Преглед на файлове

Update documentation for the new user menu

Bob Mottram преди 9 години
родител
ревизия
3e75f58d70
променени са 13 файла, в които са добавени 124 реда и са изтрити 173 реда
  1. 3
    6
      README.md
  2. 6
    12
      doc/EN/backups.org
  3. 3
    2
      doc/EN/controlpanel.org
  4. 9
    18
      doc/EN/faq.org
  5. 3
    6
      doc/EN/installation.org
  6. 4
    8
      doc/EN/usage.org
  7. 3
    6
      doc/EN/usage_email.org
  8. 7
    13
      website/EN/backups.html
  9. 6
    3
      website/EN/controlpanel.html
  10. 10
    19
      website/EN/faq.html
  11. 61
    64
      website/EN/installation.html
  12. 5
    9
      website/EN/usage.html
  13. 4
    7
      website/EN/usage_email.html

+ 3
- 6
README.md Целия файл

182
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the *Disk Utility* application. Then plug it into the Freedombone system, then from your local machine run:
182
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the *Disk Utility* application. Then plug it into the Freedombone system, then from your local machine run:
183
 
183
 
184
     ssh myusername@mydomainname -p 2222
184
     ssh myusername@mydomainname -p 2222
185
-    sudo control
186
 
185
 
187
-Select *Backup and Restore* then *Backup GPG key to USB (master keydrive)*.
186
+Select *Administrator controls* then *Backup and Restore* then *Backup GPG key to USB (master keydrive)*.
188
 
187
 
189
 **Fragment keydrives**
188
 **Fragment keydrives**
190
 
189
 
191
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the *Disk Utility* application. Plug it into the Freedombone system then from your local machine run the following commands:
190
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the *Disk Utility* application. Plug it into the Freedombone system then from your local machine run the following commands:
192
 
191
 
193
     ssh myusername@mydomainname -p 2222
192
     ssh myusername@mydomainname -p 2222
194
-    sudo control
195
 
193
 
196
-Select *Backup and Restore* then *Backup GPG key to USB (fragment keydrive)*.
194
+Select *Administrator controls* then *Backup and Restore* then *Backup GPG key to USB (fragment keydrive)*.
197
 
195
 
198
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called *"the web of backups"* or *"the web of encryption"*. Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
196
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called *"the web of backups"* or *"the web of encryption"*. Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
199
 
197
 
206
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
204
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
207
 
205
 
208
     ssh fbone@freedombone.local -p 2222
206
     ssh fbone@freedombone.local -p 2222
209
-    sudo control
210
 
207
 
211
-From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
208
+Select *Administrator controls* and from there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.

+ 6
- 12
doc/EN/backups.org Целия файл

30
 
30
 
31
 #+BEGIN_SRC bash
31
 #+BEGIN_SRC bash
32
 ssh username@domainname -p 2222
32
 ssh username@domainname -p 2222
33
-sudo control
34
 #+END_SRC
33
 #+END_SRC
35
 
34
 
36
-Select /Backup and Restore/ then /Backup GPG key to USB drive (master keydrive)/.
35
+Select /Administrator controls/ then /Backup and Restore/ then /Backup GPG key to USB drive (master keydrive)/.
37
 
36
 
38
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
37
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
39
 
38
 
47
 
46
 
48
 #+BEGIN_SRC bash
47
 #+BEGIN_SRC bash
49
 ssh username@domainname -p 2222
48
 ssh username@domainname -p 2222
50
-sudo control
51
 #+END_SRC
49
 #+END_SRC
52
 
50
 
53
-Select /Backup and Restore/ and then /Backup data to USB drive/.
51
+Select /Administrator controls/ then /Backup and Restore/ and then /Backup data to USB drive/.
54
 
52
 
55
 Type in the LUKS password for the USB drive, then the backup will begin.
53
 Type in the LUKS password for the USB drive, then the backup will begin.
56
 
54
 
60
 
58
 
61
 #+BEGIN_SRC bash
59
 #+BEGIN_SRC bash
62
 ssh username@domainname -p 2222
60
 ssh username@domainname -p 2222
63
-sudo control
64
 #+END_SRC
61
 #+END_SRC
65
 
62
 
66
-If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting /Backup and Restore/ then /Restore GPG key from USB keydrive/. When that's done remove the keydrive and plug in the backup drive.
63
+Select /Administrator controls/ then if this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting /Backup and Restore/ then /Restore GPG key from USB keydrive/. When that's done remove the keydrive and plug in the backup drive.
67
 
64
 
68
 Select /Backup and Restore/ then /Restore data from USB drive/.
65
 Select /Backup and Restore/ then /Restore data from USB drive/.
69
 
66
 
75
 
72
 
76
 #+BEGIN_SRC bash
73
 #+BEGIN_SRC bash
77
 ssh username@domainname -p 2222
74
 ssh username@domainname -p 2222
78
-sudo control
79
 #+END_SRC
75
 #+END_SRC
80
 
76
 
81
-Select /Backup and Restore/ then /Configure remote backups/.
77
+Select /Administrator controls/ then /Backup and Restore/ then /Configure remote backups/.
82
 
78
 
83
 You can then enter the usernames, domains and ssh logins for one or more remote servers. The system will try to backup to these remote locations once per day.
79
 You can then enter the usernames, domains and ssh logins for one or more remote servers. The system will try to backup to these remote locations once per day.
84
 * Restore from a friend
80
 * Restore from a friend
89
 
85
 
90
 #+BEGIN_SRC bash
86
 #+BEGIN_SRC bash
91
 ssh username@domainname -p 2222
87
 ssh username@domainname -p 2222
92
-sudo control
93
 #+END_SRC
88
 #+END_SRC
94
 
89
 
95
-Select /Backup and Restore/ then /Restore GPG key from USB (master keydrive)/. Select the username then plug in your keydrive and restore the key.
90
+Select /Administrator controls/ then /Backup and Restore/ then /Restore GPG key from USB (master keydrive)/. Select the username then plug in your keydrive and restore the key.
96
 
91
 
97
 Now select /Configure remote backups/ and configure the locations and logins for the remote server.
92
 Now select /Configure remote backups/ and configure the locations and logins for the remote server.
98
 
93
 
104
 
99
 
105
 #+BEGIN_SRC bash
100
 #+BEGIN_SRC bash
106
 ssh username@domainname -p 2222
101
 ssh username@domainname -p 2222
107
-sudo control
108
 #+END_SRC
102
 #+END_SRC
109
 
