Bob Mottram 9 years ago
parent
commit
79f47c27a8
4 changed files with 70 additions and 96 deletions
  1. 33
    77
      website/EN/backups.html
  2. 27
    9
      website/EN/faq.html
  3. 8
    8
      website/EN/installation.html
  4. 2
    2
      website/EN/variants.html

+ 33
- 77
website/EN/backups.html View File

4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
 <title></title>
6
 <title></title>
7
-<!-- 2015-09-29 Tue 13:05 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9
 <meta  name="generator" content="Org-mode" />
9
 <meta  name="generator" content="Org-mode" />
10
 <meta  name="author" content="Bob Mottram" />
10
 <meta  name="author" content="Bob Mottram" />
187
 </tr>
187
 </tr>
188
 
188
 
189
 <tr>
189
 <tr>
190
-<td class="org-left"><a href="#orgheadline4">Distributed backups</a></td>
190
+<td class="org-left"><a href="#orgheadline4">Distributed/remote backups</a></td>
191
 </tr>
191
 </tr>
192
 
192
 
193
 <tr>
193
 <tr>
208
 
208
 
209
 <pre class="src src-bash">ssh username@domainname -p 2222
209
 <pre class="src src-bash">ssh username@domainname -p 2222
210
 su
210
 su
211
-freedombone-keydrive -u [username] --master
211
+control
212
 </pre>
212
 </pre>
213
 </div>
213
 </div>
214
 
214
 
215
 <p>
215
 <p>
216
+Select <i>Backup and Restore</i> then <i>Backup GPG key to USB drive (master keydrive)</i>.
217
+</p>
218
+
219
+<p>
216
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
220
 Keep this USB drive in some safe place, since it will enable you to restore from previous backups.
217
 </p>
221
 </p>
218
 
222
 
219
 <p>
223
 <p>
220
-A pro-tip for the best possible security is to create multiple USB drives containing key fragments, and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by ommitting the <i>&#x2013;master</i> option in the above command and then repeating the process with a number of different USB drives (typically 4 or more).
224
+A pro-tip for the best possible security is to create multiple USB drives containing key fragments (fragment keydrive), and then to distribute them amongst your friends. In the worst case just ask for the drives back and you'll be able to reconstruct the backup key. You can do this by selecting <i>fragment keydrive</i> and then repeating the process with a number of different USB drives (typically 4 or more).
221
 </p>
225
 </p>
222
 </div>
226
 </div>
223
 </div>
227
 </div>
240
 
244
 
241
 <pre class="src src-bash">ssh username@domainname -p 2222
245
 <pre class="src src-bash">ssh username@domainname -p 2222
242
 su
246
 su
243
-backup
247
+control
244
 </pre>
248
 </pre>
245
 </div>
249
 </div>
246
 
250
 
247
 <p>
251
 <p>
248
-Type in the password for the USB drive, then the backup will begin.
252
+Select <i>Backup and Restore</i> and then <i>Backup data to USB drive</i>.
253
+</p>
254
+
255
+<p>
256
+Type in the LUKS password for the USB drive, then the backup will begin.
249
 </p>
257
 </p>
250
 
258
 
251
 <p>
259
 <p>
264
 
272
 
265
 <pre class="src src-bash">ssh username@domainname -p 2222
273
 <pre class="src src-bash">ssh username@domainname -p 2222
266
 su
274
 su
275
+control
267
 </pre>
276
 </pre>
268
 </div>
277
 </div>
269
 
278
 
270
 <p>
279
 <p>
271
-If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done as follows:
280
+If this is a new Freedombone installation then you will first need to restore your backup keys. That can be done by selecting <i>Backup and Restore</i> then <i>Restore GPG key from USB keydrive</i>. When that's done remove the keydrive and plug in the backup drive.
272
 </p>
281
 </p>
273
 
