Преглед изворни кода

Self signed certs are not almost entirely replaced by letsencrypt

Bob Mottram пре 7 година
родитељ
комит
58a8c2b2f2
2 измењених фајлова са 148 додато и 176 уклоњено
  1. 0
    8
      doc/EN/faq.org
  2. 148
    168
      website/EN/faq.html

+ 0
- 8
doc/EN/faq.org Прегледај датотеку

@@ -42,7 +42,6 @@
42 42
 | [[How do I get a "real" SSL/TLS/HTTPS certificate?]]                                          |
43 43
 | [[How do I renew a Let's Encrypt certificate?]]                                               |
44 44
 | [[I tried to renew a Let's Encrypt certificate and it failed. What should I do?]]             |
45
-| [[Why use self-signed certificates?]]                                                         |
46 45
 | [[Why not use the services of $company instead? They took the Seppuku pledge]]                |
47 46
 | [[Why does my email keep getting rejected as spam by Gmail/etc?]]                             |
48 47
 | [[Tor is censored/blocked in my area. What can I do?]]                                        |
@@ -288,13 +287,6 @@ ssh username@mydomainname -p 2222
288 287
 #+end_src
289 288
 
290 289
 Select /Administrator controls/ then *Security settings* then *Create a new Let's Encrypt certificate*.
291
-* Why use self-signed certificates?
292
-Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up /scary-scary looking/ browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is /no certainty about who that connection is with/. They probably will protect the content of your communications from passive bulk interception - such as the tapping of under-sea cables.
293
-
294
-The current strategy on this system is to typically create self-signed certificates during the initial installation but also to have the ability to easily convert those to LetsEncrypt certificates via the security settings on the administrator control panel.
295
-
296
-You might say, /"but surely LetsEncrypt is a single point of failure!"/, and you'd be right. Maybe at some point in future LetsEncrypt is no longer a thing, or no longer considered sufficiently secure. That's why building in total dependence upon one organisation is a bad idea, and it's still possible to have self-signed certs as a fallback option.
297
-
298 290
 * Why not use the services of $company instead? They took the Seppuku pledge
299 291
 [[https://cryptostorm.org/viewtopic.php?f=63&t=2954&sid=7de2d1e699cfde2f574e6a7f6ea5a173][That pledge]] is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "/on our side/". Post-[[https://en.wikipedia.org/wiki/Nymwars][nymwars]] and post-[[https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29][PRISM]] we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
300 292
 * Why does my email keep getting rejected as spam by Gmail/etc?

+ 148
- 168
website/EN/faq.html Прегледај датотеку

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2017-01-13 Fri 20:18 -->
6
+<!-- 2017-05-10 Wed 21:46 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -71,6 +71,7 @@
71 71
   pre.src-fortran:before { content: 'Fortran'; }
72 72
   pre.src-gnuplot:before { content: 'gnuplot'; }
73 73
   pre.src-haskell:before { content: 'Haskell'; }
74
+  pre.src-hledger:before { content: 'hledger'; }
74 75
   pre.src-java:before { content: 'Java'; }
75 76
   pre.src-js:before { content: 'Javascript'; }
76 77
   pre.src-latex:before { content: 'LaTeX'; }
@@ -188,7 +189,7 @@
188 189
 @licstart  The following is the entire license notice for the
189 190
 JavaScript code in this tag.
190 191
 
191
-Copyright (C) 2012-2013 Free Software Foundation, Inc.
192
+Copyright (C) 2012-2017 Free Software Foundation, Inc.
192 193
 
193 194
 The JavaScript code in this tag is free software: you can
194 195
 redistribute it and/or modify it under the terms of the GNU
@@ -256,31 +257,31 @@ for the JavaScript code in this tag.
256 257
 </colgroup>
257 258
 <tbody>
258 259
 <tr>
259
-<td class="org-left"><a href="#org152c01e">What applications are supported?</a></td>
260
+<td class="org-left"><a href="#org4b81665">What applications are supported?</a></td>
260 261
 </tr>
261 262
 
262 263
 <tr>
263
-<td class="org-left"><a href="#orge58a476">I don't have a static IP address. Can I still install this system?</a></td>
264
+<td class="org-left"><a href="#org2bc613d">I don't have a static IP address. Can I still install this system?</a></td>
264 265
 </tr>
265 266
 
266 267
 <tr>
267
-<td class="org-left"><a href="#org887f08c">Why Freedombone and not FreedomBox?</a></td>
268
+<td class="org-left"><a href="#orgbf5770e">Why Freedombone and not FreedomBox?</a></td>
268 269
 </tr>
269 270
 
270 271
 <tr>
271
-<td class="org-left"><a href="#orgd9d3a07">Why not support building images for Raspberry Pi?</a></td>
272
+<td class="org-left"><a href="#org863a0e1">Why not support building images for Raspberry Pi?</a></td>
272 273
 </tr>
273 274
 
274 275
 <tr>
275
-<td class="org-left"><a href="#orgaf62a96">Why use Tor? I've heard it's used by bad people</a></td>
276
+<td class="org-left"><a href="#org45768d6">Why use Tor? I've heard it's used by bad people</a></td>
276 277
 </tr>
277 278
 
278 279
 <tr>
279
-<td class="org-left"><a href="#org8cb7986">Why use Github?</a></td>
280
+<td class="org-left"><a href="#org627e8cb">Why use Github?</a></td>
280 281
 </tr>
281 282
 
