Browse Source

Deprecate VirtualBox support

It's a mostly but not entirely free system which according to the Debian wiki requires a non-free compiler to build. VirtualBox also isn't available on Parabola. If it becomes a fully free system at some time in future then this patch can be reverted.
Bob Mottram 8 years ago
parent
commit
901979c771

+ 1
- 9
doc/EN/installation.org View File

62
 freedombone-image -t beaglebone -s 8G --minimal no
62
 freedombone-image -t beaglebone -s 8G --minimal no
63
 #+END_SRC
63
 #+END_SRC
64
 
64
 
65
-To build a 64bit Virtualbox image:
66
-
67
-#+BEGIN_SRC bash
68
-freedombone-image -t virtualbox-amd64 -s 8G
69
-#+END_SRC
70
-
71
 To build a 64bit Qemu image:
65
 To build a 64bit Qemu image:
72
 
66
 
73
 #+BEGIN_SRC bash
67
 #+BEGIN_SRC bash
158
 
152
 
159
 ** As a Virtual Machine
153
 ** As a Virtual Machine
160
 
154
 
161
-Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
155
+Qemu is currently supported, since it's s fully free software system. You can run a 64 bit Qemu image with:
162
 
156
 
163
 #+BEGIN_SRC bash
157
 #+BEGIN_SRC bash
164
 qemu-system-x86_64 -m 1G filename.img
158
 qemu-system-x86_64 -m 1G filename.img
165
 #+END_SRC
159
 #+END_SRC
166
 
160
 
167
-If you are using Virtualbox then add a new VM and select the Freedombone *vdi* image.
168
-
169
 The default login will be username 'fbone' and password 'freedombone'. Take a note of the new login password and then you can proceed through the rest of the installation.
161
 The default login will be username 'fbone' and password 'freedombone'. Take a note of the new login password and then you can proceed through the rest of the installation.
170
 
162
 
171
 * Social Key Management - the 'Unforgettable Key'
163
 * Social Key Management - the 'Unforgettable Key'

BIN
man/freedombone-image.1.gz View File


+ 2
- 5
src/freedombone-image View File

503
 if [[ $IMAGE_TYPE == "qemu"* ]]; then
503
 if [[ $IMAGE_TYPE == "qemu"* ]]; then
504
     EXPECTED_EXTENSION='qcow2'
504
     EXPECTED_EXTENSION='qcow2'
505
 fi
505
 fi
506
-if [[ $IMAGE_TYPE == "virtualbox"* ]]; then
507
-    EXPECTED_EXTENSION='vdi'
508
-fi
509
 
506
 
510
 shopt -s nullglob
507
 shopt -s nullglob
511
 imgfiles=(build/${PROJECT_NAME}*.${EXPECTED_EXTENSION})
508
 imgfiles=(build/${PROJECT_NAME}*.${EXPECTED_EXTENSION})
537
 
534
 
538
 You will be able to log into it with:
535
 You will be able to log into it with:
539
 "
536
 "
540
-    if [[ $IMAGE_TYPE != "virtualbox"* && $IMAGE_TYPE != "qemu"* ]]; then
537
+    if [[ $IMAGE_TYPE != "qemu"* ]]; then
541
         echo $"    ssh $USERNAME@$DEFAULT_DOMAIN_NAME -p $SSH_PORT
538
         echo $"    ssh $USERNAME@$DEFAULT_DOMAIN_NAME -p $SSH_PORT
542
 
539
 
543
 Password: $PASSWORD
540
 Password: $PASSWORD
577
 Password: $PASSWORD" > ${CURR_DIR}/${PROJECT_NAME}_login_credentials.txt
574
 Password: $PASSWORD" > ${CURR_DIR}/${PROJECT_NAME}_login_credentials.txt
578
 chmod 600 ${CURR_DIR}/${PROJECT_NAME}_login_credentials.txt
575
 chmod 600 ${CURR_DIR}/${PROJECT_NAME}_login_credentials.txt
579
 
576
 
580
-if [[ $IMAGE_TYPE != "virtualbox"* && $IMAGE_TYPE != "qemu"* ]]; then
577
+if [[ $IMAGE_TYPE != "qemu"* ]]; then
581
     echo ''
578
     echo ''
582
     if [[ $VARIANT != 'meshclient' && $VARIANT != 'meshusb' ]]; then
579
     if [[ $VARIANT != 'meshclient' && $VARIANT != 'meshusb' ]]; then
583
         echo $'You can copy the image to a microSD card with:'
580
         echo $'You can copy the image to a microSD card with:'

+ 0
- 5
src/freedombone-image-customise View File

965
 chroot "$rootdir" adduser $username sudo
965
 chroot "$rootdir" adduser $username sudo
966
 