282
 
274
-<div class="org-src-container">
275
-
276
-<pre class="src src-bash">freedombone-recoverkey -u [username]
277
-</pre>
278
-</div>
279
-
280
-<p>
281
-Or on a Beaglebone Black you can use the option:
282
-</p>
283
-
284
-<div class="org-src-container">
285
-
286
-<pre class="src src-bash">freedombone-recoverkey -u [username] --drive sda
287
-</pre>
288
-</div>
289
-
290
 <p>
283
 <p>
291
-Remove any existing drive and insert the USB thumb drive containing your backup into the front socket of the Beaglebone Black, then run the command:
284
+Select <i>Backup and Restore</i> then <i>Restore data from USB drive</i>.
292
 </p>
285
 </p>
293
 
286
 
294
-<div class="org-src-container">
295
-
296
-<pre class="src src-bash">restore
297
-</pre>
298
-</div>
299
-
300
 <p>
287
 <p>
301
-Enter the password for the USB drive. When the restore is complete you can remove the USB drive.
288
+Enter the LUKS password for the USB drive. When the restore is complete you can remove the USB drive.
302
 </p>
289
 </p>
303
 </div>
290
 </div>
304
 </div>
291
 </div>
305
 <div id="outline-container-orgheadline4" class="outline-2">
292
 <div id="outline-container-orgheadline4" class="outline-2">
306
-<h2 id="orgheadline4">Distributed backups</h2>
293
+<h2 id="orgheadline4">Distributed/remote backups</h2>
307
 <div class="outline-text-2" id="text-orgheadline4">
294
 <div class="outline-text-2" id="text-orgheadline4">
308
 <p>
295
 <p>
309
 Distributed backups are a better way of ensuring the persistence of your data, such that even if your system gets stolen or destroyed then the data will still be recoverable from your friends. Since the backups are encrypted your friends (or anyone else with access to their systems) won't be able to read your backed up content even if their systems are subsequently compromised.
296
 Distributed backups are a better way of ensuring the persistence of your data, such that even if your system gets stolen or destroyed then the data will still be recoverable from your friends. Since the backups are encrypted your friends (or anyone else with access to their systems) won't be able to read your backed up content even if their systems are subsequently compromised.
310
 </p>
297
 </p>
311
 
298
 
312
 <p>
299
 <p>
313
-Firstly you will need to have a user account on one or more of your friends servers.  They don't necessarily need to be using Freedombone, just some version of GNU/Linux with ssh access.  They can create a user account for you with the <b>adduser &lt;username&gt;</b> command when logged in as root and then give you the username and password via a secure method, such as on paper or via an encrypted email or via an XMPP chat using OTR. Make sure that the password used is a strong one - preferably a long random string stored in a password manager - so that dictionary attacks will not be easy. Also for maximum resilience put your password manager file onto a USB thumb drive and carry it with you.
300
+Firstly you will need to have a user account on one or more of your friends servers.  They don't necessarily need to be using Freedombone, just some version of GNU/Linux with ssh access.  They can create a user account for you with the control panel on a Freedombone system or with the <b>adduser &lt;username&gt;</b> command on any other system when logged in as root and then give you the username and password via a secure method, such as on paper, via an encrypted email, Tox or via an XMPP chat using OTR. Make sure that the password used is a strong one - preferably a long random string stored in a password manager - so that dictionary attacks will not be easy. Also for maximum resilience put your password manager file onto a USB thumb drive and carry it with you.
314
 </p>
301
 </p>
315
 
302
 
316
 <div class="org-src-container">
303
 <div class="org-src-container">
317
 
304
 
318
 <pre class="src src-bash">ssh username@domainname -p 2222
305
 <pre class="src src-bash">ssh username@domainname -p 2222
319
-freedombone-remote
306
+su
307
+control
320
 </pre>
308
 </pre>
321
 </div>
309
 </div>
322
 
310
 
323
 <p>
311
 <p>
312
+Select <i>Backup and Restore</i> then <i>Configure remote backups</i>.
313
+</p>
314
+
315
+<p>
324
 You can then enter the usernames, domains and ssh logins for one or more remote servers. The system will try to backup to these remote locations once per day.
316
 You can then enter the usernames, domains and ssh logins for one or more remote servers. The system will try to backup to these remote locations once per day.
325
 </p>
317
 </p>
326
 </div>
318
 </div>
342
 <div class="org-src-container">
334
 <div class="org-src-container">
343
 
