Bob Mottram 9 lat temu
rodzic
commit
79f47c27a8

+ 33
- 77
website/EN/backups.html Wyświetl plik

@@ -4,7 +4,7 @@
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6 6
 <title></title>
7
-<!-- 2015-09-29 Tue 13:05 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8 8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9 9
 <meta  name="generator" content="Org-mode" />
10 10
 <meta  name="author" content="Bob Mottram" />
@@ -187,7 +187,7 @@ for the JavaScript code in this tag.
187 187
 </tr>
188 188
 
189 189
 <tr>
190
-<td class="org-left"><a href="#orgheadline4">Distributed backups</a></td>
190
+<td class="org-left"><a href="#orgheadline4">Distributed/remote backups</a></td>
191 191
 </tr>
192 192
 
193 193
 <tr>
@@ -208,16 +208,20 @@ As part of the Freedombone installation the GPG key used to encrypt backups will
208 208
 
209 209
 <pre class="src src-bash">ssh username@domainname -p 2222
210 210
 su
211
-freedombone-keydrive -u [username] --master
211
+control
212 212
 </pre>
213 213
 </div>
214 214
 
215 215
 <p>
216
+Select <i>Backup and Restore</i> then <i>Backup GPG key to USB drive (master keydrive)</i>.
217
+</p>
218
+
219
+<p>
216 220
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
217 221
 </p>
218 222
 
219 223
 <p>
220
-A pro-tip for the best possible security is to create multiple USB drives containing key fragments, and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by ommitting the <i>&#x2013;master</i> option in the above command and then repeating the process with a number of different USB drives (typically 4 or more).
224
+A pro-tip for the best possible security is to create multiple USB drives containing key fragments (fragment keydrive), and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by selecting <i>fragment keydrive</i> and then repeating the process with a number of different USB drives (typically 4 or more).
221 225
 </p>
222 226
 </div>
223 227
 </div>
@@ -240,12 +244,16 @@ Log into the system and become the root user, then run the <i>backup</i> command
240 244
 
241 245
 <pre class="src src-bash">ssh username@domainname -p 2222
242 246
 su
243
-backup
247
+control
244 248
 </pre>
245 249
 </div>
246 250
 
247 251
 <p>
248
-Type in the password for the USB drive, then the backup will begin.
252
+Select <i>Backup and Restore</i> and then <i>Backup data to USB drive</i>.
253
+</p>
254
+
255
+<p>
256
+Type in the LUKS password for the USB drive, then the backup will begin.
249 257
 </p>
250 258
 
251 259
 <p>
@@ -264,63 +272,47 @@ Log into the system and become the root user:
264 272
 
265 273
 <pre class="src src-bash">ssh username@domainname -p 2222
266 274
 su
275
+control
267 276
 </pre>
268 277
 </div>
269 278
 
270 279
 <p>
271
-If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done as follows:
280
+If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting <i>Backup and Restore</i> then <i>Restore GPG key from USB keydrive</i>. When that's done remove the keydrive and plug in the backup drive.
272 281
 </p>
273 282
 
274
-<div class="org-src-container">
275
-
276
-<pre class="src src-bash">freedombone-recoverkey -u [username]
277
-</pre>
278
-</div>
279
-
280
-<p>
281
-Or on a Beaglebone Black you can use the option:
282
-</p>
283
-
284
-<div class="org-src-container">
285
-
286
-<pre class="src src-bash">freedombone-recoverkey -u [username] --drive sda
287
-</pre>
288
-</div>
289
-
290 283
 <p>
291
-Remove any existing drive and insert the USB thumb drive containing your backup into the front socket of the Beaglebone Black, then run the command:
284
+Select <i>Backup and Restore</i> then <i>Restore data from USB drive</i>.
292 285
 </p>
293 286
 