103
 
110
-Select /Backup and Restore/ then /Restore from remote backup/ and enter the domain name of the remote server that you wish to restore from.
104
+Select /Administrator controls/ then /Backup and Restore/ then /Restore from remote backup/ and enter the domain name of the remote server that you wish to restore from.
111
 
105
 
112
 #+BEGIN_EXPORT html
106
 #+BEGIN_EXPORT html
113
 <center>
107
 <center>

+ 3
- 2
doc/EN/controlpanel.org Целия файл

29
 | [[User management menu]]    |
29
 | [[User management menu]]    |
30
 
30
 
31
 * Main menu
31
 * Main menu
32
-You can access the main menu by logging into the system, then running the *control* command with root privileges.
32
+You can access the main menu by logging into the system.
33
 
33
 
34
 #+BEGIN_SRC bash
34
 #+BEGIN_SRC bash
35
 ssh myusername@mydomain -p 2222
35
 ssh myusername@mydomain -p 2222
36
-sudo control
37
 #+END_SRC
36
 #+END_SRC
38
 
37
 
38
+Then selecting /Administrator controls/.
39
+
39
 It should look like this:
40
 It should look like this:
40
 
41
 
41
 #+BEGIN_CENTER
42
 #+BEGIN_CENTER

+ 9
- 18
doc/EN/faq.org Целия файл

67
 
67
 
68
 #+BEGIN_SRC bash
68
 #+BEGIN_SRC bash
69
 ssh username@mydomainname -p 2222
69
 ssh username@mydomainname -p 2222
70
-sudo control
71
 #+END_SRC
70
 #+END_SRC
72
 
71
 
73
-Select /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
72
+Select /Administrator controls/ then /Manage Users/ and then /Add a user/. You will be prompted for a username and you can also optionally provide their ssh public key.
74
 
73
 
75
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have *complete trust* in the administrator.
74
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have *complete trust* in the administrator.
76
 
75
 
80
 
79
 
81
 #+BEGIN_SRC bash
80
 #+BEGIN_SRC bash
82
 ssh username@mydomainname -p 2222
81
 ssh username@mydomainname -p 2222
83
-sudo control
84
 #+END_SRC
82
 #+END_SRC
85
 
83
 
86
-Select /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
84
+Select /Administrator controls/ then /Manage Users/ and then /Delete a user/. Note that this will delete all of that user's files and email.
87
 * How do I reset the tripwire?
85
 * How do I reset the tripwire?
88
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
86
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
89
 
87
 
90
 #+BEGIN_SRC bash
88
 #+BEGIN_SRC bash
91
 ssh username@mydomain -p 2222
89
 ssh username@mydomain -p 2222
92
-sudo control
93
 #+END_SRC
90
 #+END_SRC
94
 
91
 
95
-Select "reset tripwire" using cursors and space bar then enter.
92
+Select /Administrator controls/ then "reset tripwire" using cursors and space bar then enter.
96
 * Is metadata protected?
93
 * Is metadata protected?
97
 #+BEGIN_QUOTE
94
 #+BEGIN_QUOTE
98
 "/We kill people based on metadata/"
95
 "/We kill people based on metadata/"
104
 * How do I create email processing rules?
101
 * How do I create email processing rules?
105
 #+BEGIN_SRC bash
102
 #+BEGIN_SRC bash
106
 ssh username@domainname -p 2222
103
 ssh username@domainname -p 2222
107
-sudo control
108
 #+END_SRC
104
 #+END_SRC
109
 
105
 
110
-Select /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
106
+Select /Administrator controls/ then /Email Filtering Rules/ then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
111
 
107
 
112
 | freedombone-addlist  | Adds a mailing list                                                  |
108
 | freedombone-addlist  | Adds a mailing list                                                  |
113
 | freedombone-rmlist   | Removes a mailing list                                               |
109
 | freedombone-rmlist   | Removes a mailing list                                               |
180
 
176
 
181
 #+BEGIN_SRC bash
177
 #+BEGIN_SRC bash
182
 ssh myusername@mydomain -p 2222
178
 ssh myusername@mydomain -p 2222
183
-sudo control
184
 #+END_SRC
179
 #+END_SRC
185
 
180
 
186
-Then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
181
+Select /Administrator controls/ then select /Security Settings/. You will then be able to edit the crypto settings for all of the installed applications. *Be very careful when editing*, since any mistake could make your system less secure rather than more.
187
 * How do I get a domain name?
182
 * How do I get a domain name?
188
 Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
183
 Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
189
 
184
 
229
 
224
 
230
 #+BEGIN_SRC bash
225
 #+BEGIN_SRC bash
231
 ssh username@mydomainname -p 2222
226
 ssh username@mydomainname -p 2222
232
-sudo control
233
 #+END_SRC
227
 #+END_SRC
234
 
228
 
235
-Select *Security settings* then *Create a new Let's Encrypt certificate*.
229
+Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
236
 
230
 
237
 One thing to be aware of is that Let's Encrypt doesn't support many dynamic DNS subdomains, such as those from freeDNS, so to run Hubzilla and GNU Social you will need to have your own official domains for those. There are many sites from which you can buy cheap domain names, and while this isn't ideal in terms of making you dependent upon another company it's the only option currently.
231
 One thing to be aware of is that Let's Encrypt doesn't support many dynamic DNS subdomains, such as those from freeDNS, so to run Hubzilla and GNU Social you will need to have your own official domains for those. There are many sites from which you can buy cheap domain names, and while this isn't ideal in terms of making you dependent upon another company it's the only option currently.
238
 * How do I renew a Let's Encrypt certificate?
232
 * How do I renew a Let's Encrypt certificate?
242
 
236
 
243
 #+BEGIN_SRC bash
237
 #+BEGIN_SRC bash
244
 ssh username@mydomainname -p 2222
238
 ssh username@mydomainname -p 2222
245
-sudo control
246
 #+END_SRC
239
 #+END_SRC
247
 
240
 
248
-Select *Security settings* then *Renew Let's Encrypt certificate*.
241
+Select /Administrator controls/ then *Security settings* then *Renew Let's Encrypt certificate*.
249
 * I tried to renew a Let's Encrypt certificate and it failed. What should I do?
242
 * I tried to renew a Let's Encrypt certificate and it failed. What should I do?
250
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
243
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
251
 
244
 
252
 #+BEGIN_SRC bash
245
 #+BEGIN_SRC bash
253
 ssh username@mydomainname -p 2222
246
 ssh username@mydomainname -p 2222
254
-sudo control
255
 #+END_SRC
247
 #+END_SRC
256
 
248
 
257
-Select *Security settings* then *Create a new Let's Encrypt certificate*.
249
+Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
258
 * Why use self-signed certificates?
250
 * Why use self-signed certificates?
259
 Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up /scary-scary looking/ browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is /no certainty about who that connection is with/.
251
 Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up /scary-scary looking/ browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is /no certainty about who that connection is with/.
260
 