335
 
344
 <pre class="src src-bash">ssh username@domainname -p 2222
336
 <pre class="src src-bash">ssh username@domainname -p 2222
345
-freedombone-remote
346
-</pre>
347
-</div>
348
-
349
-<p>
350
-Configure the remote server login details.
351
-</p>
352
-
353
-<p>
354
-Now become the root user:
355
-</p>
356
-
357
-<div class="org-src-container">
358
-
359
-<pre class="src src-bash">su
337
+su
338
+control
360
 </pre>
339
 </pre>
361
 </div>
340
 </div>
362
 
341
 
363
 <p>
342
 <p>
364
-Plug in the USB drive containing the backup key and restore it.
343
+Select <i>Backup and Restore</i> then <i>Restore GPG key from USB (master keydrive)</i>. Select the username then plug in your keydrive and restore the key.
365
 </p>
344
 </p>
366
 
345
 
367
-<div class="org-src-container">
368
-
369
-<pre class="src src-bash">freedombone-recoverkey -u [username]
370
-</pre>
371
-</div>
372
-
373
 <p>
346
 <p>
374
-Or on a Beablebone Black:
347
+Now select <i>Configure remote backups</i> and configure the locations and logins for the remote server.
375
 </p>
348
 </p>
376
 
349
 
377
-<div class="org-src-container">
378
-
379
-<pre class="src src-bash">freedombone-recoverkey -u [username] -d sda
380
-</pre>
381
-</div>
382
-
383
 <p>
350
 <p>
384
-Then use the command:
351
+Finally select <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
385
 </p>
352
 </p>
386
-
387
-<div class="org-src-container">
388
-
389
-<pre class="src src-bash">restorefromfriend &lt;friends server domain name&gt;
390
-</pre>
391
-</div>
392
 </div>
353
 </div>
393
 </div>
354
 </div>
394
 <div id="outline-container-orgheadline7" class="outline-3">
355
 <div id="outline-container-orgheadline7" class="outline-3">
406
 
367
 
407
 <pre class="src src-bash">ssh username@domainname -p 2222
368
 <pre class="src src-bash">ssh username@domainname -p 2222
408
 su
369
 su
370
+control
409
 </pre>
371
 </pre>
410
 </div>
372
 </div>
411
 
373
 
412
 <p>
374
 <p>
413
-Then use the command:
375
+Select <i>Backup and Restore</i> then <i>Restore from remote backup</i> and enter the domain name of the remote server that you wish to restore from.
414
 </p>
376
 </p>
415
-
416
-<div class="org-src-container">
417
-
418
-<pre class="src src-bash">restorefromfriend &lt;friends server domain name&gt;
419
-</pre>
420
-</div>
421
 </div>
377
 </div>
422
 </div>
378
 </div>
423
 </div>
379
 </div>

+ 27
- 9
website/EN/faq.html View File

4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
 <title></title>
6
 <title></title>
7
-<!-- 2015-10-28 Wed 21:50 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9
 <meta  name="generator" content="Org-mode" />
9
 <meta  name="generator" content="Org-mode" />
10
 <meta  name="author" content="Bob Mottram" />
10
 <meta  name="author" content="Bob Mottram" />
277
 <h2 id="orgheadline4">Can I add more users to the system?</h2>
277
 <h2 id="orgheadline4">Can I add more users to the system?</h2>
278
 <div class="outline-text-2" id="text-orgheadline4">
278
 <div class="outline-text-2" id="text-orgheadline4">
279
 <p>
279
 <p>
280
-Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP and the blog (depending on whether the variant which you installed includes those). To add a user login as root then run the command:
280
+Yes. Freedombone can support a small number of users, for a "<i>friends and family</i>" type of home installation. This gives them access to an email account, XMPP, SIP phone and the blog (depending on whether the variant which you installed includes those). To add a user login as root then run the command:
281
 </p>
281
 </p>
282
 
