Bob Mottram пре 8 година
родитељ
комит
4c8dc03d43
2 измењених фајлова са 25 додато и 25 уклоњено
  1. 3
    3
      doc/EN/mesh.org
  2. 22
    22
      website/EN/mesh.html

+ 3
- 3
doc/EN/mesh.org Прегледај датотеку

32
 sha256sum mesh-client-i386.img.xz
32
 sha256sum mesh-client-i386.img.xz
33
 eaf87dcbb17b7d8328fde56005d396d423e51390e4163385c0ee8cfa0844d6f3
33
 eaf87dcbb17b7d8328fde56005d396d423e51390e4163385c0ee8cfa0844d6f3
34
 unxz mesh-client-i386.img.xz
34
 unxz mesh-client-i386.img.xz
35
-dd bs=1M if=mesh-client-i386.img of=/dev/sdX conv=fdatasync
35
+sudo dd bs=1M if=mesh-client-i386.img of=/dev/sdX conv=fdatasync
36
 #+end_src
36
 #+end_src
37
 
37
 
38
 If you're in an emergency and don't have Atheros wifi dongles then there is also an "insecure" image which contains some proprietary wifi drivers which may work with a wider range of laptops. Proprietary drivers *are not recommended* because they're unsupportable and may be exploitable or contain malicious antifeatures which fundamentally compromise the security of the network. However, the trade-off between security/maintainability and simply having the ability to communicate at all may be a valid one in some situations.
38
 If you're in an emergency and don't have Atheros wifi dongles then there is also an "insecure" image which contains some proprietary wifi drivers which may work with a wider range of laptops. Proprietary drivers *are not recommended* because they're unsupportable and may be exploitable or contain malicious antifeatures which fundamentally compromise the security of the network. However, the trade-off between security/maintainability and simply having the ability to communicate at all may be a valid one in some situations.
45
 sha256sum mesh-client-i386-insecure.img.xz
45
 sha256sum mesh-client-i386-insecure.img.xz
46
 2aa1552d695485505b6a145857e5cebb7dc365dbf9614488f474bf5ac1149473
46
 2aa1552d695485505b6a145857e5cebb7dc365dbf9614488f474bf5ac1149473
47
 unxz mesh-client-i386-insecure.img.xz
47
 unxz mesh-client-i386-insecure.img.xz
48
-dd bs=1M if=mesh-client-i386-insecure.img of=/dev/sdX conv=fdatasync
48
+sudo dd bs=1M if=mesh-client-i386-insecure.img of=/dev/sdX conv=fdatasync
49
 #+end_src
49
 #+end_src
50
 
50
 
51
 ** Router images
51
 ** Router images
59
 sha256sum mesh-router-beaglebone-black.img.xz
59
 sha256sum mesh-router-beaglebone-black.img.xz
60
 7e90e0489eff70d7211b2b9b891ba6da20670bedbbe6db3edbb41bc54f7c8679
60
 7e90e0489eff70d7211b2b9b891ba6da20670bedbbe6db3edbb41bc54f7c8679
61
 unxz mesh-router-beaglebone-black.img.xz
61
 unxz mesh-router-beaglebone-black.img.xz
62
-dd bs=1M if=mesh-router-beaglebone-black.img of=/dev/sdX conv=fdatasync
62
+sudo dd bs=1M if=mesh-router-beaglebone-black.img of=/dev/sdX conv=fdatasync
63
 #+end_src
63
 #+end_src
64
 
64
 
65
 * To build the disk image yourself
65
 * To build the disk image yourself

+ 22
- 22
website/EN/mesh.html Прегледај датотеку

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-08-30 Tue 12:08 -->
6
+<!-- 2016-08-30 Tue 12:12 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
255
 Mesh networks are useful as a quick way to make a fully decentralised communications system which is not connected to or reliant upon the internet. Think festivals, hacker conferences, onboard ships at sea, disaster/war zones, small business internal office communications, protests, remote areas of the world, scientific expeditions and off-world space colonies. All the cool stuff. The down side is that you can't access any internet content. The upside is that you can securely communicate with anyone on the local mesh. No ISPs. No payments or subscriptions beyond the cost of obtaining the hardware. Systems need to be within wifi range of each other for the mesh to be created. It can be an ultra-convenient way to do purely local communications.
255
 Mesh networks are useful as a quick way to make a fully decentralised communications system which is not connected to or reliant upon the internet. Think festivals, hacker conferences, onboard ships at sea, disaster/war zones, small business internal office communications, protests, remote areas of the world, scientific expeditions and off-world space colonies. All the cool stuff. The down side is that you can't access any internet content. The upside is that you can securely communicate with anyone on the local mesh. No ISPs. No payments or subscriptions beyond the cost of obtaining the hardware. Systems need to be within wifi range of each other for the mesh to be created. It can be an ultra-convenient way to do purely local communications.
256
 </p>
256
 </p>
257
 