282 283
 <tr>
283
-<td class="org-left"><a href="#org56e5307">Keys and emails should not be stored on servers. Why do you do that?</a></td>
284
+<td class="org-left"><a href="#orgee8c834">Keys and emails should not be stored on servers. Why do you do that?</a></td>
284 285
 </tr>
285 286
 
286 287
 <tr>
@@ -288,103 +289,99 @@ for the JavaScript code in this tag.
288 289
 </tr>
289 290
 
290 291
 <tr>
291
-<td class="org-left"><a href="#orgb1eccdb">Why can't I access my .onion site with a Tor browser?</a></td>
292
+<td class="org-left"><a href="#orgd255016">Why can't I access my .onion site with a Tor browser?</a></td>
292 293
 </tr>
293 294
 
294 295
 <tr>
295
-<td class="org-left"><a href="#org49afd25">What is the best hardware to run this system on?</a></td>
296
+<td class="org-left"><a href="#org265fd3a">What is the best hardware to run this system on?</a></td>
296 297
 </tr>
297 298
 
298 299
 <tr>
299
-<td class="org-left"><a href="#org1fb0185">Can I add more users to the system?</a></td>
300
+<td class="org-left"><a href="#org0340263">Can I add more users to the system?</a></td>
300 301
 </tr>
301 302
 
302 303
 <tr>
303
-<td class="org-left"><a href="#org977239a">Why not use Signal for mobile chat?</a></td>
304
+<td class="org-left"><a href="#org3864faa">Why not use Signal for mobile chat?</a></td>
304 305
 </tr>
305 306
 
306 307
 <tr>
307
-<td class="org-left"><a href="#orgf19cdf2">What is the most secure chat app to use on mobile?</a></td>
308
+<td class="org-left"><a href="#org747810a">What is the most secure chat app to use on mobile?</a></td>
308 309
 </tr>
309 310
 
310 311
 <tr>
311
-<td class="org-left"><a href="#org1dabdc8">How do I remove a user from the system?</a></td>
312
+<td class="org-left"><a href="#org1f21c64">How do I remove a user from the system?</a></td>
312 313
 </tr>
313 314
 
314 315
 <tr>
315
-<td class="org-left"><a href="#orga9398fd">Why is logging for web sites turned off by default?</a></td>
316
+<td class="org-left"><a href="#orgdc7565d">Why is logging for web sites turned off by default?</a></td>
316 317
 </tr>
317 318
 
318 319
 <tr>
319
-<td class="org-left"><a href="#org656ec9d">How do I reset the tripwire?</a></td>
320
+<td class="org-left"><a href="#org6690f18">How do I reset the tripwire?</a></td>
320 321
 </tr>
321 322
 
322 323
 <tr>
323
-<td class="org-left"><a href="#org34e8825">Is metadata protected?</a></td>
324
+<td class="org-left"><a href="#org5910085">Is metadata protected?</a></td>
324 325
 </tr>
325 326
 
326 327
 <tr>
327
-<td class="org-left"><a href="#org6a93669">How do I create email processing rules?</a></td>
328
+<td class="org-left"><a href="#org281cbc7">How do I create email processing rules?</a></td>
328 329
 </tr>
329 330
 
330 331
 <tr>
331
-<td class="org-left"><a href="#orgcfb72a5">Why isn't dynamic DNS working?</a></td>
332
+<td class="org-left"><a href="#orgceb4e2a">Why isn't dynamic DNS working?</a></td>
332 333
 </tr>
333 334
 
334 335
 <tr>
335
-<td class="org-left"><a href="#orgbe6bcbf">How do I change my encryption settings?</a></td>
336
+<td class="org-left"><a href="#org461598b">How do I change my encryption settings?</a></td>
336 337
 </tr>
337 338
 
338 339
 <tr>
339
-<td class="org-left"><a href="#orgb2c6dc5">How do I get a domain name?</a></td>
340
+<td class="org-left"><a href="#org725bf9e">How do I get a domain name?</a></td>
340 341
 </tr>
341 342
 
342 343
 <tr>
343
-<td class="org-left"><a href="#org5e04c0e">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
344
+<td class="org-left"><a href="#orgb611e68">How do I get a "real" SSL/TLS/HTTPS certificate?</a></td>
344 345
 </tr>
345 346
 
346 347
 <tr>
347
-<td class="org-left"><a href="#orgc2a5392">How do I renew a Let's Encrypt certificate?</a></td>
348
+<td class="org-left"><a href="#org9ebb9ee">How do I renew a Let's Encrypt certificate?</a></td>
348 349
 </tr>
349 350
 
350 351
 <tr>
351
-<td class="org-left"><a href="#org93cd052">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
352
+<td class="org-left"><a href="#org796ff88">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</a></td>
352 353
 </tr>
353 354
 
354 355
 <tr>
355
-<td class="org-left"><a href="#org778edeb">Why use self-signed certificates?</a></td>
356
+<td class="org-left"><a href="#org3d4f550">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
356 357
 </tr>
357 358
 
358 359
 <tr>
359
-<td class="org-left"><a href="#org70ac6f1">Why not use the services of $company instead? They took the Seppuku pledge</a></td>
360
+<td class="org-left"><a href="#org4df20f5">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
360 361
 </tr>
361 362
 
362 363
 <tr>
363
-<td class="org-left"><a href="#orged33b88">Why does my email keep getting rejected as spam by Gmail/etc?</a></td>
364
+<td class="org-left"><a href="#orga4c748f">Tor is censored/blocked in my area. What can I do?</a></td>
364 365
 </tr>
365 366
 
