Browse Source

Simplify instructions for onion based ssh logins

Bob Mottram 9 years ago
parent
commit
72a9b17df6
2 changed files with 148 additions and 134 deletions
  1. 13
    10
      doc/EN/usage.org
  2. 135
    124
      website/EN/usage.html

+ 13
- 10
doc/EN/usage.org View File

76
 ssh username@freedombone.local -p 2222
76
 ssh username@freedombone.local -p 2222
77
 #+END_SRC
77
 #+END_SRC
78
 
78
 
79
-Select /Administrator controls/ then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
79
+Select /Administrator controls/ then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following on your local system:
80
+
81
+#+BEGIN_SRC bash
82
+freedombone-client
83
+#+END_SRC
84
+
85
+This will set up your ssh environment to be able to handle onion addresses. In addition if you use monkeysphere then you can do:
86
+
87
+#+BEGIN_SRC bash
88
+freedombone-client --ms yes
89
+#+END_SRC
90
+
91
+Then you can test ssh with:
80
 
92
 
81
 #+BEGIN_SRC bash
93
 #+BEGIN_SRC bash
82
-sudo apt-get install tor connect-proxy monkeysphere
83
-echo 'Host *.onion
84
-    ServerAliveInterval 60
85
-    ServerAliveCountMax 3
86
-	ProxyCommand sh -c 'monkeysphere ssh-proxycommand --no-connect %h %p ; connect -R remote -5 -S 127.0.0.1:9050 %h %p'
87
-Host *
88
-    ServerAliveInterval 60
89
-    ServerAliveCountMax 3
90
-    ProxyCommand monkeysphere ssh-proxycommand %h %p' > ~/.ssh/config
91
 ssh username@address.onion -p 2222
94
 ssh username@address.onion -p 2222
92
 #+END_SRC
95
 #+END_SRC
93
 
96
 

+ 135
- 124
website/EN/usage.html View File

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-28 Thu 10:18 -->
6
+<!-- 2016-05-02 Mon 11:42 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
170
 </colgroup>
170
 </colgroup>
171
 <tbody>
171
 <tbody>
172
 <tr>
172
 <tr>
173
-<td class="org-left"><a href="#orgb8d0518">Readme</a></td>
173
+<td class="org-left"><a href="#orgbe07d11">Readme</a></td>
174
 </tr>
174
 </tr>
175
 
175
 
176
 <tr>
176
 <tr>
177
-<td class="org-left"><a href="#org15372e2">Improving ssh security</a></td>
177
+<td class="org-left"><a href="#orgef813e5">Improving ssh security</a></td>
178
 </tr>
178
 </tr>
179
 
179
 
180
 <tr>
180
 <tr>
181
-<td class="org-left"><a href="#orgd478c98">Administrating the system via an onion address (Tor)</a></td>
181
+<td class="org-left"><a href="#org18b106d">Administrating the system via an onion address (Tor)</a></td>
182
 </tr>
182
 </tr>
183
 
183
 
184
 <tr>
184
 <tr>
190
 </tr>
190
 </tr>
191
 
191
 
192
 <tr>
192
 <tr>
193
-<td class="org-left"><a href="#org1bbc6b5">Syncing to the Cloud</a></td>
193
+<td class="org-left"><a href="#org8a03ab5">Syncing to the Cloud</a></td>
194
 </tr>
194
 </tr>
195
 
195
 
196
 <tr>
196
 <tr>
197
-<td class="org-left"><a href="#org453b91c">Play Music</a></td>
197
+<td class="org-left"><a href="#org2c738ba">Play Music</a></td>
198
 </tr>
198
 </tr>
199
 
199
 
200
 <tr>
200
 <tr>
201
-<td class="org-left"><a href="#org97eea7">Microblogging (GNU Social)</a></td>
201
+<td class="org-left"><a href="#orgf5b70cb">Microblogging (GNU Social)</a></td>
202
 </tr>
202
 </tr>
203
 
203
 
204
 <tr>
204
 <tr>
205
-<td class="org-left"><a href="#org7d5a751">Social Network</a></td>
205
+<td class="org-left"><a href="#orgdef70e5">Social Network</a></td>
206
 </tr>
206
 </tr>
207
 
207
 
208
 <tr>
208
 <tr>
209
-<td class="org-left"><a href="#org52dcd3">Chat Services</a></td>
209
+<td class="org-left"><a href="#orgde14250">Chat Services</a></td>
210
 </tr>
210
 </tr>
211
 