252
 
274
 
266
 
275
 #+BEGIN_SRC bash
267
 #+BEGIN_SRC bash
276
 ssh username@mydomainname -p 2222
268
 ssh username@mydomainname -p 2222
277
-sudo control
278
 #+END_SRC
269
 #+END_SRC
279
 
270
 
280
-Select *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
271
+Select /Administrator controls/ then *Outgoing Email Proxy* and enter the details for your ISP SMTP server.
281
 
272
 
282
 This may work, at least when using Mutt, and admittedly if it does then it's a compromise in which you are using some infrastructure which is not controlled by the community - with all of the usual hazards which go along with that.
273
 This may work, at least when using Mutt, and admittedly if it does then it's a compromise in which you are using some infrastructure which is not controlled by the community - with all of the usual hazards which go along with that.
283
 
274
 

+ 3
- 6
doc/EN/installation.org Целия файл

205
 
205
 
206
 #+BEGIN_SRC bash
206
 #+BEGIN_SRC bash
207
 ssh myusername@mydomainname -p 2222
207
 ssh myusername@mydomainname -p 2222
208
-sudo control
209
 #+END_SRC
208
 #+END_SRC
210
 
209
 
211
-Select /Backup and Restore/ then /Backup GPG key to USB (master keydrive)/.
210
+Select /Administrator controls/ then /Backup and Restore/ then /Backup GPG key to USB (master keydrive)/.
212
 ** Fragment keydrives
211
 ** Fragment keydrives
213
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be done from the /Disk Utility/ application]]. Plug it into the Freedombone system then from your local machine run the following commands:
212
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be done from the /Disk Utility/ application]]. Plug it into the Freedombone system then from your local machine run the following commands:
214
 
213
 
215
 #+BEGIN_SRC bash
214
 #+BEGIN_SRC bash
216
 ssh myusername@mydomainname -p 2222
215
 ssh myusername@mydomainname -p 2222
217
-sudo control
218
 #+END_SRC
216
 #+END_SRC
219
 
217
 
220
-Select /Backup and Restore/ then /Backup GPG key to USB (fragment keydrive)/.
218
+Select /Administrator controls/ then /Backup and Restore/ then /Backup GPG key to USB (fragment keydrive)/.
221
 
219
 
222
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
220
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
223
 * On Client Machines
221
 * On Client Machines
237
 
235
 
238
 #+BEGIN_SRC bash
236
 #+BEGIN_SRC bash
239
 ssh myusername@freedombone.local -p 2222
237
 ssh myusername@freedombone.local -p 2222
240
-sudo control
241
 #+END_SRC
238
 #+END_SRC
242
 
239
 
243
-From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
240
+Select /Administrator controls/ then from there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
244
 
241
 
245
 #+BEGIN_EXPORT html
242
 #+BEGIN_EXPORT html
246
 <center>
243
 <center>

+ 4
- 8
doc/EN/usage.org Целия файл

59
 
59
 
60
 #+BEGIN_SRC bash
60
 #+BEGIN_SRC bash
61
 ssh username@domain -p 2222
61
 ssh username@domain -p 2222
62
-sudo control
63
 #+END_SRC
62
 #+END_SRC
64
 
63
 
65
-Select /Manage Users/ then /Change user ssh public key/. Copy and paste the public key here, then exit.
64
+Select /Administrator controls/ then /Manage Users/ then /Change user ssh public key/. Copy and paste the public key here, then exit.
66
 
65
 
67
 It's a good idea to also copy the contents of *~/.ssh/id_rsa* and *~/.ssh/id_rsa.pub* to you password manager, together with the private key password if you created one.
66
 It's a good idea to also copy the contents of *~/.ssh/id_rsa* and *~/.ssh/id_rsa.pub* to you password manager, together with the private key password if you created one.
68
 
67
 
75
 
74
 
76
 #+BEGIN_SRC bash
75
 #+BEGIN_SRC bash
77
 ssh username@freedombone.local -p 2222
76
 ssh username@freedombone.local -p 2222
78
-sudo control
79
 #+END_SRC
77
 #+END_SRC
80
 
78
 
81
-Then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
79
+Select /Administrator controls/ then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
82
 
80
 
83
 #+BEGIN_SRC bash
81
 #+BEGIN_SRC bash
84
 sudo apt-get install tor connect-proxy
82
 sudo apt-get install tor connect-proxy
197
 
195
 
198
 #+BEGIN_SRC bash
196
 #+BEGIN_SRC bash
199
 ssh myusername@mydomain -p 2222
197
 ssh myusername@mydomain -p 2222
200
-sudo control
201
 #+END_SRC
198
 #+END_SRC
202
 
199
 
203
-Select the *IRC Menu* and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
200
+Select /Administrator controls/ then *IRC Menu* and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
204
 
201
 
205
 ** XMPP/Jabber
202
 ** XMPP/Jabber
206
 *** Using with Profanity
203
 *** Using with Profanity
368
 
365
 
369
 #+BEGIN_SRC bash
366
 #+BEGIN_SRC bash
370
 ssh username@domainname -p 2222
367
 ssh username@domainname -p 2222
371
-sudo control
372
 #+END_SRC
368
 #+END_SRC
373
 
369
 
374
-Then select the *About* screen.
370
+Select /Administrator controls/ then select the *About* screen.
375
 
371
 
376
 The RSS reader is accessible only via an onion address. This provides a reasonable degree of reading privacy, making it difficult for passive adversaries such as governments, corporations or criminals to create lists of sites which you are subscribed to.
372
 The RSS reader is accessible only via an onion address. This provides a reasonable degree of reading privacy, making it difficult for passive adversaries such as governments, corporations or criminals to create lists of sites which you are subscribed to.
377
 
373
 

+ 3
- 6
doc/EN/usage_email.org Целия файл

430
 
430
 
431
 #+BEGIN_SRC bash
431
 #+BEGIN_SRC bash
432
 ssh username@domainname -p 2222
432
 ssh username@domainname -p 2222
433
-sudo control
434
 #+END_SRC
433
 #+END_SRC
435
 
434
 
436
-Select *Email filtering rules* then *Add a user to a mailing list*. If you want to do it purely from the commandline then see the manpage for *freedombone-addlist*.
435
+Select /Administrator controls/ then *Email filtering rules* then *Add a user to a mailing list*. If you want to do it purely from the commandline then see the manpage for *freedombone-addlist*.
437
 * Adding email addresses to a group/folder
436
 * Adding email addresses to a group/folder
438
 Similar to adding mailing list folders you can also add specified email addresses into a group/folder.
437
 Similar to adding mailing list folders you can also add specified email addresses into a group/folder.
439
 