294
-<div class="org-src-container">
295
-
296
-<pre class="src src-bash">restore
297
-</pre>
298
-</div>
299
-
300 287
 <p>
301
-Enter the password for the USB drive. When the restore is complete you can remove the USB drive.
288
+Enter the LUKS password for the USB drive. When the restore is complete you can remove the USB drive.
302 289
 </p>
303 290
 </div>
304 291
 </div>
305 292
 <div id="outline-container-orgheadline4" class="outline-2">
306
-<h2 id="orgheadline4">Distributed backups</h2>
293
+<h2 id="orgheadline4">Distributed/remote backups</h2>
307 294
 <div class="outline-text-2" id="text-orgheadline4">
308 295
 <p>
309 296
 Distributed backups are a better way of ensuring the persistence of your data, such that even if your system gets stolen or destroyed then the data will still be recoverable from your friends. Since the backups are encrypted your friends (or anyone else with access to their systems) won't be able to read your backed up content even if their systems are subsequently compromised.
310 297
 </p>
311 298
 
312 299
 <p>
313
-Firstly you will need to have a user account on one or more of your friends servers.  They don't necessarily need to be using Freedombone, just some version of GNU/Linux with ssh access.  They can create a user account for you with the <b>adduser &lt;username&gt;</b> command when logged in as root and then give you the username and password via a secure method, such as on paper or via an encrypted email or via an XMPP chat using OTR. Make sure that the password used is a strong one - preferably a long random string stored in a password manager - so that dictionary attacks will not be easy. Also for maximum resilience put your password manager file onto a USB thumb drive and carry it with you.
300
+Firstly you will need to have a user account on one or more of your friends servers.  They don't necessarily need to be using Freedombone, just some version of GNU/Linux with ssh access.  They can create a user account for you with the control panel on a Freedombone system or with the <b>adduser &lt;username&gt;</b> command on any other system when logged in as root and then give you the username and password via a secure method, such as on paper, via an encrypted email, Tox or via an XMPP chat using OTR. Make sure that the password used is a strong one - preferably a long random string stored in a password manager - so that dictionary attacks will not be easy. Also for maximum resilience put your password manager file onto a USB thumb drive and carry it with you.
314 301
 </p>
315 302
 
316 303
 <div class="org-src-container">
317 304
 
318 305
 <pre class="src src-bash">ssh username@domainname -p 2222
319
-freedombone-remote
306
+su
307
+control
320 308
 </pre>
321 309
 </div>
322 310
 
323 311
 <p>
312
+Select <i>Backup and Restore</i> then <i>Configure remote backups</i>.
313
+</p>
314
+
315
+<p>
324 316
 You can then enter the usernames, domains and ssh logins for one or more remote servers. The system will try to backup to these remote locations once per day.
325 317
 </p>
326 318
 </div>
@@ -342,53 +334,22 @@ First log in and if you don't already have one then create a new friends list:
342 334
 <div class="org-src-container">
343 335
 
344 336
 <pre class="src src-bash">ssh username@domainname -p 2222
345
-freedombone-remote
346
-</pre>
347
-</div>
348
-
349
-<p>
350
-Configure the remote server login details.
351
-</p>
352
-
353
-<p>
354
-Now become the root user:
355
-</p>
356
-
357
-<div class="org-src-container">
358
-
359
-<pre class="src src-bash">su
337
+su
338
+control
360 339
 </pre>
361 340
 </div>
362 341
 
363 342
 <p>
364
-Plug in the USB drive containing the backup key and restore it.
343
+Select <i>Backup and Restore</i> then <i>Restore GPG key from USB (master keydrive)</i>. Select the username then plug in your keydrive and restore the key.
365 344
 </p>
366 345
 
367
-<div class="org-src-container">
368
-
369
-<pre class="src src-bash">freedombone-recoverkey -u [username]
370
-</pre>
371
-</div>
372
-
373 346
 <p>
374
-Or on a Beablebone Black:
347
+Now select <i>Configure remote backups</i> and configure the locations and logins for the remote server.
375 348
 </p>
376 349
 
377
-<div class="org-src-container">
378
-
379
-<pre class="src src-bash">freedombone-recoverkey -u [username] -d sda
380
-</pre>
381
-</div>
382
-
383 350
 <p>
384
-Then use the command:
351
+Finally select <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
385 352
 </p>
386
-
387
-<div class="org-src-container">
388
-
389
-<pre class="src src-bash">restorefromfriend &lt;friends server domain name&gt;
390
-</pre>
391
-</div>
392 353
 </div>
393 354
 </div>
394 355
 <div id="outline-container-orgheadline7" class="outline-3">
@@ -406,18 +367,13 @@ Log in as root:
406 367
 