211
 
212
 <tr>
212
 <tr>
213
-<td class="org-left"><a href="#orgc9796fa">RSS Reader</a></td>
213
+<td class="org-left"><a href="#org1a5bd9f">RSS Reader</a></td>
214
 </tr>
214
 </tr>
215
 
215
 
216
 <tr>
216
 <tr>
217
-<td class="org-left"><a href="#org44b8914">Adding or removing users</a></td>
217
+<td class="org-left"><a href="#org3063ad5">Adding or removing users</a></td>
218
 </tr>
218
 </tr>
219
 </tbody>
219
 </tbody>
220
 </table>
220
 </table>
221
 
221
 
222
-<div id="outline-container-orgb8d0518" class="outline-2">
223
-<h2 id="orgb8d0518">Readme</h2>
224
-<div class="outline-text-2" id="text-orgb8d0518">
222
+<div id="outline-container-orgbe07d11" class="outline-2">
223
+<h2 id="orgbe07d11">Readme</h2>
224
+<div class="outline-text-2" id="text-orgbe07d11">
225
 <p>
225
 <p>
226
 After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
226
 After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
227
 </p>
227
 </p>
242
 </p>
242
 </p>
243
 </div>
243
 </div>
244
 </div>
244
 </div>
245
-<div id="outline-container-org15372e2" class="outline-2">
246
-<h2 id="org15372e2">Improving ssh security</h2>
247
-<div class="outline-text-2" id="text-org15372e2">
245
+<div id="outline-container-orgef813e5" class="outline-2">
246
+<h2 id="orgef813e5">Improving ssh security</h2>
247
+<div class="outline-text-2" id="text-orgef813e5">
248
 <p>
248
 <p>
249
 To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
249
 To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
250
 </p>
250
 </p>
297
 </div>
297
 </div>
298
 </div>
298
 </div>
299
 
299
 
300
-<div id="outline-container-orgd478c98" class="outline-2">
301
-<h2 id="orgd478c98">Administrating the system via an onion address (Tor)</h2>
302
-<div class="outline-text-2" id="text-orgd478c98">
300
+<div id="outline-container-org18b106d" class="outline-2">
301
+<h2 id="org18b106d">Administrating the system via an onion address (Tor)</h2>
302
+<div class="outline-text-2" id="text-org18b106d">
303
 <p>
303
 <p>
304
 You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
304
 You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
305
 </p>
305
 </p>
311
 </div>
311
 </div>
312
 
312
 
313
 <p>
313
 <p>
314
-Select <i>Administrator controls</i> then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following:
314
+Select <i>Administrator controls</i> then select "About this system" and look for the onion address for ssh. You can then close the terminal and open another, then do the following on your local system:
315
 </p>
315
 </p>
316
 
316
 
317
 <div class="org-src-container">
317
 <div class="org-src-container">
318
 
318
 
319
-<pre class="src src-bash">sudo apt-get install tor connect-proxy monkeysphere
320
-<span class="org-builtin">echo</span> <span class="org-string">'Host *.onion</span>
321
-<span class="org-string">    ServerAliveInterval 60</span>
322
-<span class="org-string">    ServerAliveCountMax 3</span>
323
-<span class="org-string">    ProxyCommand sh -c '</span>monkeysphere ssh-proxycommand --no-connect %h %p ; connect -R remote -5 -S 127.0.0.1:9050 %h %p<span class="org-string">'</span>
324
-<span class="org-string">Host *</span>
325
-<span class="org-string">    ServerAliveInterval 60</span>
326
-<span class="org-string">    ServerAliveCountMax 3</span>
327
-<span class="org-string">    ProxyCommand monkeysphere ssh-proxycommand %h %p'</span> &gt; ~/.ssh/config
328
-ssh username@address.onion -p 2222
319
+<pre class="src src-bash">freedombone-client
320
+</pre>
321
+</div>
322
+
323
+<p>
324
+This will set up your ssh environment to be able to handle onion addresses. In addition if you use monkeysphere then you can do:
325
+</p>
326
+
327
+<div class="org-src-container">
328
+
329
+<pre class="src src-bash">freedombone-client --ms yes
330
+</pre>
331
+</div>
332
+
333
+<p>
334
+Then you can test ssh with:
335
+</p>
336
+
337
+<div class="org-src-container">
338
+
339
+<pre class="src src-bash">ssh username@address.onion -p 2222
329
 </pre>
340
 </pre>
330
 </div>
341
 </div>
331
 