366 367
 <tr>
367
-<td class="org-left"><a href="#org54bef54">Tor is censored/blocked in my area. What can I do?</a></td>
368
-</tr>
369
-
370
-<tr>
371
-<td class="org-left"><a href="#org4779eb1">I want to block a particular domain from getting its content into my social network sites</a></td>
368
+<td class="org-left"><a href="#org3b48bfa">I want to block a particular domain from getting its content into my social network sites</a></td>
372 369
 </tr>
373 370
 </tbody>
374 371
 </table>
375 372
 </div>
376 373
 
377
-<div id="outline-container-org152c01e" class="outline-2">
378
-<h2 id="org152c01e">What applications are supported?</h2>
379
-<div class="outline-text-2" id="text-org152c01e">
374
+<div id="outline-container-org4b81665" class="outline-2">
375
+<h2 id="org4b81665">What applications are supported?</h2>
376
+<div class="outline-text-2" id="text-org4b81665">
380 377
 <p>
381 378
 <a href="./apps.html">See here</a> for the complete list of apps. In addition to those as part of the base install you get an email server.
382 379
 </p>
383 380
 </div>
384 381
 </div>
385
-<div id="outline-container-orge58a476" class="outline-2">
386
-<h2 id="orge58a476">I don't have a static IP address. Can I still install this system?</h2>
387
-<div class="outline-text-2" id="text-orge58a476">
382
+<div id="outline-container-org2bc613d" class="outline-2">
383
+<h2 id="org2bc613d">I don't have a static IP address. Can I still install this system?</h2>
384
+<div class="outline-text-2" id="text-org2bc613d">
388 385
 <p>
389 386
 Yes. The minimum requirements are to have some hardware that you can install Debian onto and also that you have administrator access to your internet router so that you can forward ports to the system which has Freedombone installed.
390 387
 </p>
@@ -394,17 +391,17 @@ The lack of a static IP address can be worked around by using a dynamic DNS serv
394 391
 </p>
395 392
 </div>
396 393
 </div>
397
-<div id="outline-container-org887f08c" class="outline-2">
398
-<h2 id="org887f08c">Why Freedombone and not FreedomBox?</h2>
399
-<div class="outline-text-2" id="text-org887f08c">
394
+<div id="outline-container-orgbf5770e" class="outline-2">
395
+<h2 id="orgbf5770e">Why Freedombone and not FreedomBox?</h2>
396
+<div class="outline-text-2" id="text-orgbf5770e">
400 397
 <p>
401 398
 When the project began in late 2013 the FreedomBox project seemed to be going nowhere, and was only designed to work with the DreamPlug hardware. There was some new hardware out - the Beaglebone Black - which could run Debian and was also a free hardware design so seemed more appropriate. Hence the name "Freedombone", being like FreedomBox but on a Beaglebone. There are some similarities and differences between the two projects:
402 399
 </p>
403 400
 </div>
404 401
 