257
 
258
-<div id="outline-container-orgce690b1" class="outline-2">
259
-<h2 id="orgce690b1">Ready made images</h2>
260
-<div class="outline-text-2" id="text-orgce690b1">
261
-</div><div id="outline-container-org61d550d" class="outline-3">
262
-<h3 id="org61d550d">Client images</h3>
263
-<div class="outline-text-3" id="text-org61d550d">
258
+<div id="outline-container-org59390a7" class="outline-2">
259
+<h2 id="org59390a7">Ready made images</h2>
260
+<div class="outline-text-2" id="text-org59390a7">
261
+</div><div id="outline-container-orgce93d95" class="outline-3">
262
+<h3 id="orgce93d95">Client images</h3>
263
+<div class="outline-text-3" id="text-orgce93d95">
264
 <p>
264
 <p>
265
 "Client" isn't exactly the right term, but it's a mesh peer with a user interface. These images can be copied to a USB drive, then you can plug it into a laptop/netbook/desktop machine and boot from it. You will probably also need an Atheros USB wifi dongle, because most built-in wifi usually requires proprietary firmware. In the commands below substitute /dev/sdX with the USB drive device, excluding any trailing numbers (eg. /dev/sdb).
265
 "Client" isn't exactly the right term, but it's a mesh peer with a user interface. These images can be copied to a USB drive, then you can plug it into a laptop/netbook/desktop machine and boot from it. You will probably also need an Atheros USB wifi dongle, because most built-in wifi usually requires proprietary firmware. In the commands below substitute /dev/sdX with the USB drive device, excluding any trailing numbers (eg. /dev/sdb).
266
 </p>
266
 </p>
274
 sha256sum mesh-client-i386.img.xz
274
 sha256sum mesh-client-i386.img.xz
275
 eaf87dcbb17b7d8328fde56005d396d423e51390e4163385c0ee8cfa0844d6f3
275
 eaf87dcbb17b7d8328fde56005d396d423e51390e4163385c0ee8cfa0844d6f3
276
 unxz mesh-client-i386.img.xz
276
 unxz mesh-client-i386.img.xz
277
-dd <span class="org-variable-name">bs</span>=1M <span class="org-variable-name">if</span>=mesh-client-i386.img <span class="org-variable-name">of</span>=/dev/sdX <span class="org-variable-name">conv</span>=fdatasync
277
+sudo dd <span class="org-variable-name">bs</span>=1M <span class="org-variable-name">if</span>=mesh-client-i386.img <span class="org-variable-name">of</span>=/dev/sdX <span class="org-variable-name">conv</span>=fdatasync
278
 </pre>
278
 </pre>
279
 </div>
279
 </div>
280
 
280
 
291
 sha256sum mesh-client-i386-insecure.img.xz
291
 sha256sum mesh-client-i386-insecure.img.xz
292
 2aa1552d695485505b6a145857e5cebb7dc365dbf9614488f474bf5ac1149473
292
 2aa1552d695485505b6a145857e5cebb7dc365dbf9614488f474bf5ac1149473
293
 unxz mesh-client-i386-insecure.img.xz
293
 unxz mesh-client-i386-insecure.img.xz
294
-dd <span class="org-variable-name">bs</span>=1M <span class="org-variable-name">if</span>=mesh-client-i386-insecure.img <span class="org-variable-name">of</span>=/dev/sdX <span class="org-variable-name">conv</span>=fdatasync
294
+sudo dd <span class="org-variable-name">bs</span>=1M <span class="org-variable-name">if</span>=mesh-client-i386-insecure.img <span class="org-variable-name">of</span>=/dev/sdX <span class="org-variable-name">conv</span>=fdatasync
295
 </pre>
295
 </pre>
296
 </div>
296
 </div>
297
 </div>
297
 </div>
298
 </div>
298
 </div>
299
 