342
 
334
 </p>
345
 </p>
335
 </div>
346
 </div>
336
 </div>
347
 </div>
337
-<div id="outline-container-org1bbc6b5" class="outline-2">
338
-<h2 id="org1bbc6b5">Syncing to the Cloud</h2>
339
-<div class="outline-text-2" id="text-org1bbc6b5">
348
+<div id="outline-container-org8a03ab5" class="outline-2">
349
+<h2 id="org8a03ab5">Syncing to the Cloud</h2>
350
+<div class="outline-text-2" id="text-org8a03ab5">
340
 <p>
351
 <p>
341
 <a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
352
 <a href="https://syncthing.net/">Syncthing</a> provides a similar capability to proprietary systems such as <a href="http://www.drop-dropbox.com/">Dropbox</a>, and also is well suited for use with low power single board computers. You can have one or more directories which are synchronized across your various laptops/desktops/devices, and this makes it hard for you to ever lose important files. The manner in which the synchronization is done is pretty secure, such that it would be difficult for passive adversaries (mass surveillance, "<i>men in the middle</i>", etc) to know what files you're sharing. Of course, you don't necessarily need to be running a server in order to use Syncthing, but if you do have a server which is always running then there's always at least one place to synchronize your files to or from.
342
 </p>
353
 </p>
346
 </p>
357
 </p>
347
 </div>
358
 </div>
348
 
359
 
349
-<div id="outline-container-org8345a03" class="outline-3">
350
-<h3 id="org8345a03">On a laptop</h3>
351
-<div class="outline-text-3" id="text-org8345a03">
360
+<div id="outline-container-orgd9c5cb7" class="outline-3">
361
+<h3 id="orgd9c5cb7">On a laptop</h3>
362
+<div class="outline-text-3" id="text-orgd9c5cb7">
352
 <p>
363
 <p>
353
 Install syncthing:
364
 Install syncthing:
354
 </p>
365
 </p>
403
 </p>
414
 </p>
404
 </div>
415
 </div>
405
 </div>
416
 </div>
406
-<div id="outline-container-org75fef9b" class="outline-3">
407
-<h3 id="org75fef9b">On Android</h3>
408
-<div class="outline-text-3" id="text-org75fef9b">
417
+<div id="outline-container-org20b5472" class="outline-3">
418
+<h3 id="org20b5472">On Android</h3>
419
+<div class="outline-text-3" id="text-org20b5472">
409
 <p>
420
 <p>
410
 Install Syncthing and Connectbot from F-droid.
421
 Install Syncthing and Connectbot from F-droid.
411
 </p>
422
 </p>
436
 </div>
447
 </div>
437
 </div>
448
 </div>
438
 </div>
449
 </div>
439
-<div id="outline-container-org453b91c" class="outline-2">
440
-<h2 id="org453b91c">Play Music</h2>
441
-<div class="outline-text-2" id="text-org453b91c">
442
-</div><div id="outline-container-org9d1b132" class="outline-3">
443
-<h3 id="org9d1b132">With the DLNA service</h3>
444
-<div class="outline-text-3" id="text-org9d1b132">
450
+<div id="outline-container-org2c738ba" class="outline-2">
451
+<h2 id="org2c738ba">Play Music</h2>
452
+<div class="outline-text-2" id="text-org2c738ba">
453
+</div><div id="outline-container-orgea71315" class="outline-3">
454
+<h3 id="orgea71315">With the DLNA service</h3>
455
+<div class="outline-text-3" id="text-orgea71315">
445
 <p>
456
 <p>
446
 An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
457
 An easy way to play music on any mobile device in your home is to use the DLNA service. Copy your music into a directory called "<i>Music</i>" on a USB thumb drive and then insert it into from socket on the Beaglebone.
447
 </p>
458
 </p>
482
 </div>
493
 </div>
483
 </div>
494
 </div>
484
 