405
-<div id="outline-container-org3b6bb22" class="outline-3">
406
-<h3 id="org3b6bb22">Similarities</h3>
407
-<div class="outline-text-3" id="text-org3b6bb22">
402
+<div id="outline-container-org83acd37" class="outline-3">
403
+<h3 id="org83acd37">Similarities</h3>
404
+<div class="outline-text-3" id="text-org83acd37">
408 405
 <ul class="org-ul">
409 406
 <li>Uses freedom-maker and vmdebootstrap to build debian images</li>
410 407
 <li>Supports the use of Tor onion addresses to access websites</li>
@@ -418,9 +415,9 @@ When the project began in late 2013 the FreedomBox project seemed to be going no
418 415
 </ul>
419 416
 </div>
420 417
 </div>
421
-<div id="outline-container-org76cd986" class="outline-3">
422
-<h3 id="org76cd986">Differences</h3>
423
-<div class="outline-text-3" id="text-org76cd986">
418
+<div id="outline-container-org0cf9248" class="outline-3">
419
+<h3 id="org0cf9248">Differences</h3>
420
+<div class="outline-text-3" id="text-org0cf9248">
424 421
 <ul class="org-ul">
425 422
 <li>FreedomBox is a Debian pure blend. Freedombone is not</li>
426 423
 <li>Freedombone only supports Free Software. FreedomBox includes some closed binary boot blobs for certain ARM boards</li>
@@ -435,9 +432,9 @@ When the project began in late 2013 the FreedomBox project seemed to be going no
435 432
 </div>
436 433
 </div>
437 434
 </div>
438
-<div id="outline-container-orgd9d3a07" class="outline-2">
439
-<h2 id="orgd9d3a07">Why not support building images for Raspberry Pi?</h2>
440
-<div class="outline-text-2" id="text-orgd9d3a07">
435
+<div id="outline-container-org863a0e1" class="outline-2">
436
+<h2 id="org863a0e1">Why not support building images for Raspberry Pi?</h2>
437
+<div class="outline-text-2" id="text-org863a0e1">
441 438
 <p>
442 439
 The FreedomBox project supports Raspberry Pi builds, and the image build system for Freedombone is based on the same system. However, although the Raspberry Pi can run a version of Debian it requires a closed proprietary blob in order to boot the hardware. Who knows what that blob might contain or what exploits it could facilitate. From an adversarial point of view if you were trying to deliver "bulk equipment interference" then it doesn't get any better than piggybacking on something which has control of the boot process, and hence all subsequently run processes.
443 440
 </p>
@@ -447,9 +444,9 @@ So although the Raspberry Pi is cheap and hugely popular it's not supported by t
447 444
 </p>
448 445
 </div>
449 446
 </div>
450
-<div id="outline-container-orgaf62a96" class="outline-2">
451
-<h2 id="orgaf62a96">Why use Tor? I've heard it's used by bad people</h2>
452
-<div class="outline-text-2" id="text-orgaf62a96">
447
+<div id="outline-container-org45768d6" class="outline-2">
448
+<h2 id="org45768d6">Why use Tor? I've heard it's used by bad people</h2>
449
+<div class="outline-text-2" id="text-org45768d6">
453 450
 <p>
454 451
 Before you run screaming for the hills based upon whatever scare story you may have just read in the mainstream media there are a few things worthy of consideration. Tor is installed by default on Freedombone, <i>but not as a relay or exit node</i>. It's only used to provide onion addresses so that this gives you or the viewers of your sites some choice about how they access the information. It also allows you to subscribe to and read RSS feeds privately.
455 452
 </p>
@@ -467,9 +464,9 @@ The media may also have sold you torrid tales about individual Tor project devel
467 464
 </p>
468 465
 </div>
469 466
 </div>
470
-<div id="outline-container-org8cb7986" class="outline-2">
471
-<h2 id="org8cb7986">Why use Github?</h2>
472
-<div class="outline-text-2" id="text-org8cb7986">
467
+<div id="outline-container-org627e8cb" class="outline-2">
468
+<h2 id="org627e8cb">Why use Github?</h2>
469
+<div class="outline-text-2" id="text-org627e8cb">
473 470
 <p>
474 471
 Github is paradoxically a centralized, closed and proprietary system which happens to mostly host free and open source projects. Up until now it has been relatively benign, but at some point in the name of "growth" it will likely start becoming more evil, or just become like SourceForge - which was also once much loved by FOSS developers, but turned into a den of malvertizing.
475 472
 </p>
@@ -487,9 +484,9 @@ Currently many of the repositories used for applications which are not yet packa
487 484
 </p>
488 485
 </div>
489 486
 </div>
490
-<div id="outline-container-org56e5307" class="outline-2">
491
-<h2 id="org56e5307">Keys and emails should not be stored on servers. Why do you do that?</h2>
492
-<div class="outline-text-2" id="text-org56e5307">
487
+<div id="outline-container-orgee8c834" class="outline-2">
488
+<h2 id="orgee8c834">Keys and emails should not be stored on servers. Why do you do that?</h2>
489
+<div class="outline-text-2" id="text-orgee8c834">
493 490
 <p>
494 491
 Ordinarily this is good advice. However, the threat model for a device in your home is different from the one for a generic server in a massive warehouse. Compare and contrast:
495 492
 </p>
@@ -547,9 +544,9 @@ In the home environment a box with a good firewall and no GUI components install
547 544
 </div>
548 545
 </div>
549 546
 
550
-<div id="outline-container-orgb1eccdb" class="outline-2">
551
-<h2 id="orgb1eccdb">Why can't I access my .onion site with a Tor browser?</h2>
552
-<div class="outline-text-2" id="text-orgb1eccdb">
547
+<div id="outline-container-orgd255016" class="outline-2">
548
+<h2 id="orgd255016">Why can't I access my .onion site with a Tor browser?</h2>
549
+<div class="outline-text-2" id="text-orgd255016">
553 550
 <p>
554 551
 Probably you need to add the site to the NoScript whitelist. Typically click/press on the noscript icon (or select from the menu on mobile) then select <i>whitelist</i> and add the site URL. You may also need to disable HTTPS Everywhere when using onion addresses, which don't use https.
555 552
 </p>
@@ -559,9 +556,9 @@ Another factor to be aware of is that it can take a while for the onion address
559 556
 </p>
560 557
 </div>
561 558
 </div>
562
-<div id="outline-container-org49afd25" class="outline-2">
563
-<h2 id="org49afd25">What is the best hardware to run this system on?</h2>
564
-<div class="outline-text-2" id="text-org49afd25">
559
+<div id="outline-container-org265fd3a" class="outline-2">
560
+<h2 id="org265fd3a">What is the best hardware to run this system on?</h2>
561
+<div class="outline-text-2" id="text-org265fd3a">
565 562
 <p>
566 563
 It was originally designed to run on the Beaglebone Black, but that should be regarded as the most minimal system, because it's single core and has by today's standards a small amount of memory. Obviously the more powerful the hardware is the faster things like web pages (blog, social networking, etc) will be served but the more electricity such a system will require if you're running it 24/7. A good compromise between performance and energy consumption is something like an old netbook. The battery of an old netbook or laptop even gives you <a href="https://en.wikipedia.org/wiki/Uninterruptible_power_supply">UPS capability</a> to keep the system going during brief power outages or cable re-arrangements, and that means using full disk encryption on the server also becomes more practical.
567 564
 </p>
@@ -571,16 +568,16 @@ It was originally designed to run on the Beaglebone Black, but that should be re
571 568
 </p>
572 569
 </div>
573 570
 </div>
574
-<div id="outline-container-org1fb0185" class="outline-2">
575
-<h2 id="org1fb0185">Can I add more users to the system?</h2>
576
-<div class="outline-text-2" id="text-org1fb0185">
571
+<div id="outline-container-org0340263" class="outline-2">
572
+<h2 id="org0340263">Can I add more users to the system?</h2>
573
+<div class="outline-text-2" id="text-org0340263">
577 574
 <p>
578 575
 Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those).
579 576
 </p>
580 577
 