438
 
440
 #+BEGIN_SRC bash
439
 #+BEGIN_SRC bash
441
 ssh username@domainname -p 2222
440
 ssh username@domainname -p 2222
442
-sudo control
443
 #+END_SRC
441
 #+END_SRC
444
 
442
 
445
-Select *Email filtering rules* then *Add email rule*. To do the same from the commandline see the manpage for *freedombone-addemail*.
443
+Select /Administrator controls/ then *Email filtering rules* then *Add email rule*. To do the same from the commandline see the manpage for *freedombone-addemail*.
446
 * Ignoring incoming emails
444
 * Ignoring incoming emails
447
 It is possible to ignore incoming emails if they are from a particular email address or if the subject line contains particular text.
445
 It is possible to ignore incoming emails if they are from a particular email address or if the subject line contains particular text.
448
 
446
 
449
 #+BEGIN_SRC bash
447
 #+BEGIN_SRC bash
450
 ssh username@domainname -p 2222
448
 ssh username@domainname -p 2222
451
-sudo control
452
 #+END_SRC
449
 #+END_SRC
453
 
450
 
454
-Select *Email filtering rules* then *Block/Unblock and email address* or *Block/Unblock email with subject line*. Also see the manpage for *freedombone-ignore*.
451
+Select /Administrator controls/ then *Email filtering rules* then *Block/Unblock and email address* or *Block/Unblock email with subject line*. Also see the manpage for *freedombone-ignore*.
455
 * Your own mailing list
452
 * Your own mailing list
456
 If you want to set up a public mailing list then when installing the system remember to set the *PUBLIC_MAILING_LIST* variable within *freedombone.cfg* to the name of your list. The name should have no spaces in it. Public mailing lists are unencrypted so anyone will be able to read the contents, including non subscribers.
453
 If you want to set up a public mailing list then when installing the system remember to set the *PUBLIC_MAILING_LIST* variable within *freedombone.cfg* to the name of your list. The name should have no spaces in it. Public mailing lists are unencrypted so anyone will be able to read the contents, including non subscribers.
457
 
454
 

+ 7
- 13
website/EN/backups.html Целия файл

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-02-27 Sat 22:05 -->
6
+<!-- 2016-04-06 Wed 18:52 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
203
 <div class="org-src-container">
203
 <div class="org-src-container">
204
 
204
 
205
 <pre class="src src-bash">ssh username@domainname -p 2222
205
 <pre class="src src-bash">ssh username@domainname -p 2222
206
-sudo control
207
 </pre>
206
 </pre>
208
 </div>
207
 </div>
209
 
208
 
210
 <p>
209
 <p>
211
-Select <i>Backup and Restore</i> then <i>Backup GPG key to USB drive (master keydrive)</i>.
210
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Backup GPG key to USB drive (master keydrive)</i>.
212
 </p>
211
 </p>
213
 
212
 
214
 <p>
213
 <p>
238
 <div class="org-src-container">
237
 <div class="org-src-container">
239
 
238
 
240
 <pre class="src src-bash">ssh username@domainname -p 2222
239
 <pre class="src src-bash">ssh username@domainname -p 2222
241
-sudo control
242
 </pre>
240
 </pre>
243
 </div>
241
 </div>
244
 
242
 
245
 <p>
243
 <p>
246
-Select <i>Backup and Restore</i> and then <i>Backup data to USB drive</i>.
244
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> and then <i>Backup data to USB drive</i>.
247
 </p>
245
 </p>
248
 
246
 
249
 <p>
247
 <p>
265
 <div class="org-src-container">
263
 <div class="org-src-container">
266
 
264
 
267
 <pre class="src src-bash">ssh username@domainname -p 2222
265
 <pre class="src src-bash">ssh username@domainname -p 2222
268
-sudo control
269
 </pre>
266
 </pre>
270
 </div>
267
 </div>
271
 
268
 
272
 <p>
269
 <p>
273
-If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting <i>Backup and Restore</i> then <i>Restore GPG key from USB keydrive</i>. When that's done remove the keydrive and plug in the backup drive.
270
+Select <i>Administrator controls</i> then if this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting <i>Backup and Restore</i> then <i>Restore GPG key from USB keydrive</i>. When that's done remove the keydrive and plug in the backup drive.
274
 </p>
271
 </p>
275
 
272
 
276
 <p>
273
 <p>
296
 <div class="org-src-container">
293
 <div class="org-src-container">
297
 
294
 
298
 <pre class="src src-bash">ssh username@domainname -p 2222
295
 <pre class="src src-bash">ssh username@domainname -p 2222
299
-sudo control
300
 </pre>
296
 </pre>
301
 </div>
297
 </div>
302
 
298
 
303
 <p>
299
 <p>
304
-Select <i>Backup and Restore</i> then <i>Configure remote backups</i>.
300
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Configure remote backups</i>.
305
 </p>
301
 </p>
306
 
302
 
307
 <p>
303
 <p>
326
 <div class="org-src-container">
322
 <div class="org-src-container">
327
 
323
 
328
 <pre class="src src-bash">ssh username@domainname -p 2222
324
 <pre class="src src-bash">ssh username@domainname -p 2222
329
-sudo control
330
 </pre>
325
 </pre>
331
 </div>
326
 </div>
332
 
327
 
333
 <p>
328
 <p>
334
-Select <i>Backup and Restore</i> then <i>Restore GPG key from USB (master keydrive)</i>. Select the username then plug in your keydrive and restore the key.
329
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Restore GPG key from USB (master keydrive)</i>. Select the username then plug in your keydrive and restore the key.
335
 </p>
330
 </p>
336
 
331
 
337
 <p>
332
 <p>
357
 <div class="org-src-container">
352
 <div class="org-src-container">
358
 
353
 
359
 <pre class="src src-bash">ssh username@domainname -p 2222
354
 <pre class="src src-bash">ssh username@domainname -p 2222
360
-sudo control
361
 </pre>
355
 </pre>
362
 </div>
356
 </div>
363
 
357
 
364
 <p>
358
 <p>
365
-Select <i>Backup and Restore</i> then <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
359
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
366
 </p>
360
 </p>
367
 