282
 
283
 <div class="org-src-container">
283
 <div class="org-src-container">
287
 </div>
287
 </div>
288
 
288
 
289
 <p>
289
 <p>
290
+Or optionally with an <i>ssh public key</i>, given either as a filename or directly pasted. Specifying an ssh key will allow the user to log in more securely if they wish to use the Mutt email client.
291
+</p>
292
+
293
+<div class="org-src-container">
294
+
295
+<pre class="src src-bash">freedombone-adduser [username] [ssh public key]
296
+</pre>
297
+</div>
298
+
299
+<p>
290
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have <b>complete trust</b> in the administrator.
300
 Something to consider when having more than a single user on the system is the security situation. The original administrator user will have access to all of the data for other users (including their encryption keys), so if you do add extra users they need to have <b>complete trust</b> in the administrator.
291
 </p>
301
 </p>
292
 
302
 
320
 
330
 
321
 <pre class="src src-bash">ssh username@mydomain -p 2222
331
 <pre class="src src-bash">ssh username@mydomain -p 2222
322
 su
332
 su
323
-freedombone-sec
333
+control
324
 </pre>
334
 </pre>
325
 </div>
335
 </div>
326
 
336
 
333
 <h2 id="orgheadline7">Is metadata protected?</h2>
343
 <h2 id="orgheadline7">Is metadata protected?</h2>
334
 <div class="outline-text-2" id="text-orgheadline7">
344
 <div class="outline-text-2" id="text-orgheadline7">
335
 <p>
345
 <p>
336
-Even when using Freedombone metadata analysis by third parties is still possible. They might have a much harder time knowing what the content is, but they can potentially construct extensive dossiers based upon who communicated with your server when.  Metadata leakage is a general problem with most current web systems and it is hoped that more secure technology will become available in future. But for now if metadata protection is your main concern using Freedombone won't help.
346
+Even when using Freedombone metadata analysis by third parties is still possible. They might have a much harder time knowing what the content is, but they can potentially construct extensive dossiers based upon who communicated with your server when.  Metadata leakage is a general problem with most current web systems and it is hoped that more secure technology will become available in future. But for now if metadata protection is your main concern using Freedombone on its own won't help. You may be able to use Tor Messenger to protect the metadata of XMPP chat communications to some extent.
337
 </p>
347
 </p>
338
 </div>
348
 </div>
339
 </div>
349
 </div>
340
 <div id="outline-container-orgheadline8" class="outline-2">
350
 <div id="outline-container-orgheadline8" class="outline-2">
341
 <h2 id="orgheadline8">How do I create email processing rules?</h2>
351
 <h2 id="orgheadline8">How do I create email processing rules?</h2>
342
 <div class="outline-text-2" id="text-orgheadline8">
352
 <div class="outline-text-2" id="text-orgheadline8">
353
+<div class="org-src-container">
354
+
355
+<pre class="src src-bash">ssh username@domainname -p 2222
356
+su
357
+control
358
+</pre>
359
+</div>
360
+
343
 <p>
361
 <p>
344
-You can administer email in the traditional manner by editing folders or procmail rules, but for convenience some commands are available to make that process simpler. See the relevant manpages for more details.
362
+Select <i>Email Filtering Rules</i> then you can add rules to be applied to incoming email addresses or mailing lists. If you prefer to do things directly on the command line, without the control panel, then the following commands are available:
345
 </p>
363
 </p>
346
 
364
 
347
 <table border="2" cellspacing="0" cellpadding="6" rules="groups" frame="hsides">
365
 <table border="2" cellspacing="0" cellpadding="6" rules="groups" frame="hsides">
471
 
489
 
472
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
490
 <pre class="src src-bash">ssh myusername@mydomain -p 2222
473
 su
491
 su
474
-freedombone-sec
492
+control
475
 </pre>
493
 </pre>
476
 </div>
494
 </div>
477
 
495
 
478
 <p>
496
 <p>
479
-You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
497
+Then select <i>Security Settings</i>. You will then be able to edit the crypto settings for all of the installed applications. <b>Be very careful when editing</b>, since any mistake could make your system less secure rather than more.
480
 </p>
498
 </p>
481
 </div>
499
 </div>
482
 </div>
500
 </div>
736
 </p>
754
 </p>
737
 