966
 
967
 case "$MACHINE" in
967
 case "$MACHINE" in
968
-    virtualbox)
969
-        # hide irrelevant console keyboard messages.
970
-        echo "echo \"4 4 1 7\" > /proc/sys/kernel/printk" \
971
-             >> /etc/init.d/rc.local
972
-        ;;
973
     qemu)
968
     qemu)
974
         # hide irrelevant console keyboard messages.
969
         # hide irrelevant console keyboard messages.
975
         echo "echo \"4 4 1 7\" > /proc/sys/kernel/printk" \
970
         echo "echo \"4 4 1 7\" > /proc/sys/kernel/printk" \

+ 0
- 5
src/freedombone-image-make View File

126
  --roottype btrfs \
126
  --roottype btrfs \
127
 "
127
 "
128
         ;;
128
         ;;
129
-    virtualbox)
130
-        extra_opts="\
131
- --grub \
132
- --roottype btrfs \
133
-"   ;;
134
     qemu)
129
     qemu)
135
         extra_opts="\
130
         extra_opts="\
136
  --grub \
131
  --grub \

+ 0
- 49
src/freedombone-image-makefile View File

188
 	$(SIGN)
188
 	$(SIGN)
189
 	@echo "Build complete."
189
 	@echo "Build complete."
190
 
190
 
191
-# build a virtualbox image
192
-virtualbox: virtualbox-i386
193
-
194
-virtualbox-i386: prep
195
-	$(eval ARCHITECTURE = i386)
196
-	$(eval MACHINE = virtualbox)
197
-	$(MAKE_IMAGE)
198
-	# Convert image to vdi hard drive
199
-	VBoxManage convertdd $(NAME).img $(NAME).vdi
200
-	@rm -f $(ARCHIVE)
201
-	$(XZ) $(IMAGE)
202
-	@echo ""
203
-	$(SIGN)
204
-	@echo "Build complete."
205
-
206
-virtualbox-amd64: prep
207
-	$(eval ARCHITECTURE = amd64)
208
-	$(eval MACHINE = virtualbox)
209
-	$(MAKE_IMAGE)
210
-	# Convert image to vdi hard drive
211
-	VBoxManage convertdd $(NAME).img $(NAME).vdi
212
-	@rm -f $(ARCHIVE)
213
-	$(XZ) $(IMAGE)
214
-	@echo ""
215
-	$(SIGN)
216
-	@echo "Build complete."
217
-
218
-test: test-virtualbox
219
-
220
-test-virtualbox: virtualbox
221
-	$(eval VM_NAME = $(PROJECT_NAME)-test)
222
-	VBoxManage createvm --name $(VM_NAME) --ostype "Debian" --register
223
-	VBoxManage storagectl $(VM_NAME) --name "SATA Controller" --add sata \
224
-		 --controller IntelAHCI
225
-	VBoxManage storageattach $(VM_NAME) --storagectl "SATA Controller" \
226
-		--port 0 --device 0 --type hdd --medium $(NAME).vdi
227
-	VBoxManage modifyvm $(VM_NAME) --pae on --memory 1024 --vram 128 \
228
-		--nic1 nat --natpf1 ,tcp,,$(TEST_SSH_PORT),,22
229
-	VBoxManage startvm $(VM_NAME) --type headless
230
-	sleep $(TEST_FIRSTRUN_WAIT_TIME) # wait for first-run to complete
231
-	echo frdm |sshpass -p frdm ssh -o UserKnownHostsFile=/dev/null \
232
-		-o StrictHostKeyChecking=no -t -t \
233
-		-p $(TEST_SSH_PORT) fbx@127.0.0.1 \
234
-		"sudo plinth --diagnose" \
235
-		|tee build/$(VM_NAME)-results_$(TODAY).log
236
-	VBoxManage controlvm $(VM_NAME) poweroff
237
-	VBoxManage modifyvm $(VM_NAME) --hda none
238
-	VBoxManage unregistervm $(VM_NAME) --delete
239
-
240
 # build a qemu image
191
 # build a qemu image
241
 qemu: qemu-i386
192
 qemu: qemu-i386
242
 
193
 

+ 59
- 72
website/EN/installation.html View File

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-09-22 Thu 16:51 -->
6
+<!-- 2016-10-14 Fri 16:11 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
255
 </colgroup>
255
 </colgroup>
256
 <tbody>
256
 <tbody>
257
 <tr>
257
 <tr>
258
-<td class="org-left"><a href="#orgd79c22b">Building an image for a Single Board Computer or Virtual Machine</a></td>
258
+<td class="org-left"><a href="#org7b3d684">Building an image for a Single Board Computer or Virtual Machine</a></td>
259
 </tr>
259
 </tr>
260
 