361
 
368
 <center>
362
 <center>

+ 6
- 3
website/EN/controlpanel.html Целия файл

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-02-27 Sat 23:18 -->
6
+<!-- 2016-04-06 Wed 18:54 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
219
 <h2 id="orgheadline1">Main menu</h2>
219
 <h2 id="orgheadline1">Main menu</h2>
220
 <div class="outline-text-2" id="text-orgheadline1">
220
 <div class="outline-text-2" id="text-orgheadline1">
221
 <p>
221
 <p>
222
-You can access the main menu by logging into the system, then running the <b>control</b> command with root privileges.
222
+You can access the main menu by logging into the system.
223
 </p>
223
 </p>
224
 
224
 
225
 <div class="org-src-container">
225
 <div class="org-src-container">
226
 
226
 
227
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
227
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
228
-sudo control
229
 </pre>
228
 </pre>
230
 </div>
229
 </div>
231
 
230
 
232
 <p>
231
 <p>
232
+Then selecting <i>Administrator controls</i>.
233
+</p>
234
+
235
+<p>
233
 It should look like this:
236
 It should look like this:
234
 </p>
237
 </p>
235
 
238
 

+ 10
- 19
website/EN/faq.html Целия файл

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-03-23 Wed 21:10 -->
6
+<!-- 2016-04-06 Wed 18:58 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
327
 <div class="org-src-container">
327
 <div class="org-src-container">
328
 
328
 
329
 <pre class="src src-bash">ssh username@mydomainname -p 2222
329
 <pre class="src src-bash">ssh username@mydomainname -p 2222
330
-sudo control
331
 </pre>
330
 </pre>
332
 </div>
331
 </div>
333
 
332
 
334
 <p>
333
 <p>
335
-Select <i>Manage Users</i> and then <i>Add a user</i>. You will be prompted for a username and you can also optionally provide their ssh public key.
334
+Select <i>Administrator controls</i> then <i>Manage Users</i> and then <i>Add a user</i>. You will be prompted for a username and you can also optionally provide their ssh public key.
336
 </p>
335
 </p>
337
 
336
 
338
 <p>
337
 <p>
354
 <div class="org-src-container">
353
 <div class="org-src-container">
355
 
354
 
356
 <pre class="src src-bash">ssh username@mydomainname -p 2222
355
 <pre class="src src-bash">ssh username@mydomainname -p 2222
357
-sudo control
358
 </pre>
356
 </pre>
359
 </div>
357
 </div>
360
 
358
 
361
 <p>
359
 <p>
362
-Select <i>Manage Users</i> and then <i>Delete a user</i>. Note that this will delete all of that user's files and email.
360
+Select <i>Administrator controls</i> then <i>Manage Users</i> and then <i>Delete a user</i>. Note that this will delete all of that user's files and email.
363
 </p>
361
 </p>
364
 </div>
362
 </div>
365
 </div>
363
 </div>
373
 <div class="org-src-container">
371
 <div class="org-src-container">
374
 
372
 
375
 <pre class="src src-bash">ssh username@mydomain -p 2222
373
 <pre class="src src-bash">ssh username@mydomain -p 2222
376
-sudo control
377
 </pre>
374
 </pre>
378
 </div>
375
 </div>
379
 
376
 
380
 <p>
377
 <p>
381
-Select "reset tripwire" using cursors and space bar then enter.
378
+Select <i>Administrator controls</i> then "reset tripwire" using cursors and space bar then enter.
382
 </p>
379
 </p>
383
 </div>
380
 </div>
384
 </div>
381
 </div>
406
 <div class="org-src-container">
403
 <div class="org-src-container">
407
 
404
 
408
 <pre class="src src-bash">ssh username@domainname -p 2222
405
 <pre class="src src-bash">ssh username@domainname -p 2222
409
-sudo control
410
 </pre>
406
 </pre>
411
 </div>
407
 </div>
412
 
408
 
413
 <p>
409
 <p>
414
-Select <i>Email Filtering Rules</i> then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
410
+Select <i>Administrator controls</i> then <i>Email Filtering Rules</i> then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
415
 </p>
411
 </p>
416
 
412
 
417
 <table border="2" cellspacing="0" cellpadding="6" rules="groups" frame="hsides">
413
 <table border="2" cellspacing="0" cellpadding="6" rules="groups" frame="hsides">
540
 <div class="org-src-container">
536
 <div class="org-src-container">
541
 
537
 
542
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
538
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
543
-sudo control
544
 </pre>
539
 </pre>
545
 </div>
540
 </div>
546
 
541
 
547
 <p>
542
 <p>
548
-Then select <i>Security Settings</i>. You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
543
+Select <i>Administrator controls</i> then select <i>Security Settings</i>. You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
549
 </p>
544
 </p>
550
 </div>
545
 </div>
551
 </div>
546
 </div>
629
 <div class="org-src-container">
624
 <div class="org-src-container">
630
 
625
 
631
 <pre class="src src-bash">ssh username@mydomainname -p 2222
626
 <pre class="src src-bash">ssh username@mydomainname -p 2222
632
-sudo control
633
 </pre>
627
 </pre>
634
 </div>
628
 </div>
635
 
629
 
636
 <p>
630
 <p>
637
-Select <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
631
+Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
638
 </p>
632
 </p>
639
 
633
 
640
 <p>
634
 <p>
656
 <div class="org-src-container">
650
 <div class="org-src-container">
657
 
651
 
658
 <pre class="src src-bash">ssh username@mydomainname -p 2222
652
 <pre class="src src-bash">ssh username@mydomainname -p 2222
659
-sudo control
660
 </pre>
653
 </pre>
661
 </div>
654
 </div>
662
 
655
 
663
 <p>
656
 <p>
664
-Select <b>Security settings</b> then <b>Renew Let's Encrypt certificate</b>.
657
+Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Renew Let's Encrypt certificate</b>.
665
 </p>
658
 </p>
666
 </div>
659
 </div>
667
 </div>
660
 </div>
675
 <div class="org-src-container">
668
 <div class="org-src-container">
676
 
669
 
677
 <pre class="src src-bash">ssh username@mydomainname -p 2222
670
 <pre class="src src-bash">ssh username@mydomainname -p 2222
678
-sudo control
679
 </pre>
671
 </pre>
680
 </div>
672
 </div>
681
 
673
 
682
 <p>
674
 <p>
683
-Select <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
675
+Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Create a new Let's Encrypt certificate</b>.
684
 </p>
676
 </p>
685
 </div>
677
 </div>
686
 </div>
678
 </div>
730
 <div class="org-src-container">
722
 <div class="org-src-container">
731
 
723
 
732
 <pre class="src src-bash">ssh username@mydomainname -p 2222
724
 <pre class="src src-bash">ssh username@mydomainname -p 2222
733
-sudo control
734
 </pre>
725
 </pre>
735
 </div>
726
 </div>
736
 