299
 
300
-<div id="outline-container-org474f6d9" class="outline-3">
301
-<h3 id="org474f6d9">Router images</h3>
302
-<div class="outline-text-3" id="text-org474f6d9">
300
+<div id="outline-container-org8e8605a" class="outline-3">
301
+<h3 id="org8e8605a">Router images</h3>
302
+<div class="outline-text-3" id="text-org8e8605a">
303
 <p>
303
 <p>
304
 Routers are intended to build network coverage for an area using small and low cost hardware. You can bolt them to walls or leave them on window ledges. They don't have any user interface and their only job is to move network traffic across the mesh. Copy the image to a microSD card and insert it into the router, plug in an Atheros wifi dongle and power on. That should be all you need to do.
304
 Routers are intended to build network coverage for an area using small and low cost hardware. You can bolt them to walls or leave them on window ledges. They don't have any user interface and their only job is to move network traffic across the mesh. Copy the image to a microSD card and insert it into the router, plug in an Atheros wifi dongle and power on. That should be all you need to do.
305
 </p>
305
 </p>
306
 </div>
306
 </div>
307
-<div id="outline-container-org82dc517" class="outline-4">
308
-<h4 id="org82dc517">Beaglebone Black</h4>
309
-<div class="outline-text-4" id="text-org82dc517">
307
+<div id="outline-container-orgf61da6a" class="outline-4">
308
+<h4 id="orgf61da6a">Beaglebone Black</h4>
309
+<div class="outline-text-4" id="text-orgf61da6a">
310
 <div class="org-src-container">
310
 <div class="org-src-container">
311
 
311
 
312
 <pre class="src src-bash">sudo apt-get install xz-utils wget
312
 <pre class="src src-bash">sudo apt-get install xz-utils wget
316
 sha256sum mesh-router-beaglebone-black.img.xz
316
 sha256sum mesh-router-beaglebone-black.img.xz
317
 7e90e0489eff70d7211b2b9b891ba6da20670bedbbe6db3edbb41bc54f7c8679
317
 7e90e0489eff70d7211b2b9b891ba6da20670bedbbe6db3edbb41bc54f7c8679
318
 unxz mesh-router-beaglebone-black.img.xz
318
 unxz mesh-router-beaglebone-black.img.xz
319
-dd <span class="org-variable-name">bs</span>=1M <span class="org-variable-name">if</span>=mesh-router-beaglebone-black.img <span class="org-variable-name">of</span>=/dev/sdX <span class="org-variable-name">conv</span>=fdatasync
319
+sudo dd <span class="org-variable-name">bs</span>=1M <span class="org-variable-name">if</span>=mesh-router-beaglebone-black.img <span class="org-variable-name">of</span>=/dev/sdX <span class="org-variable-name">conv</span>=fdatasync
320
 </pre>
320
 </pre>
321
 </div>
321
 </div>
322
 </div>
322
 </div>
324
 </div>
324
 </div>
325
 </div>
325
 </div>
326
 
326
 
327
-<div id="outline-container-org1106e17" class="outline-2">
328
-<h2 id="org1106e17">To build the disk image yourself</h2>
329
-<div class="outline-text-2" id="text-org1106e17">
327
+<div id="outline-container-org810e525" class="outline-2">
328
+<h2 id="org810e525">To build the disk image yourself</h2>
329
+<div class="outline-text-2" id="text-org810e525">
330
 <p>
330
 <p>
331
 It's better not to trust images downloaded from random places on the interwebs. Chances are that unless you are in the web of trust of the above GPG signatures then they don't mean very much to you. If you actually want something trustworthy then build the images from scratch. It will take some time. Here's how to do it.
331
 It's better not to trust images downloaded from random places on the interwebs. Chances are that unless you are in the web of trust of the above GPG signatures then they don't mean very much to you. If you actually want something trustworthy then build the images from scratch. It will take some time. Here's how to do it.
332
 </p>
332
 </p>
427
 </div>
427
 </div>
428
 </div>
428
 </div>
429
 
429
 
430
-<div id="outline-container-orgd1f0320" class="outline-2">
431
-<h2 id="orgd1f0320">How to use it</h2>
432
-<div class="outline-text-2" id="text-orgd1f0320">
430
+<div id="outline-container-org53c34a1" class="outline-2">
431
+<h2 id="org53c34a1">How to use it</h2>
432
+<div class="outline-text-2" id="text-org53c34a1">
433
 <p>
433
 <p>
434
 When you first boot from the USB drive the system will create some encryption keys, assign a unique network address to the system and then reboot itself. When that's done you should see a prompt asking for a username. This username just makes it easy for others to initially find you on the mesh and will appear in the list of users.
434
 When you first boot from the USB drive the system will create some encryption keys, assign a unique network address to the system and then reboot itself. When that's done you should see a prompt asking for a username. This username just makes it easy for others to initially find you on the mesh and will appear in the list of users.
435
 </p>
435
 </p>