495
 
485
-<div id="outline-container-org97eea7" class="outline-2">
486
-<h2 id="org97eea7">Microblogging (GNU Social)</h2>
487
-<div class="outline-text-2" id="text-org97eea7">
496
+<div id="outline-container-orgf5b70cb" class="outline-2">
497
+<h2 id="orgf5b70cb">Microblogging (GNU Social)</h2>
498
+<div class="outline-text-2" id="text-orgf5b70cb">
488
 <p>
499
 <p>
489
 To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
500
 To log into your GNU Social site first obtain your username and password from the "microblogging" section of the readme file.
490
 </p>
501
 </p>
513
 </div>
524
 </div>
514
 </div>
525
 </div>
515
 
526
 
516
-<div id="outline-container-org7d5a751" class="outline-2">
517
-<h2 id="org7d5a751">Social Network</h2>
518
-<div class="outline-text-2" id="text-org7d5a751">
519
-</div><div id="outline-container-org9b2e349" class="outline-3">
520
-<h3 id="org9b2e349">Domains</h3>
521
-<div class="outline-text-3" id="text-org9b2e349">
527
+<div id="outline-container-orgdef70e5" class="outline-2">
528
+<h2 id="orgdef70e5">Social Network</h2>
529
+<div class="outline-text-2" id="text-orgdef70e5">
530
+</div><div id="outline-container-orga3d8326" class="outline-3">
531
+<h3 id="orga3d8326">Domains</h3>
532
+<div class="outline-text-3" id="text-orga3d8326">
522
 <p>
533
 <p>
523
 Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
534
 Both Hubzilla and GNU Social try to obtain certificates automatically at the time of installation via Let's Encrypt. This will likely mean that in order for this to work you'll need to have obtained at least one "official" domain via a domain selling service, since Let's Encrypt mostly doesn't seem to work with free subdomains from sites such as freeDNS.
524
 </p>
535
 </p>
525
 </div>
536
 </div>
526
 </div>
537
 </div>
527
-<div id="outline-container-orgd960090" class="outline-3">
528
-<h3 id="orgd960090">Initial install</h3>
529
-<div class="outline-text-3" id="text-orgd960090">
538
+<div id="outline-container-orge174e5" class="outline-3">
539
+<h3 id="orge174e5">Initial install</h3>
540
+<div class="outline-text-3" id="text-orge174e5">
530
 <p>
541
 <p>
531
 On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
542
 On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
532
 </p>
543
 </p>
540
 </div>
551
 </div>
541
 </div>
552
 </div>
542
 
553
 
543
-<div id="outline-container-org52dcd3" class="outline-2">
544
-<h2 id="org52dcd3">Chat Services</h2>
545
-<div class="outline-text-2" id="text-org52dcd3">
546
-</div><div id="outline-container-org8993cea" class="outline-3">
547
-<h3 id="org8993cea">IRC</h3>
548
-<div class="outline-text-3" id="text-org8993cea">
554
+<div id="outline-container-orgde14250" class="outline-2">
555
+<h2 id="orgde14250">Chat Services</h2>
556
+<div class="outline-text-2" id="text-orgde14250">
557
+</div><div id="outline-container-org285097c" class="outline-3">
558
+<h3 id="org285097c">IRC</h3>
559
+<div class="outline-text-3" id="text-org285097c">
549
 <p>
560
 <p>
550
 IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
561
 IRC is useful for multi-user chat. The classic use case is for software development where many engineers might need to coordinate their activities, but it's also useful for meetings, parties and general socialising.
551
 </p>
562
 </p>
552
 </div>
563
 </div>
553
-<div id="outline-container-org93c9ee" class="outline-4">
554
-<h4 id="org93c9ee">Irssi</h4>
555
-<div class="outline-text-4" id="text-org93c9ee">
564
+<div id="outline-container-orgb40fb67" class="outline-4">
565
+<h4 id="orgb40fb67">Irssi</h4>
566
+<div class="outline-text-4" id="text-orgb40fb67">
556
 <p>
567
 <p>
557
 The easiest way to use irssi is to connect to your system, like this:
568
 The easiest way to use irssi is to connect to your system, like this:
558
 </p>
569
 </p>
568
 </p>
579
 </p>
569
 </div>
580
 </div>
570
 </div>
581
 </div>
571
-<div id="outline-container-org2659bec" class="outline-4">
572
-<h4 id="org2659bec">XChat</h4>
573
-<div class="outline-text-4" id="text-org2659bec">
582
+<div id="outline-container-org4515af" class="outline-4">
583
+<h4 id="org4515af">XChat</h4>
584
+<div class="outline-text-4" id="text-org4515af">
574
 <p>
585
 <p>
575
 XChat is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
586
 XChat is compatible with proxying via Tor and so provides the best security when connecting to your IRC server. It will allow you to connect to your IRC server's onion address.
576
 </p>
587
 </p>
748
 </div>
759
 </div>
749
 </div>
760
 </div>
750
 