755
 
738
 <p>
756
 <p>
739
-Before changing any certificates it's a good idea to make a backup of the existing system. Plug in a USB drive, log into the Freedombone and become the root user, then run the command <b>backup</b>. Backing up may take a while, but it ensures that if anything goes wrong and you mess up the certificates then there is a way to restore the previous ones.
757
+Before changing any certificates it's a good idea to make a backup of the existing system. Use <i>Backup and Restore</i> from the control panel to make a backup of the system to a USB drive. Backing up may take a while, but it ensures that if anything goes wrong and you mess up the certificates then there is a way to restore the previous ones.
740
 </p>
758
 </p>
741
 
759
 
742
 <p>
760
 <p>
759
 
777
 
760
 <pre class="src src-bash">ssh username@mydomainname -p 2222
778
 <pre class="src src-bash">ssh username@mydomainname -p 2222
761
 su
779
 su
762
-freedombone-renew-cert -h mydomainname
780
+freedombone-renew-cert -h mydomainname -p startssl
763
 </pre>
781
 </pre>
764
 </div>
782
 </div>
765
 
783
 

+ 8
- 8
website/EN/installation.html View File

4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
 <title></title>
6
 <title></title>
7
-<!-- 2015-11-01 Sun 23:01 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9
 <meta  name="generator" content="Org-mode" />
9
 <meta  name="generator" content="Org-mode" />
10
 <meta  name="author" content="Bob Mottram" />
10
 <meta  name="author" content="Bob Mottram" />
595
 
595
 
596
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
596
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
597
 su
597
 su
598
-freedombone-keydrive -u myusername -d sdb --master yes
599
-<span class="org-keyword">exit</span>
600
-<span class="org-keyword">exit</span>
598
+control
601
 </pre>
599
 </pre>
602
 </div>
600
 </div>
603
 
601
 
604
 <p>
602
 <p>
605
-If you are on a Beaglebone Black then use <i>sda</i> rather than <i>sdb</i> for the drive parameter.
603
+Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (master keydrive)</i>.
606
 </p>
604
 </p>
607
 </div>
605
 </div>
608
 </div>
606
 </div>
617
 
615
 
618
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
616
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
619
 su
617
 su
620
-freedombone-keydrive -u myusername -d sdb
621
-<span class="org-keyword">exit</span>
622
-<span class="org-keyword">exit</span>
618
+control
623
 </pre>
619
 </pre>
624
 </div>
620
 </div>
625
 
621
 
626
 <p>
622
 <p>
623
+Select <i>Backup and Restore</i> then <i>Backup GPG key to USB (fragment keydrive)</i>.
624
+</p>
625
+
626
+<p>
627
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "<i>the web of backups</i>" or "<i>the web of encryption</i>". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
627
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "<i>the web of backups</i>" or "<i>the web of encryption</i>". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
628
 </p>
628
 </p>
629
 </div>
629
 </div>

+ 2
- 2
website/EN/variants.html View File

4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
 <title></title>
6
 <title></title>
7
-<!-- 2015-09-08 Tue 19:53 -->
7
+<!-- 2015-11-03 Tue 19:49 -->
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9
 <meta  name="generator" content="Org-mode" />
9
 <meta  name="generator" content="Org-mode" />
10
 <meta  name="author" content="Bob Mottram" />
10
 <meta  name="author" content="Bob Mottram" />
215
 
215
 
216
 <tr>
216
 <tr>
217
 <td class="org-left"><b>Chat</b></td>
217
 <td class="org-left"><b>Chat</b></td>
218
-<td class="org-left">Encrypted IRC and XMPP services for one-to-one and many-to-many chat</td>
218
+<td class="org-left">Encrypted IRC, XMPP, Tox and VoIP services for one-to-one and many-to-many chat</td>
219
 </tr>
219
 </tr>
220
 
220
 
221
 <tr>
221
 <tr>