407 368
 <pre class="src src-bash">ssh username@domainname -p 2222
408 369
 su
370
+control
409 371
 </pre>
410 372
 </div>
411 373
 
412 374
 <p>
413
-Then use the command:
375
+Select <i>Backup and Restore</i> then <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
414 376
 </p>
415
-
416
-<div class="org-src-container">
417
-
418
-<pre class="src src-bash">restorefromfriend &lt;friends server domain name&gt;
419
-</pre>
420
-</div>
421 377
 </div>
422 378
 </div>
423 379
 </div>

+ 27
- 9
website/EN/faq.html Wyświetl plik

@@ -4,7 +4,7 @@
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6 6
 <title></title>
7
-<!-- 2015-10-28 Wed 21:50 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8 8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9 9
 <meta  name="generator" content="Org-mode" />
10 10
 <meta  name="author" content="Bob Mottram" />
@@ -277,7 +277,7 @@ It was originally designed to run on the Beaglebone Black, but that should be re
277 277
 <h2 id="orgheadline4">Can I add more users to the system?</h2>
278 278
 <div class="outline-text-2" id="text-orgheadline4">
279 279
 <p>
280
-Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP and the blog (depending on whether the variant which you installed includes those). To add a user login as root then run the command:
280
+Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those). To add a user login as root then run the command:
281 281
 </p>
282 282
 
283 283
 <div class="org-src-container">
@@ -287,6 +287,16 @@ Yes. Freedombone can support a small number of users, for a "<i>friends and fami
287 287
 </div>
288 288
 
289 289
 <p>
290
+Or optionally with an <i>ssh public key</i>, given either as a filename or directly pasted. Specifying an ssh key will allow the user to log in more securely if they wish to use the Mutt email client.
291
+</p>
292
+
293
+<div class="org-src-container">
294
+
295
+<pre class="src src-bash">freedombone-adduser [username] [ssh public key]
296
+</pre>
297
+</div>
298
+
299
+<p>
290 300
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have <b>complete trust</b> in the administrator.
291 301
 </p>
292 302
 
@@ -320,7 +330,7 @@ The tripwire will be automatically reset once per week. If you want to reset it
320 330
 
321 331
 <pre class="src src-bash">ssh username@mydomain -p 2222
322 332
 su
323
-freedombone-sec
333
+control
324 334
 </pre>
325 335
 </div>
326 336
 
@@ -333,15 +343,23 @@ Select "reset tripwire" using cursors and space bar then enter.
333 343
 <h2 id="orgheadline7">Is metadata protected?</h2>
334 344
 <div class="outline-text-2" id="text-orgheadline7">
335 345
 <p>
336
-Even when using Freedombone metadata analysis by third parties is still possible. They might have a much harder time knowing what the content is, but they can potentially construct extensive dossiers based upon who communicated with your server when.  Metadata leakage is a general problem with most current web systems and it is hoped that more secure technology will become available in future. But for now if metadata protection is your main concern using Freedombone won't help.
346
+Even when using Freedombone metadata analysis by third parties is still possible. They might have a much harder time knowing what the content is, but they can potentially construct extensive dossiers based upon who communicated with your server when.  Metadata leakage is a general problem with most current web systems and it is hoped that more secure technology will become available in future. But for now if metadata protection is your main concern using Freedombone on its own won't help. You may be able to use Tor Messenger to protect the metadata of XMPP chat communications to some extent.
337 347
 </p>
338 348
 </div>
339 349
 </div>
340 350
 <div id="outline-container-orgheadline8" class="outline-2">
341 351
 <h2 id="orgheadline8">How do I create email processing rules?</h2>
342 352
 <div class="outline-text-2" id="text-orgheadline8">
353
+<div class="org-src-container">
354
+
355
+<pre class="src src-bash">ssh username@domainname -p 2222
356
+su
357
+control
358
+</pre>
359
+</div>
360
+
343 361
 <p>
344
-You can administer email in the traditional manner by editing folders or procmail rules, but for convenience some commands are available to make that process simpler. See the relevant manpages for more details.
362
+Select <i>Email Filtering Rules</i> then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
345 363
 </p>
346 364
 