727
 
737
 <p>
728
 <p>
738
-Select <b>Outgoing Email Proxy</b> and enter the details for your ISP SMTP server.
729
+Select <i>Administrator controls</i> then <b>Outgoing Email Proxy</b> and enter the details for your ISP SMTP server.
739
 </p>
730
 </p>
740
 
731
 
741
 <p>
732
 <p>

+ 61
- 64
website/EN/installation.html Целия файл

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-06 Wed 14:35 -->
6
+<!-- 2016-04-06 Wed 18:50 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
170
 </colgroup>
170
 </colgroup>
171
 <tbody>
171
 <tbody>
172
 <tr>
172
 <tr>
173
-<td class="org-left"><a href="#orgcbeb5c6">Building an image for a Single Board Computer or Virtual Machine</a></td>
173
+<td class="org-left"><a href="#orgheadline1">Building an image for a Single Board Computer or Virtual Machine</a></td>
174
 </tr>
174
 </tr>
175
 
175
 
176
 <tr>
176
 <tr>
177
-<td class="org-left"><a href="#org561a41c">Checklist</a></td>
177
+<td class="org-left"><a href="#orgheadline2">Checklist</a></td>
178
 </tr>
178
 </tr>
179
 
179
 
180
 <tr>
180
 <tr>
182
 </tr>
182
 </tr>
183
 
183
 
184
 <tr>
184
 <tr>
185
-<td class="org-left"><a href="#org84e979f">Installation</a></td>
185
+<td class="org-left"><a href="#orgheadline3">Installation</a></td>
186
 </tr>
186
 </tr>
187
 
187
 
188
 <tr>
188
 <tr>
189
-<td class="org-left"><a href="#org2acc932">Social Key Management - the 'Unforgettable Key'</a></td>
189
+<td class="org-left"><a href="#orgheadline4">Social Key Management - the 'Unforgettable Key'</a></td>
190
 </tr>
190
 </tr>
191
 
191
 
192
 <tr>
192
 <tr>
193
-<td class="org-left"><a href="#org7ba815b">Final Setup</a></td>
193
+<td class="org-left"><a href="#orgheadline5">Final Setup</a></td>
194
 </tr>
194
 </tr>
195
 
195
 
196
 <tr>
196
 <tr>
197
-<td class="org-left"><a href="#orgca4804f">Keydrives</a></td>
197
+<td class="org-left"><a href="#orgheadline6">Keydrives</a></td>
198
 </tr>
198
 </tr>
199
 
199
 
200
 <tr>
200
 <tr>
201
-<td class="org-left"><a href="#orgb1a9030">On Client Machines</a></td>
201
+<td class="org-left"><a href="#orgheadline7">On Client Machines</a></td>
202
 </tr>
202
 </tr>
203
 
203
 
204
 <tr>
204
 <tr>
205
-<td class="org-left"><a href="#org6fc0eae">Administering the system</a></td>
205
+<td class="org-left"><a href="#orgheadline8">Administering the system</a></td>
206
 </tr>
206
 </tr>
207
 </tbody>
207
 </tbody>
208
 </table>
208
 </table>
209
 
209
 
210
-<div id="outline-container-orgcbeb5c6" class="outline-2">
211
-<h2 id="orgcbeb5c6">Building an image for a Single Board Computer or Virtual Machine</h2>
212
-<div class="outline-text-2" id="text-orgcbeb5c6">
210
+<div id="outline-container-orgheadline1" class="outline-2">
211
+<h2 id="orgheadline1">Building an image for a Single Board Computer or Virtual Machine</h2>
212
+<div class="outline-text-2" id="text-orgheadline1">
213
 <p>
213
 <p>
214
 You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
214
 You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
215
 </p>
215
 </p>
295
 </div>
295
 </div>
296
 </div>
296
 </div>
297
 
297
 
298
-<div id="outline-container-org561a41c" class="outline-2">
299
-<h2 id="org561a41c">Checklist</h2>
300
-<div class="outline-text-2" id="text-org561a41c">
298
+<div id="outline-container-orgheadline2" class="outline-2">
299
+<h2 id="orgheadline2">Checklist</h2>
300
+<div class="outline-text-2" id="text-orgheadline2">
301
 <p>
301
 <p>
302
 Before installing Freedombone you will need a few things.
302
 Before installing Freedombone you will need a few things.
303
 </p>
303
 </p>
311
 </ul>
311
 </ul>
312
 </div>
312
 </div>
313
 </div>
313
 </div>
314
-<div id="outline-container-org84e979f" class="outline-2">
315
-<h2 id="org84e979f">Installation</h2>
316
-<div class="outline-text-2" id="text-org84e979f">
314
+<div id="outline-container-orgheadline3" class="outline-2">
315
+<h2 id="orgheadline3">Installation</h2>
316
+<div class="outline-text-2" id="text-orgheadline3">
317
 <p>
317
 <p>
318
 There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
318
 There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
319
 </p>
319
 </p>
320
 </div>
320
 </div>
321
 
321
 
322
-<div id="outline-container-org7ed0a15" class="outline-3">
323
-<h3 id="org7ed0a15">On a Laptop, Netbook or Desktop machine</h3>
324
-<div class="outline-text-3" id="text-org7ed0a15">
322
+<div id="outline-container-orgheadline9" class="outline-3">
323
+<h3 id="orgheadline9">On a Laptop, Netbook or Desktop machine</h3>
324
+<div class="outline-text-3" id="text-orgheadline9">
325
 <p>
325
 <p>
326
 If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
326
 If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
327
 </p>
327
 </p>
340
 </div>
340
 </div>
341
 </div>
341
 </div>
342
 
342
 
343
-<div id="outline-container-orge190975" class="outline-3">
344
-<h3 id="orge190975">On a single board computer (SBC)</h3>
345
-<div class="outline-text-3" id="text-orge190975">
343
+<div id="outline-container-orgheadline10" class="outline-3">
344
+<h3 id="orgheadline10">On a single board computer (SBC)</h3>
345
+<div class="outline-text-3" id="text-orgheadline10">
346
 <p>
346
 <p>
347
 Currently the following boards are supported:
347
 Currently the following boards are supported:
348
 </p>
348
 </p>
426
 </div>
426
 </div>
427
 </div>
427
 </div>
428
 
428
 
429
-<div id="outline-container-org8cf8e11" class="outline-3">
430
-<h3 id="org8cf8e11">As a Virtual Machine</h3>
431
-<div class="outline-text-3" id="text-org8cf8e11">
429
+<div id="outline-container-orgheadline11" class="outline-3">
430
+<h3 id="orgheadline11">As a Virtual Machine</h3>
431
+<div class="outline-text-3" id="text-orgheadline11">
432
 <p>
432
 <p>
433
 Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
433
 Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
434
 </p>
434
 </p>
450
 </div>
450
 </div>
451
 </div>
451
 </div>
452
 