581 578
 <div class="org-src-container">
582
-<pre class="src src-bash">ssh username@mydomainname -p 2222
583
-</pre>
579
+<pre><code class="src src-bash">ssh username@mydomainname -p 2222
580
+</code></pre>
584 581
 </div>
585 582
 
586 583
 <p>
@@ -596,9 +593,9 @@ Another point is that Freedombone installations are not intended to support many
596 593
 </p>
597 594
 </div>
598 595
 </div>
599
-<div id="outline-container-org977239a" class="outline-2">
600
-<h2 id="org977239a">Why not use Signal for mobile chat?</h2>
601
-<div class="outline-text-2" id="text-org977239a">
596
+<div id="outline-container-org3864faa" class="outline-2">
597
+<h2 id="org3864faa">Why not use Signal for mobile chat?</h2>
598
+<div class="outline-text-2" id="text-org3864faa">
602 599
 <p>
603 600
 Celebrities recommend Signal. It's Free Software so it must be good, right?
604 601
 </p>
@@ -621,9 +618,9 @@ To give credit where it's due Signal is good, but it could be a lot better. The
621 618
 </p>
622 619
 </div>
623 620
 </div>
624
-<div id="outline-container-orgf19cdf2" class="outline-2">
625
-<h2 id="orgf19cdf2">What is the most secure chat app to use on mobile?</h2>
626
-<div class="outline-text-2" id="text-orgf19cdf2">
621
+<div id="outline-container-org747810a" class="outline-2">
622
+<h2 id="org747810a">What is the most secure chat app to use on mobile?</h2>
623
+<div class="outline-text-2" id="text-org747810a">
627 624
 <p>
628 625
 On mobile there are various options. The apps which are likely to be most secure are ones which have end-to-end encryption enabled by default and which can also be onion routed via Orbot. End-to-end encryption secures the content of the message and onion routing obscures the metadata, making it hard for a passive adversary to know who is communicating with who.
629 626
 </p>
@@ -633,20 +630,20 @@ The current safest way to chat is to use <a href="https://conversations.im">Conv
633 630
 </p>
634 631
 
635 632
 <p>
636
-There are many <a href="#org977239a">other fashionable chat apps</a> with end-to-end security, but often they are closed source, have a single central server or can't be onion routed. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently verified.
633
+There are many <a href="#org3864faa">other fashionable chat apps</a> with end-to-end security, but often they are closed source, have a single central server or can't be onion routed. It's also important to remember that closed source chat apps should be assumed to be untrustworthy, since their security cannot be independently verified.
637 634
 </p>
638 635
 </div>
639 636
 </div>
640
-<div id="outline-container-org1dabdc8" class="outline-2">
641
-<h2 id="org1dabdc8">How do I remove a user from the system?</h2>
642
-<div class="outline-text-2" id="text-org1dabdc8">
637
+<div id="outline-container-org1f21c64" class="outline-2">
638
+<h2 id="org1f21c64">How do I remove a user from the system?</h2>
639
+<div class="outline-text-2" id="text-org1f21c64">
643 640
 <p>
644 641
 To remove a user:
645 642
 </p>
646 643
 
647 644
 <div class="org-src-container">
648
-<pre class="src src-bash">ssh username@mydomainname -p 2222
649
-</pre>
645
+<pre><code class="src src-bash">ssh username@mydomainname -p 2222
646
+</code></pre>
650 647
 </div>
651 648
 
652 649
 <p>
@@ -654,9 +651,9 @@ Select <i>Administrator controls</i> then <i>Manage Users</i> and then <i>Delete
654 651
 </p>
655 652
 </div>
656 653
 </div>
657
-<div id="outline-container-orga9398fd" class="outline-2">
658
-<h2 id="orga9398fd">Why is logging for web sites turned off by default?</h2>
659
-<div class="outline-text-2" id="text-orga9398fd">
654
+<div id="outline-container-orgdc7565d" class="outline-2">
655
+<h2 id="orgdc7565d">Why is logging for web sites turned off by default?</h2>
656
+<div class="outline-text-2" id="text-orgdc7565d">
660 657
 <p>
661 658
 If you're making profits out of the logs by running large server warehouses and then data mining what users click on - as is the business model of well known internet companies - then logging everything makes total sense. However, if you're running a home server then logging really only makes sense if you're trying to diagnose some specific problem with the system, and outside of that context logging everything becomes more of a liability than an asset.
662 659
 </p>
@@ -670,16 +667,16 @@ On the Freedombone system web logs containing IP addresses are turned off by def
670 667
 </p>
671 668
 </div>
672 669
 </div>
673
-<div id="outline-container-org656ec9d" class="outline-2">
674
-<h2 id="org656ec9d">How do I reset the tripwire?</h2>
675
-<div class="outline-text-2" id="text-org656ec9d">
670
+<div id="outline-container-org6690f18" class="outline-2">
671
+<h2 id="org6690f18">How do I reset the tripwire?</h2>
672
+<div class="outline-text-2" id="text-org6690f18">
676 673
 <p>
677 674
 The tripwire will be automatically reset once per week. If you want to reset it earlier then do the following:
678 675
 </p>
679 676
 
680 677
 <div class="org-src-container">
681
-<pre class="src src-bash">ssh username@mydomain -p 2222
682
-</pre>
678
+<pre><code class="src src-bash">ssh username@mydomain -p 2222
679
+</code></pre>
683 680
 </div>
684 681
 
