<h3 id="orgheadline16">Fragment keydrives</h3>
628
+<div class="outline-text-3" id="text-orgheadline16">
630 629
 <p>
631 630
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
632 631
 </p>
@@ -634,12 +633,11 @@ This breaks your GPG key into a number of fragments and randomly selects one to
634 633
 <div class="org-src-container">
635 634
 
636 635
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
637
-sudo control
638 636
 </pre>
639 637
 </div>
640 638
 
641 639
 <p>
642
-Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (fragment keydrive)</i>.
640
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Backup GPG key to USB (fragment keydrive)</i>.
643 641
 </p>
644 642
 
645 643
 <p>
@@ -648,9 +646,9 @@ Fragments are randomly assigned and so you will need at least three or four keyd
648 646
 </div>
649 647
 </div>
650 648
 </div>
651
-<div id="outline-container-orgb1a9030" class="outline-2">
652
-<h2 id="orgb1a9030">On Client Machines</h2>
653
-<div class="outline-text-2" id="text-orgb1a9030">
649
+<div id="outline-container-orgheadline7" class="outline-2">
650
+<h2 id="orgheadline7">On Client Machines</h2>
651
+<div class="outline-text-2" id="text-orgheadline7">
654 652
 <p>
655 653
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
656 654
 </p>
@@ -668,9 +666,9 @@ freedombone-client
668 666
 </div>
669 667
 </div>
670 668
 
671
-<div id="outline-container-org6fc0eae" class="outline-2">
672
-<h2 id="org6fc0eae">Administering the system</h2>
673
-<div class="outline-text-2" id="text-org6fc0eae">
669
+<div id="outline-container-orgheadline8" class="outline-2">
670
+<h2 id="orgheadline8">Administering the system</h2>
671
+<div class="outline-text-2" id="text-orgheadline8">
674 672
 <p>
675 673
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
676 674
 </p>
@@ -678,12 +676,11 @@ To administer the system after installation log in via ssh, become the root user
678 676
 <div class="org-src-container">
679 677
 
680 678
 <pre class="src src-bash">ssh myusername@freedombone.local -p 2222
681
-sudo control
682 679
 </pre>
683 680
 </div>
684 681
 
685 682
 <p>
686
-From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
683
+Select <i>Administrator controls</i> then from there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
687 684
 </p>
688 685
 
689 686
 <center>

+ 5
- 9
website/EN/usage.html ファイルの表示

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-04-05 Tue 21:49 -->
6
+<!-- 2016-04-06 Wed 18:59 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -276,12 +276,11 @@ Log into your system and open the control panel.
276 276
 <div class="org-src-container">
277 277
 
278 278
 <pre class="src src-bash">ssh username@domain -p 2222
279
-sudo control
280 279
 </pre>
281 280
 </div>
282 281
 
283 282
 <p>
284
-Select <i>Manage Users</i> then <i>Change user ssh public key</i>. Copy and paste the public key here, then exit.
283
+Select <i>Administrator controls</i> then <i>Manage Users</i> then <i>Change user ssh public key</i>. Copy and paste the public key here, then exit.
285 284
 </p>
286 285
 
287 286
 <p>
@@ -308,12 +307,11 @@ You can also access your system via the Tor system using an onion address. To fi
308 307
 <div class="org-src-container">
309 308
 
310 309
 <pre class="src src-bash">ssh username@freedombone.local -p 2222
311
-sudo control
312 310
 </pre>
313 311
 </div>
314 312
 
315 313
 <p>
316
-Then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
314
+Select <i>Administrator controls</i> then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
317 315
 </p>
318 316
 
319 317
 <div class="org-src-container">
@@ -585,12 +583,11 @@ By default the IRC server is set up to require a password for users to log in. T
585 583
 <div class="org-src-container">
586 584
 
587 585
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
588
-sudo control
589 586
 </pre>
590 587
 </div>
591 588
 
592 589
 <p>
593
-Select the <b>IRC Menu</b> and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
590
+Select <i>Administrator controls</i> then <b>IRC Menu</b> and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
594 591
 </p>
595 592
 </div>
596 593
 </div>
@@ -1018,12 +1015,11 @@ See the control panel for the RSS reader onion address.
1018 1015
 <div class="org-src-container">
1019 1016
 
1020 1017
 <pre class="src src-bash">ssh username@domainname -p 2222
1021
-sudo control
1022 1018
 </pre>
1023 1019
 </div>
1024 1020
 
1025 1021
 <p>
1026
-Then select the <b>About</b> screen.
1022
+Select <i>Administrator controls</i> then select the <b>About</b> screen.
1027 1023
 </p>
1028 1024
 
1029 1025
 <p>

+ 4
- 7
website/EN/usage_email.html ファイルの表示

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2016-02-27 Sat 22:12 -->
6
+<!-- 2016-04-06 Wed 18:55 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -948,12 +948,11 @@ To subscribe to a mailing list log in as your user (i.e. not the root user).
948 948
 <div class="org-src-container">
949 949
 
950 950
 <pre class="src src-bash">ssh username@domainname -p 2222
951
-sudo control
952 951
 </pre>
953 952
 </div>
954 953
 
955 954
 <p>
956
-Select <b>Email filtering rules</b> then <b>Add a user to a mailing list</b>. If you want to do it purely from the commandline then see the manpage for <b>freedombone-addlist</b>.
955
+Select <i>Administrator controls</i> then <b>Email filtering rules</b> then <b>Add a user to a mailing list</b>. If you want to do it purely from the commandline then see the manpage for <b>freedombone-addlist</b>.
957 956
 </p>
958 957
 </div>
959 958
 </div>
@@ -967,12 +966,11 @@ Similar to adding mailing list folders you can also add specified email addresse
967 966
 <div class="org-src-container">
968 967
 
969 968
 <pre class="src src-bash">ssh username@domainname -p 2222
970
-sudo control
971 969
 </pre>
972 970
 </div>
973 971
 
974 972
 <p>
975
-Select <b>Email filtering rules</b> then <b>Add email rule</b>. To do the same from the commandline see the manpage for <b>freedombone-addemail</b>.
973
+Select <i>Administrator controls</i> then <b>Email filtering rules</b> then <b>Add email rule</b>. To do the same from the commandline see the manpage for <b>freedombone-addemail</b>.
976 974
 </p>
977 975
 </div>
978 976
 </div>
@@ -986,12 +984,11 @@ It is possible to ignore incoming emails if they are from a particular email add
986 984
 <div class="org-src-container">
987 985
 
988 986
 <pre class="src src-bash">ssh username@domainname -p 2222
989
-sudo control
990 987
 </pre>
991 988
 </div>
992 989
 
993 990
 <p>
994
-Select <b>Email filtering rules</b> then <b>Block/Unblock and email address</b> or <b>Block/Unblock email with subject line</b>. Also see the manpage for <b>freedombone-ignore</b>.
991
+Select <i>Administrator controls</i> then <b>Email filtering rules</b> then <b>Block/Unblock and email address</b> or <b>Block/Unblock email with subject line</b>. Also see the manpage for <b>freedombone-ignore</b>.
995 992
 </p>
996 993
 </div>
997 994
 </div>