347 365
 <table border="2" cellspacing="0" cellpadding="6" rules="groups" frame="hsides">
@@ -471,12 +489,12 @@ Suppose that some new encryption vulnerability has been announced and that you n
471 489
 
472 490
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
473 491
 su
474
-freedombone-sec
492
+control
475 493
 </pre>
476 494
 </div>
477 495
 
478 496
 <p>
479
-You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
497
+Then select <i>Security Settings</i>. You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
480 498
 </p>
481 499
 </div>
482 500
 </div>
@@ -736,7 +754,7 @@ The StartSSL certificates last for a year. You can check the expiry date of your
736 754
 </p>
737 755
 
738 756
 <p>
739
-Before changing any certificates it's a good idea to make a backup of the existing system. Plug in a USB drive, log into the Freedombone and become the root user, then run the command <b>backup</b>. Backing up may take a while, but it ensures that if anything goes wrong and you mess up the certificates then there is a way to restore the previous ones.
757
+Before changing any certificates it's a good idea to make a backup of the existing system. Use <i>Backup and Restore</i> from the control panel to make a backup of the system to a USB drive. Backing up may take a while, but it ensures that if anything goes wrong and you mess up the certificates then there is a way to restore the previous ones.
740 758
 </p>
741 759
 
742 760
 <p>
@@ -759,7 +777,7 @@ Log in to the Freedombone, become the root user, then issue the renew command:
759 777
 
760 778
 <pre class="src src-bash">ssh username@mydomainname -p 2222
761 779
 su
762
-freedombone-renew-cert -h mydomainname
780
+freedombone-renew-cert -h mydomainname -p startssl
763 781
 </pre>
764 782
 </div>
765 783
 

+ 8
- 8
website/EN/installation.html Wyświetl plik

@@ -4,7 +4,7 @@
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6 6
 <title></title>
7
-<!-- 2015-11-01 Sun 23:01 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8 8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9 9
 <meta  name="generator" content="Org-mode" />
10 10
 <meta  name="author" content="Bob Mottram" />
@@ -595,14 +595,12 @@ This is the traditional security model in which you carry your full keyring on a
595 595
 
596 596
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
597 597
 su
598
-freedombone-keydrive -u myusername -d sdb --master yes
599
-<span class="org-keyword">exit</span>
600
-<span class="org-keyword">exit</span>
598
+control
601 599
 </pre>
602 600
 </div>
603 601
 
604 602
 <p>
605
-If you are on a Beaglebone Black then use <i>sda</i> rather than <i>sdb</i> for the drive parameter.
603
+Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (master keydrive)</i>.
606 604
 </p>
607 605
 </div>
608 606
 </div>
@@ -617,13 +615,15 @@ This breaks your GPG key into a number of fragments and randomly selects one to
617 615
 
618 616
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
619 617
 su
620
-freedombone-keydrive -u myusername -d sdb
621
-<span class="org-keyword">exit</span>
622
-<span class="org-keyword">exit</span>
618
+control
623 619
 </pre>
624 620
 </div>
625 621
 
626 622
 <p>
623
+Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (fragment keydrive)</i>.
624
+</p>
625
+
626
+<p>
627 627
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "<i>the web of backups</i>" or "<i>the web of encryption</i>". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
628 628
 </p>
629 629
 </div>

+ 2
- 2
website/EN/variants.html Wyświetl plik

@@ -4,7 +4,7 @@
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6 6
 <title></title>
7
-<!-- 2015-09-08 Tue 19:53 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8 8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9 9
 <meta  name="generator" content="Org-mode" />
10 10
 <meta  name="author" content="Bob Mottram" />
@@ -215,7 +215,7 @@ Freedombone may be installed either in its entirety or as different variants wit
215 215
 
216 216
 <tr>
217 217
 <td class="org-left"><b>Chat</b></td>
218
-<td class="org-left">Encrypted IRC and XMPP services for one-to-one and many-to-many chat</td>
218
+<td class="org-left">Encrypted IRC, XMPP, Tox and VoIP services for one-to-one and many-to-many chat</td>
219 219
 </tr>
220 220
 
221 221
 <tr>