685 682
 <p>
@@ -687,9 +684,9 @@ Select <i>Administrator controls</i> then "reset tripwire" using cursors and spa
687 684
 </p>
688 685
 </div>
689 686
 </div>
690
-<div id="outline-container-org34e8825" class="outline-2">
691
-<h2 id="org34e8825">Is metadata protected?</h2>
692
-<div class="outline-text-2" id="text-org34e8825">
687
+<div id="outline-container-org5910085" class="outline-2">
688
+<h2 id="org5910085">Is metadata protected?</h2>
689
+<div class="outline-text-2" id="text-org5910085">
693 690
 <blockquote>
694 691
 <p>
695 692
 "<i>We kill people based on metadata</i>"
@@ -705,12 +702,12 @@ Even when using Freedombone metadata analysis by third parties is still possible
705 702
 </p>
706 703
 </div>
707 704
 </div>
708
-<div id="outline-container-org6a93669" class="outline-2">
709
-<h2 id="org6a93669">How do I create email processing rules?</h2>
710
-<div class="outline-text-2" id="text-org6a93669">
705
+<div id="outline-container-org281cbc7" class="outline-2">
706
+<h2 id="org281cbc7">How do I create email processing rules?</h2>
707
+<div class="outline-text-2" id="text-org281cbc7">
711 708
 <div class="org-src-container">
712
-<pre class="src src-bash">ssh username@domainname -p 2222
713
-</pre>
709
+<pre><code class="src src-bash">ssh username@domainname -p 2222
710
+</code></pre>
714 711
 </div>
715 712
 
716 713
 <p>
@@ -763,16 +760,16 @@ Spamassassin is also available and within Mutt you can use the S (shift+s) key t
763 760
 </p>
764 761
 </div>
765 762
 </div>
766
-<div id="outline-container-orgcfb72a5" class="outline-2">
767
-<h2 id="orgcfb72a5">Why isn't dynamic DNS working?</h2>
768
-<div class="outline-text-2" id="text-orgcfb72a5">
763
+<div id="outline-container-orgceb4e2a" class="outline-2">
764
+<h2 id="orgceb4e2a">Why isn't dynamic DNS working?</h2>
765
+<div class="outline-text-2" id="text-orgceb4e2a">
769 766
 <p>
770 767
 If you run the command:
771 768
 </p>
772 769
 
773 770
 <div class="org-src-container">
774
-<pre class="src src-bash">systemctl status inadyn
775
-</pre>
771
+<pre><code class="src src-bash">systemctl status inadyn
772
+</code></pre>
776 773
 </div>
777 774
 
778 775
 <p>
@@ -780,24 +777,24 @@ And see some error related to checking for changes in the IP address then you ca
780 777
 </p>
781 778
 
782 779
 <div class="org-src-container">
783
-<pre class="src src-text">https://check.torproject.org/
780
+<pre><code class="src src-text">https://check.torproject.org/
784 781
 https://www.whatsmydns.net/whats-my-ip-address.html
785 782
 https://www.privateinternetaccess.com/pages/whats-my-ip/
786
-</pre>
783
+</code></pre>
787 784
 </div>
788 785
 </div>
789 786
 </div>
790 787
 
791
-<div id="outline-container-orgbe6bcbf" class="outline-2">
792
-<h2 id="orgbe6bcbf">How do I change my encryption settings?</h2>
793
-<div class="outline-text-2" id="text-orgbe6bcbf">
788
+<div id="outline-container-org461598b" class="outline-2">
789
+<h2 id="org461598b">How do I change my encryption settings?</h2>
790
+<div class="outline-text-2" id="text-org461598b">
794 791
 <p>
795 792
 Suppose that some new encryption vulnerability has been announced and that you need to change your encryption settings. Maybe an algorithm thought to be secure is now no longer so and you need to remove it. You can change your settings by doing the following:
796 793
 </p>
797 794
 
798 795
 <div class="org-src-container">
799
-<pre class="src src-bash">ssh myusername@mydomain -p 2222
800
-</pre>
796
+<pre><code class="src src-bash">ssh myusername@mydomain -p 2222
797
+</code></pre>
801 798
 </div>
802 799
 
803 800
 <p>
@@ -805,9 +802,9 @@ Select <i>Administrator controls</i> then select <i>Security Settings</i>. You w
805 802
 </p>
806 803
 </div>
807 804
 </div>
808
-<div id="outline-container-orgb2c6dc5" class="outline-2">
809
-<h2 id="orgb2c6dc5">How do I get a domain name?</h2>
810
-<div class="outline-text-2" id="text-orgb2c6dc5">
805
+<div id="outline-container-org725bf9e" class="outline-2">
806
+<h2 id="org725bf9e">How do I get a domain name?</h2>
807
+<div class="outline-text-2" id="text-org725bf9e">
811 808
 <p>
812 809
 Suppose that you have bought a domain name (rather than using a free subdomain on freedns) and you want to use that instead.
813 810
 </p>
@@ -817,11 +814,11 @@ Remove any existing nameservers for your domain (or select "custom" nameservers)
817 814
 </p>
818 815
 
819 816
 <div class="org-src-container">
820
-<pre class="src src-text">NS1.AFRAID.ORG
817
+<pre><code class="src src-text">NS1.AFRAID.ORG
821 818
 NS2.AFRAID.ORG
822 819
 NS3.AFRAID.ORG
823 820
 NS4.AFRAID.ORG
824
-</pre>
821
+</code></pre>
825 822
 </div>
826 823
 