761
 
751
-<div id="outline-container-orgbbdd5ef" class="outline-4">
752
-<h4 id="orgbbdd5ef">Changing or removing the IRC password</h4>
753
-<div class="outline-text-4" id="text-orgbbdd5ef">
762
+<div id="outline-container-orga607a2b" class="outline-4">
763
+<h4 id="orga607a2b">Changing or removing the IRC password</h4>
764
+<div class="outline-text-4" id="text-orga607a2b">
754
 <p>
765
 <p>
755
 By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
766
 By default the IRC server is set up to require a password for users to log in. The password is the same for all users. If you want to change or remove the password:
756
 </p>
767
 </p>
768
 </div>
779
 </div>
769
 </div>
780
 </div>
770
 
781
 
771
-<div id="outline-container-orge9a313d" class="outline-3">
772
-<h3 id="orge9a313d">XMPP/Jabber</h3>
773
-<div class="outline-text-3" id="text-orge9a313d">
774
-</div><div id="outline-container-org29949df" class="outline-4">
775
-<h4 id="org29949df">Using with Profanity</h4>
776
-<div class="outline-text-4" id="text-org29949df">
782
+<div id="outline-container-org2305168" class="outline-3">
783
+<h3 id="org2305168">XMPP/Jabber</h3>
784
+<div class="outline-text-3" id="text-org2305168">
785
+</div><div id="outline-container-orgb9b59ca" class="outline-4">
786
+<h4 id="orgb9b59ca">Using with Profanity</h4>
787
+<div class="outline-text-4" id="text-orgb9b59ca">
777
 <p>
788
 <p>
778
 The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
789
 The <a href="http://profanity.im/">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
779
 </p>
790
 </p>
863
 </p>
874
 </p>
864
 </div>
875
 </div>
865
 </div>
876
 </div>
866
-<div id="outline-container-org7cc25e5" class="outline-4">
867
-<h4 id="org7cc25e5">Using with Jitsi</h4>
868
-<div class="outline-text-4" id="text-org7cc25e5">
877
+<div id="outline-container-orgcc651b3" class="outline-4">
878
+<h4 id="orgcc651b3">Using with Jitsi</h4>
879
+<div class="outline-text-4" id="text-orgcc651b3">
869
 <p>
880
 <p>
870
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
881
 Jitsi is the recommended communications client for desktop or laptop systems, since it includes the <i>off the record</i> (OTR) feature which provides some additional security beyond the usual SSL certificates.
871
 </p>
882
 </p>
895
 </p>
906
 </p>
896
 </div>
907
 </div>
897
 </div>
908
 </div>
898
-<div id="outline-container-org8e01af5" class="outline-4">
899
-<h4 id="org8e01af5">Using with Ubuntu</h4>
900
-<div class="outline-text-4" id="text-org8e01af5">
909
+<div id="outline-container-org29a25b4" class="outline-4">
910
+<h4 id="org29a25b4">Using with Ubuntu</h4>
911
+<div class="outline-text-4" id="text-org29a25b4">
901
 <p>
912
 <p>
902
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
913
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
903
 </p>
914
 </p>
915
 </p>
926
 </p>
916
 </div>
927
 </div>
917
 </div>
928
 </div>
918
-<div id="outline-container-orgc91ef96" class="outline-4">
919
-<h4 id="orgc91ef96">Using Tor Messenger</h4>
920
-<div class="outline-text-4" id="text-orgc91ef96">
929
+<div id="outline-container-orgd0bdeb4" class="outline-4">
930
+<h4 id="orgd0bdeb4">Using Tor Messenger</h4>
931
+<div class="outline-text-4" id="text-orgd0bdeb4">
921
 <p>
932
 <p>
922
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
933
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org/">torproject.org</a> and the setup is pretty simple.
923
 </p>
934
 </p>
924
 </div>
935
 </div>
925
 </div>
936
 </div>
926
-<div id="outline-container-org44ad61e" class="outline-4">
927
-<h4 id="org44ad61e">Using with Android</h4>
928
-<div class="outline-text-4" id="text-org44ad61e">
937
+<div id="outline-container-orgc82e9ae" class="outline-4">
938
+<h4 id="orgc82e9ae">Using with Android</h4>
939
+<div class="outline-text-4" id="text-orgc82e9ae">
929
 <p>
940
 <p>
930
 Install <a href="https://f-droid.org/">F-Droid</a>
941
 Install <a href="https://f-droid.org/">F-Droid</a>
931
 </p>
942
 </p>
961
 </div>
972
 </div>
962
 </div>
973
 </div>
963
 </div>
974
 </div>
964
-<div id="outline-container-orgcc56792" class="outline-3">
965
-<h3 id="orgcc56792">Tox</h3>
966
-<div class="outline-text-3" id="text-orgcc56792">
975
+<div id="outline-container-orgb1f37b0" class="outline-3">
976
+<h3 id="orgb1f37b0">Tox</h3>
977
+<div class="outline-text-3" id="text-orgb1f37b0">
967
 <p>
978
 <p>
968
 Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
979
 Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
969
 </p>
980
 </p>
970
 </div>
981
 </div>
971
-<div id="outline-container-org475267b" class="outline-4">
972
-<h4 id="org475267b">Using the Toxic client</h4>
973
-<div class="outline-text-4" id="text-org475267b">
982
+<div id="outline-container-orgf4dc70d" class="outline-4">
983
+<h4 id="orgf4dc70d">Using the Toxic client</h4>
984
+<div class="outline-text-4" id="text-orgf4dc70d">
974
 <p>
985
 <p>
975
 Log into your system with:
986
 Log into your system with:
976
 </p>
987
 </p>
994
 </div>
1005
 </div>
995
 </div>
1006
 </div>
996
 