452
 
453
-<div id="outline-container-org2acc932" class="outline-2">
454
-<h2 id="org2acc932">Social Key Management - the 'Unforgettable Key'</h2>
455
-<div class="outline-text-2" id="text-org2acc932">
453
+<div id="outline-container-orgheadline4" class="outline-2">
454
+<h2 id="orgheadline4">Social Key Management - the 'Unforgettable Key'</h2>
455
+<div class="outline-text-2" id="text-orgheadline4">
456
 <p>
456
 <p>
457
 During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
457
 During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
458
 </p>
458
 </p>
459
 </div>
459
 </div>
460
 
460
 
461
-<div id="outline-container-org67b9067" class="outline-3">
462
-<h3 id="org67b9067">You have the gnupg keyring on an encrypted USB drive</h3>
463
-<div class="outline-text-3" id="text-org67b9067">
461
+<div id="outline-container-orgheadline12" class="outline-3">
462
+<h3 id="orgheadline12">You have the gnupg keyring on an encrypted USB drive</h3>
463
+<div class="outline-text-3" id="text-orgheadline12">
464
 <p>
464
 <p>
465
 If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
465
 If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
466
 </p>
466
 </p>
467
 </div>
467
 </div>
468
 </div>
468
 </div>
469
-<div id="outline-container-org633470b" class="outline-3">
470
-<h3 id="org633470b">You have a number of key fragments on USB drives retrieved from friends</h3>
471
-<div class="outline-text-3" id="text-org633470b">
469
+<div id="outline-container-orgheadline13" class="outline-3">
470
+<h3 id="orgheadline13">You have a number of key fragments on USB drives retrieved from friends</h3>
471
+<div class="outline-text-3" id="text-orgheadline13">
472
 <p>
472
 <p>
473
-If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#orgca4804f">Keydrives</a>.
473
+If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#orgheadline6">Keydrives</a>.
474
 </p>
474
 </p>
475
 </div>
475
 </div>
476
 </div>
476
 </div>
477
-<div id="outline-container-org1fe74d2" class="outline-3">
478
-<h3 id="org1fe74d2">You can specify some ssh login details for friends servers containing key fragments</h3>
479
-<div class="outline-text-3" id="text-org1fe74d2">
477
+<div id="outline-container-orgheadline14" class="outline-3">
478
+<h3 id="orgheadline14">You can specify some ssh login details for friends servers containing key fragments</h3>
479
+<div class="outline-text-3" id="text-orgheadline14">
480
 <p>
480
 <p>
481
 Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
481
 Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
482
 </p>
482
 </p>
483
 </div>
483
 </div>
484
 </div>
484
 </div>
485
 </div>
485
 </div>
486
-<div id="outline-container-org7ba815b" class="outline-2">
487
-<h2 id="org7ba815b">Final Setup</h2>
488
-<div class="outline-text-2" id="text-org7ba815b">
486
+<div id="outline-container-orgheadline5" class="outline-2">
487
+<h2 id="orgheadline5">Final Setup</h2>
488
+<div class="outline-text-2" id="text-orgheadline5">
489
 <p>
489
 <p>
490
 Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
490
 Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
491
 </p>
491
 </p>
598
 </div>
598
 </div>
599
 </div>
599
 </div>
600
 
600
 
601
-<div id="outline-container-orgca4804f" class="outline-2">
602
-<h2 id="orgca4804f">Keydrives</h2>
603
-<div class="outline-text-2" id="text-orgca4804f">
601
+<div id="outline-container-orgheadline6" class="outline-2">
602
+<h2 id="orgheadline6">Keydrives</h2>
603
+<div class="outline-text-2" id="text-orgheadline6">
604
 <p>
604
 <p>
605
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
605
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
606
 </p>
606
 </p>
607
 </div>
607
 </div>
608
-<div id="outline-container-orge7fc013" class="outline-3">
609
-<h3 id="orge7fc013">Master Keydrive</h3>
610
-<div class="outline-text-3" id="text-orge7fc013">
608
+<div id="outline-container-orgheadline15" class="outline-3">
609
+<h3 id="orgheadline15">Master Keydrive</h3>
610
+<div class="outline-text-3" id="text-orgheadline15">
611
 <p>
611
 <p>
612
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
612
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
613
 </p>
613
 </p>
615
 <div class="org-src-container">
615
 <div class="org-src-container">
616
 
616
 
617
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
617
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
618
-sudo control
619
 </pre>
618
 </pre>
620
 </div>
619
 </div>
621
 
620
 
622
 <p>
621
 <p>
623
-Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (master keydrive)</i>.
622
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Backup GPG key to USB (master keydrive)</i>.
624
 </p>
623
 </p>
625
 </div>
624
 </div>
626
 </div>
625
 </div>
627
-<div id="outline-container-orgf721691" class="outline-3">
628
-<h3 id="orgf721691">Fragment keydrives</h3>
629
-<div class="outline-text-3" id="text-orgf721691">
626
+<div id="outline-container-orgheadline16" class="outline-3">
627
+<h3 id="orgheadline16">Fragment keydrives</h3>
628
+<div class="outline-text-3" id="text-orgheadline16">
630
 <p>
629
 <p>
631
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
630
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
632
 </p>
631
 </p>
634
 <div class="org-src-container">
633
 <div class="org-src-container">
635
 
634
 
636
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
635
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
637
-sudo control
638
 </pre>
636
 </pre>
639
 </div>
637
 </div>
640
 
638
 
641
 <p>
639
 <p>
642
-Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (fragment keydrive)</i>.
640
+Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Backup GPG key to USB (fragment keydrive)</i>.
643
 </p>
641
 </p>
644
 
642
 
645
 <p>
643
 <p>
648
 </div>
646
 </div>
649
 </div>
647
 </div>
650
 </div>
648
 </div>
651
-<div id="outline-container-orgb1a9030" class="outline-2">
652
-<h2 id="orgb1a9030">On Client Machines</h2>
653
-<div class="outline-text-2" id="text-orgb1a9030">
649
+<div id="outline-container-orgheadline7" class="outline-2">
650
+<h2 id="orgheadline7">On Client Machines</h2>
651
+<div class="outline-text-2" id="text-orgheadline7">
654
 <p>
652
 <p>
655
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
653
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
656
 </p>
654
 </p>
668
 </div>
666
 </div>
669
 </div>
667
 </div>
670
 