827 824
 <p>
@@ -837,8 +834,8 @@ To route email to one of your freedns domains:
837 834
 </p>
838 835
 
839 836
 <div class="org-src-container">
840
-<pre class="src src-bash">editor /etc/mailname
841
-</pre>
837
+<pre><code class="src src-bash">editor /etc/mailname
838
+</code></pre>
842 839
 </div>
843 840
 
844 841
 <p>
@@ -846,8 +843,8 @@ Add any extra domains which you own, then save and exit.
846 843
 </p>
847 844
 
848 845
 <div class="org-src-container">
849
-<pre class="src src-bash">editor /etc/exim4/update-exim4.conf.conf
850
-</pre>
846
+<pre><code class="src src-bash">editor /etc/exim4/update-exim4.conf.conf
847
+</code></pre>
851 848
 </div>
852 849
 
853 850
 <p>
@@ -859,10 +856,10 @@ Save and exit, then restart exim.
859 856
 </p>
860 857
 
861 858
 <div class="org-src-container">
862
-<pre class="src src-bash">update-exim4.conf.template -r
859
+<pre><code class="src src-bash">update-exim4.conf.template -r
863 860
 update-exim4.conf
864 861
 service exim4 restart
865
-</pre>
862
+</code></pre>
866 863
 </div>
867 864
 
868 865
 <p>
@@ -871,16 +868,16 @@ You should now be able to send an email from <i>postmaster@mynewdomainname</i> a
871 868
 </div>
872 869
 </div>
873 870
 
874
-<div id="outline-container-org5e04c0e" class="outline-2">
875
-<h2 id="org5e04c0e">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
876
-<div class="outline-text-2" id="text-org5e04c0e">
871
+<div id="outline-container-orgb611e68" class="outline-2">
872
+<h2 id="orgb611e68">How do I get a "real" SSL/TLS/HTTPS certificate?</h2>
873
+<div class="outline-text-2" id="text-orgb611e68">
877 874
 <p>
878 875
 If you did the full install or selected the social variant then the system will have tried to obtain a Let's Encrypt certificate automatically during the install process. If this failed for any reason, or if you have created a new site which you need a certificate for then do the following:
879 876
 </p>
880 877
 
881 878
 <div class="org-src-container">
882
-<pre class="src src-bash">ssh username@mydomainname -p 2222
883
-</pre>
879
+<pre><code class="src src-bash">ssh username@mydomainname -p 2222
880
+</code></pre>
884 881
 </div>
885 882
 
886 883
 <p>
@@ -892,9 +889,9 @@ One thing to be aware of is that Let's Encrypt doesn't support many dynamic DNS
892 889
 </p>
893 890
 </div>
894 891
 </div>
895
-<div id="outline-container-orgc2a5392" class="outline-2">
896
-<h2 id="orgc2a5392">How do I renew a Let's Encrypt certificate?</h2>
897
-<div class="outline-text-2" id="text-orgc2a5392">
892
+<div id="outline-container-org9ebb9ee" class="outline-2">
893
+<h2 id="org9ebb9ee">How do I renew a Let's Encrypt certificate?</h2>
894
+<div class="outline-text-2" id="text-org9ebb9ee">
898 895
 <p>
899 896
 Normally certificates will be automatically renewed once per month, so you don't need to be concerned about it. If anything goes wrong with the automatic renewal then you should receive a warning email.
900 897
 </p>
@@ -904,8 +901,8 @@ If you need to manually renew a certificate:
904 901
 </p>
905 902
 
906 903
 <div class="org-src-container">
907
-<pre class="src src-bash">ssh username@mydomainname -p 2222
908
-</pre>
904
+<pre><code class="src src-bash">ssh username@mydomainname -p 2222
905
+</code></pre>
909 906
 </div>
910 907
 
911 908
 <p>
@@ -913,16 +910,16 @@ Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Renew
913 910
 </p>
914 911
 </div>
915 912
 </div>
916
-<div id="outline-container-org93cd052" class="outline-2">
917
-<h2 id="org93cd052">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
918
-<div class="outline-text-2" id="text-org93cd052">
913
+<div id="outline-container-org796ff88" class="outline-2">
914
+<h2 id="org796ff88">I tried to renew a Let's Encrypt certificate and it failed. What should I do?</h2>
915
+<div class="outline-text-2" id="text-org796ff88">
919 916
 <p>
920 917
 Most likely it's because Let's Encrypt doesn't support your particular domain or subdomain. Currently free subdomains tend not to work. You'll need to buy a domain name, link it to your dynamic DNS account and then do:
921 918
 </p>
922 919
 
923 920
 <div class="org-src-container">
924
-<pre class="src src-bash">ssh username@mydomainname -p 2222
925
-</pre>
921
+<pre><code class="src src-bash">ssh username@mydomainname -p 2222
922
+</code></pre>
926 923
 </div>
927 924
 