1007
 
997
-<div id="outline-container-orgc8b07b8" class="outline-3">
998
-<h3 id="orgc8b07b8">VoIP (Voice chat)</h3>
999
-<div class="outline-text-3" id="text-orgc8b07b8">
1000
-</div><div id="outline-container-org960fab7" class="outline-4">
1001
-<h4 id="org960fab7">Using with Ubuntu</h4>
1002
-<div class="outline-text-4" id="text-org960fab7">
1008
+<div id="outline-container-org44aad51" class="outline-3">
1009
+<h3 id="org44aad51">VoIP (Voice chat)</h3>
1010
+<div class="outline-text-3" id="text-org44aad51">
1011
+</div><div id="outline-container-orgef0333f" class="outline-4">
1012
+<h4 id="orgef0333f">Using with Ubuntu</h4>
1013
+<div class="outline-text-4" id="text-orgef0333f">
1003
 <p>
1014
 <p>
1004
 Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
1015
 Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
1005
 </p>
1016
 </p>
1013
 </p>
1024
 </p>
1014
 </div>
1025
 </div>
1015
 </div>
1026
 </div>
1016
-<div id="outline-container-orgbe251ef" class="outline-4">
1017
-<h4 id="orgbe251ef">Using with Android</h4>
1018
-<div class="outline-text-4" id="text-orgbe251ef">
1027
+<div id="outline-container-orgf94e21d" class="outline-4">
1028
+<h4 id="orgf94e21d">Using with Android</h4>
1029
+<div class="outline-text-4" id="text-orgf94e21d">
1019
 <p>
1030
 <p>
1020
 Install <a href="https://f-droid.org/">F-Droid</a>
1031
 Install <a href="https://f-droid.org/">F-Droid</a>
1021
 </p>
1032
 </p>
1042
 </div>
1053
 </div>
1043
 </div>
1054
 </div>
1044
 </div>
1055
 </div>
1045
-<div id="outline-container-org44aee6" class="outline-3">
1046
-<h3 id="org44aee6">SIP phones</h3>
1047
-<div class="outline-text-3" id="text-org44aee6">
1056
+<div id="outline-container-orgf4bbca7" class="outline-3">
1057
+<h3 id="orgf4bbca7">SIP phones</h3>
1058
+<div class="outline-text-3" id="text-orgf4bbca7">
1048
 <p>
1059
 <p>
1049
 Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
1060
 Freedombone also supports SIP phones The username and domain is the same as for your email address, and the SIP password and extension number will appear within the README file in your home directory. Various SIP client options are available, such as CSipSimple on Android and Jitsi on desktop or laptop machines. Ideally use clients which support ZRTP, which will provide the best level of security.
1050
 </p>
1061
 </p>
1051
 </div>
1062
 </div>
1052
-<div id="outline-container-orgbef1b36" class="outline-4">
1053
-<h4 id="orgbef1b36">About ZRTP</h4>
1054
-<div class="outline-text-4" id="text-orgbef1b36">
1063
+<div id="outline-container-orgff682b" class="outline-4">
1064
+<h4 id="orgff682b">About ZRTP</h4>
1065
+<div class="outline-text-4" id="text-orgff682b">
1055
 <p>
1066
 <p>
1056
 <a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
1067