668
 
671
-<div id="outline-container-org6fc0eae" class="outline-2">
672
-<h2 id="org6fc0eae">Administering the system</h2>
673
-<div class="outline-text-2" id="text-org6fc0eae">
669
+<div id="outline-container-orgheadline8" class="outline-2">
670
+<h2 id="orgheadline8">Administering the system</h2>
671
+<div class="outline-text-2" id="text-orgheadline8">
674
 <p>
672
 <p>
675
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
673
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
676
 </p>
674
 </p>
678
 <div class="org-src-container">
676
 <div class="org-src-container">
679
 
677
 
680
 <pre class="src src-bash">ssh myusername@freedombone.local -p 2222
678
 <pre class="src src-bash">ssh myusername@freedombone.local -p 2222
681
-sudo control
682
 </pre>
679
 </pre>
683
 </div>
680
 </div>
684
 
681
 
685
 <p>
682
 <p>
686
-From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
683
+Select <i>Administrator controls</i> then from there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.
687
 </p>
684
 </p>
688
 
685
 
689
 <center>
686
 <center>

+ 5
- 9
website/EN/usage.html Целия файл

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-05 Tue 21:49 -->
6
+<!-- 2016-04-06 Wed 18:59 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
276
 <div class="org-src-container">
276
 <div class="org-src-container">
277
 
277
 
278
 <pre class="src src-bash">ssh username@domain -p 2222
278
 <pre class="src src-bash">ssh username@domain -p 2222
279
-sudo control
280
 </pre>
279
 </pre>
281
 </div>
280
 </div>
282
 
281
 
283
 <p>
282
 <p>
284
-Select <i>Manage Users</i> then <i>Change user ssh public key</i>. Copy and paste the public key here, then exit.
283
+Select <i>Administrator controls</i> then <i>Manage Users</i> then <i>Change user ssh public key</i>. Copy and paste the public key here, then exit.
285
 </p>
284
 </p>
286
 
285
 
287
 <p>
286
 <p>
308
 <div class="org-src-container">
307
 <div class="org-src-container">
309
 
308
 
310
 <pre class="src src-bash">ssh username@freedombone.local -p 2222
309
 <pre class="src src-bash">ssh username@freedombone.local -p 2222
311
-sudo control
312
 </pre>
310
 </pre>
313
 </div>
311
 </div>
314
 
312
 
315
 <p>
313
 <p>
316
-Then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
314
+Select <i>Administrator controls</i> then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
317
 </p>
315
 </p>
318
 
316
 
319
 <div class="org-src-container">
317
 <div class="org-src-container">
585
 <div class="org-src-container">
583
 <div class="org-src-container">
586
 
584
 
587
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
585
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
588
-sudo control
589
 </pre>
586
 </pre>
590
 </div>
587
 </div>
591
 
588
 
592
 <p>
589
 <p>
593
-Select the <b>IRC Menu</b> and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
590
+Select <i>Administrator controls</i> then <b>IRC Menu</b> and then change the password. An empty password will allow anyone to log in, so you can have a globally accessible IRC system if you wish, although you might want to carefully consider whether that's wise.
594
 </p>
591
 </p>
595
 </div>
592
 </div>
596
 </div>
593
 </div>
1018
 <div class="org-src-container">
1015
 <div class="org-src-container">
1019
 
1016
 
1020
 <pre class="src src-bash">ssh username@domainname -p 2222
1017
 <pre class="src src-bash">ssh username@domainname -p 2222
1021
-sudo control
1022
 </pre>
1018
 </pre>
1023
 </div>
1019
 </div>
1024
 
1020
 
1025
 <p>
1021
 <p>
1026
-Then select the <b>About</b> screen.
1022
+Select <i>Administrator controls</i> then select the <b>About</b> screen.
1027
 </p>
1023
 </p>
1028
 
1024
 
1029
 <p>
1025
 <p>

+ 4
- 7
website/EN/usage_email.html Целия файл

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-02-27 Sat 22:12 -->
6
+<!-- 2016-04-06 Wed 18:55 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
948
 <div class="org-src-container">
948
 <div class="org-src-container">
949
 
949
 
950
 <pre class="src src-bash">ssh username@domainname -p 2222
950
 <pre class="src src-bash">ssh username@domainname -p 2222
951
-sudo control
952
 </pre>
951
 </pre>
953
 </div>
952
 </div>
954
 
953
 
955
 <p>
954
 <p>
956
-Select <b>Email filtering rules</b> then <b>Add a user to a mailing list</b>. If you want to do it purely from the commandline then see the manpage for <b>freedombone-addlist</b>.
955
+Select <i>Administrator controls</i> then <b>Email filtering rules</b> then <b>Add a user to a mailing list</b>. If you want to do it purely from the commandline then see the manpage for <b>freedombone-addlist</b>.
957
 </p>
956
 </p>
958
 </div>
957
 </div>
959
 </div>
958
 </div>
967
 <div class="org-src-container">
966
 <div class="org-src-container">
968
 
967
 
969
 <pre class="src src-bash">ssh username@domainname -p 2222
968
 <pre class="src src-bash">ssh username@domainname -p 2222
970
-sudo control
971
 </pre>
969
 </pre>
972
 </div>
970
 </div>
973
 
971
 
974
 <p>
972
 <p>
975
-Select <b>Email filtering rules</b> then <b>Add email rule</b>. To do the same from the commandline see the manpage for <b>freedombone-addemail</b>.
973
+Select <i>Administrator controls</i> then <b>Email filtering rules</b> then <b>Add email rule</b>. To do the same from the commandline see the manpage for <b>freedombone-addemail</b>.
976
 </p>
974
 </p>
977
 </div>
975
 </div>
978
 </div>
976
 </div>
986
 <div class="org-src-container">
984
 <div class="org-src-container">
987
 
985
 
988
 <pre class="src src-bash">ssh username@domainname -p 2222
986
 <pre class="src src-bash">ssh username@domainname -p 2222
989
-sudo control
990
 </pre>
987
 </pre>
991
 </div>
988
 </div>
992
 
989
 
993
 <p>
990
 <p>
994
-Select <b>Email filtering rules</b> then <b>Block/Unblock and email address</b> or <b>Block/Unblock email with subject line</b>. Also see the manpage for <b>freedombone-ignore</b>.
991
+Select <i>Administrator controls</i> then <b>Email filtering rules</b> then <b>Block/Unblock and email address</b> or <b>Block/Unblock email with subject line</b>. Also see the manpage for <b>freedombone-ignore</b>.
995
 </p>
992
 </p>
996
 </div>
993
 </div>
997
 </div>
994
 </div>