928 925
 <p>
@@ -930,34 +927,17 @@ Select <i>Administrator controls</i> then <b>Security settings</b> then <b>Creat
930 927
 </p>
931 928
 </div>
932 929
 </div>
933
-<div id="outline-container-org778edeb" class="outline-2">
934
-<h2 id="org778edeb">Why use self-signed certificates?</h2>
935
-<div class="outline-text-2" id="text-org778edeb">
936
-<p>
937
-Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up <i>scary-scary looking</i> browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is <i>no certainty about who that connection is with</i>. They probably will protect the content of your communications from passive bulk interception - such as the tapping of under-sea cables.
938
-</p>
939
-
940
-<p>
941
-The current strategy on this system is to typically create self-signed certificates during the initial installation but also to have the ability to easily convert those to LetsEncrypt certificates via the security settings on the administrator control panel.
942
-</p>
943
-
944
-<p>
945
-You might say, <i>"but surely LetsEncrypt is a single point of failure!"</i>, and you'd be right. Maybe at some point in future LetsEncrypt is no longer a thing, or no longer considered sufficiently secure. That's why building in total dependence upon one organisation is a bad idea, and it's still possible to have self-signed certs as a fallback option.
946
-</p>
947
-</div>
948
-</div>
949
-
950
-<div id="outline-container-org70ac6f1" class="outline-2">
951
-<h2 id="org70ac6f1">Why not use the services of $company instead? They took the Seppuku pledge</h2>
952
-<div class="outline-text-2" id="text-org70ac6f1">
930
+<div id="outline-container-org3d4f550" class="outline-2">
931
+<h2 id="org3d4f550">Why not use the services of $company instead? They took the Seppuku pledge</h2>
932
+<div class="outline-text-2" id="text-org3d4f550">
953 933
 <p>
954 934
 <a href="https://cryptostorm.org/viewtopic.php?f=63&amp;t=2954&amp;sid=7de2d1e699cfde2f574e6a7f6ea5a173">That pledge</a> is utterly worthless. Years ago people trusted Google in the same sort of way, because they promised not be be evil and because a lot of the engineers working for them seemed like honest types who were "<i>on our side</i>". Post-<a href="https://en.wikipedia.org/wiki/Nymwars">nymwars</a> and post-<a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM</a> we know exactly how much Google cared about the privacy and security of its users. But Google is only one particular example. In general don't trust pledges made by companies, even if the people running them seem really sincere.
955 935
 </p>
956 936
 </div>
957 937
 </div>
958
-<div id="outline-container-orged33b88" class="outline-2">
959
-<h2 id="orged33b88">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
960
-<div class="outline-text-2" id="text-orged33b88">
938
+<div id="outline-container-org4df20f5" class="outline-2">
939
+<h2 id="org4df20f5">Why does my email keep getting rejected as spam by Gmail/etc?</h2>
940
+<div class="outline-text-2" id="text-org4df20f5">
961 941
 <p>
962 942
 Welcome to the world of email. Email is really the archetypal decentralized service, developed during the early days of the internet. In principle anyone can run an email server, and that's exactly what you're doing with Freedombone. Email is very useful, but it has a big problem, and that's that the protocols are totally insecure. That made it easy for spammers to do their thing, and in response highly elaborate spam filtering and blocking systems were developed. Chances are that your emails are being blocked in this way. Sometimes the blocking is so indisciminate that entire countries are excluded. What can you do about it? Unless you control the block list at the receiving end you may not be able to do much unless you can find an email proxy server which is trusted by the receiving server.
963 943
 </p>
@@ -967,8 +947,8 @@ Often ISPs will run their own SMTP mail server which you can use for proxying, t
967 947
 </p>
968 948
 
969 949
 <div class="org-src-container">
970
-<pre class="src src-bash">ssh username@mydomainname -p 2222
971
-</pre>
950
+<pre><code class="src src-bash">ssh username@mydomainname -p 2222
951
+</code></pre>
972 952
 </div>
973 953
 
974 954
 <p>
@@ -988,9 +968,9 @@ So the situation with email presently is pretty bad, and there's a clear selecti
988 968
 </p>
989 969
 </div>
990 970
 </div>
991
-<div id="outline-container-org54bef54" class="outline-2">
992
-<h2 id="org54bef54">Tor is censored/blocked in my area. What can I do?</h2>
993
-<div class="outline-text-2" id="text-org54bef54">
971
+<div id="outline-container-orga4c748f" class="outline-2">
972
+<h2 id="orga4c748f">Tor is censored/blocked in my area. What can I do?</h2>
973
+<div class="outline-text-2" id="text-orga4c748f">
994 974
 <p>
995 975
 If you can find some details for an obfs4 Tor bridge (its IP address, port number and key or nickname) then you can set up the system to use it to connect to the Tor network. Unlike relay nodes the IP addresses for bridges are not public information and so can't be easily known and added to block lists by authoritarian regimes or over-zealous ISPs.
996 976
 </p>
@@ -1021,9 +1001,9 @@ Return to the <a href="index.html">home page</a>
1021 1001
 </div>
1022 1002
 </div>
1023 1003
 
1024
-<div id="outline-container-org4779eb1" class="outline-2">
1025
-<h2 id="org4779eb1">I want to block a particular domain from getting its content into my social network sites</h2>
1026
-<div class="outline-text-2" id="text-org4779eb1">
1004
+<div id="outline-container-org3b48bfa" class="outline-2">
1005
+<h2 id="org3b48bfa">I want to block a particular domain from getting its content into my social network sites</h2>
1006
+<div class="outline-text-2" id="text-org3b48bfa">
1027 1007
 <p>
1028 1008
 If you're being pestered by some domain which contains bad/illegal/harrassing content or irritating users you can block domains at the firewall level. Go to the administrator control panel and select <i>domain blocking</i>. You can then block, unblock and view the list of blocked domains.
1029 1009
 </p>