 <a href="https://jitsi.org/Documentation/ZrtpFAQ">ZRTP</a> appears to be the current best standard to end-to-end encrypted voice calls, combining good security with simplicity of use. When the initial cryptographic negotiation between phones is done at the start of a call a short authentication string (SAS) is calculated and displayed at both ends. To check that there isn't anyone intercepting the call and acting as a <i>man in the middle</i> - as <a href="https://en.wikipedia.org/wiki/Stingray_phone_tracker">stingray type devices</a> try to do - the short authentication string can be read out and verbally confirmed between the callers. If it's the same then you can be pretty confident that the call is secure.
1057
 </p>
1068
 </p>
1058
 </div>
1069
 </div>
1059
 </div>
1070
 </div>
1060
-<div id="outline-container-orge70bc0b" class="outline-4">
1061
-<h4 id="orge70bc0b">Using with CSIPSimple</h4>
1062
-<div class="outline-text-4" id="text-orge70bc0b">
1071
+<div id="outline-container-orga4661af" class="outline-4">
1072
+<h4 id="orga4661af">Using with CSIPSimple</h4>
1073
+<div class="outline-text-4" id="text-orga4661af">
1063
 <p>
1074
 <p>
1064
 Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
1075
 Add an account. Under <b>General Wizards</b> choose <b>Expert</b> and enter the following details:
1065
 </p>
1076
 </p>
1115
 </p>
1126
 </p>
1116
 </div>
1127
 </div>
1117
 </div>
1128
 </div>
1118
-<div id="outline-container-org9ae3015" class="outline-4">
1119
-<h4 id="org9ae3015">Using with Ring</h4>
1120
-<div class="outline-text-4" id="text-org9ae3015">
1129
+<div id="outline-container-orga80ce5f" class="outline-4">
1130
+<h4 id="orga80ce5f">Using with Ring</h4>
1131
+<div class="outline-text-4" id="text-orga80ce5f">
1121
 <p>
1132
 <p>
1122
 From the menu select <b>Manage accounts</b>.
1133
 From the menu select <b>Manage accounts</b>.
1123
 </p>
1134
 </p>
1170
 </div>
1181
 </div>
1171
 </div>
1182
 </div>
1172
 
1183
 
1173
-<div id="outline-container-orgc9796fa" class="outline-2">
1174
-<h2 id="orgc9796fa">RSS Reader</h2>
1175
-<div class="outline-text-2" id="text-orgc9796fa">
1184
+<div id="outline-container-org1a5bd9f" class="outline-2">
1185
+<h2 id="org1a5bd9f">RSS Reader</h2>
1186
+<div class="outline-text-2" id="text-org1a5bd9f">
1176
 <p>
1187
 <p>
1177
 The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
1188
 The way that RSS reading is set up on Freedombone gives you strong reading privacy. Not only is there onion routing between you and the server but also between the server and the source of the RSS feed. The only down side is that many RSS feeds are still http only, and so could be vulnerable to injection attacks, but it's expected that more of this will go to https in the foreseeable future due to a combination of growing recognition of security issues and systems like Let's Encrypt which make obtaining certificates much easier.
1178
 </p>
1189
 </p>
1216
 </blockquote>
1227
 </blockquote>
1217
 </div>
1228
 </div>
1218
 </div>
1229
 </div>
1219
-<div id="outline-container-org44b8914" class="outline-2">
1220
-<h2 id="org44b8914">Adding or removing users</h2>
1221
-<div class="outline-text-2" id="text-org44b8914">
1230
+<div id="outline-container-org3063ad5" class="outline-2">
1231
+<h2 id="org3063ad5">Adding or removing users</h2>
1232
+<div class="outline-text-2" id="text-org3063ad5">
1222
 <p>
1233
 <p>
1223
 Log into the system with:
1234
 Log into the system with:
1224
 </p>
1235
 </p>