260
 
261
 <tr>
261
 <tr>
262
-<td class="org-left"><a href="#org55bbed6">Checklist</a></td>
262
+<td class="org-left"><a href="#org955c60b">Checklist</a></td>
263
 </tr>
263
 </tr>
264
 
264
 
265
 <tr>
265
 <tr>
267
 </tr>
267
 </tr>
268
 
268
 
269
 <tr>
269
 <tr>
270
-<td class="org-left"><a href="#org017cb16">Installation</a></td>
270
+<td class="org-left"><a href="#orgd4678eb">Installation</a></td>
271
 </tr>
271
 </tr>
272
 
272
 
273
 <tr>
273
 <tr>
274
-<td class="org-left"><a href="#org11c44aa">Social Key Management - the 'Unforgettable Key'</a></td>
274
+<td class="org-left"><a href="#org23e93ff">Social Key Management - the 'Unforgettable Key'</a></td>
275
 </tr>
275
 </tr>
276
 
276
 
277
 <tr>
277
 <tr>
278
-<td class="org-left"><a href="#org90d37f2">Final Setup</a></td>
278
+<td class="org-left"><a href="#orgc8c45e3">Final Setup</a></td>
279
 </tr>
279
 </tr>
280
 
280
 
281
 <tr>
281
 <tr>
282
-<td class="org-left"><a href="#orge4309c7">Keydrives</a></td>
282
+<td class="org-left"><a href="#org5f418b6">Keydrives</a></td>
283
 </tr>
283
 </tr>
284
 
284
 
285
 <tr>
285
 <tr>
286
-<td class="org-left"><a href="#org0b60a26">On Client Machines</a></td>
286
+<td class="org-left"><a href="#org542028e">On Client Machines</a></td>
287
 </tr>
287
 </tr>
288
 
288
 
289
 <tr>
289
 <tr>
290
-<td class="org-left"><a href="#org9c63345">Administering the system</a></td>
290
+<td class="org-left"><a href="#org3f1ed1f">Administering the system</a></td>
291
 </tr>
291
 </tr>
292
 </tbody>
292
 </tbody>
293
 </table>
293
 </table>
294
 
294
 
295
-<div id="outline-container-orgd79c22b" class="outline-2">
296
-<h2 id="orgd79c22b">Building an image for a Single Board Computer or Virtual Machine</h2>
297
-<div class="outline-text-2" id="text-orgd79c22b">
295
+<div id="outline-container-org7b3d684" class="outline-2">
296
+<h2 id="org7b3d684">Building an image for a Single Board Computer or Virtual Machine</h2>
297
+<div class="outline-text-2" id="text-org7b3d684">
298
 <p>
298
 <p>
299
 You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
299
 You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
300
 </p>
300
 </p>
348
 </div>
348
 </div>
349
 
349
 
350
 <p>
350
 <p>
351
-To build a 64bit Virtualbox image:
352
-</p>
353
-
354
-<div class="org-src-container">
355
-<pre class="src src-bash">freedombone-image -t virtualbox-amd64 -s 8G
356
-</pre>
357
-</div>
358
-
359
-<p>
360
 To build a 64bit Qemu image:
351
 To build a 64bit Qemu image:
361
 </p>
352
 </p>
362
 
353
 
380
 </div>
371
 </div>
381
 </div>
372
 </div>
382
 
373
 
383
-<div id="outline-container-org55bbed6" class="outline-2">
384
-<h2 id="org55bbed6">Checklist</h2>
385
-<div class="outline-text-2" id="text-org55bbed6">
374
+<div id="outline-container-org955c60b" class="outline-2">
375
+<h2 id="org955c60b">Checklist</h2>
376
+<div class="outline-text-2" id="text-org955c60b">
386
 <p>
377
 <p>
387
 Before installing Freedombone you will need a few things.
378
 Before installing Freedombone you will need a few things.
388
 </p>
379
 </p>
396
 </ul>
387
 </ul>
397
 </div>
388
 </div>
398
 </div>
389
 </div>
399
-<div id="outline-container-org017cb16" class="outline-2">
400
-<h2 id="org017cb16">Installation</h2>
401
-<div class="outline-text-2" id="text-org017cb16">
390
+<div id="outline-container-orgd4678eb" class="outline-2">
391
+<h2 id="orgd4678eb">Installation</h2>
392
+<div class="outline-text-2" id="text-orgd4678eb">
402
 <p>
393
 <p>
403
 There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
394
 There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
404
 </p>
395
 </p>
405
 </div>
396
 </div>
406
 
397
 
407
-<div id="outline-container-orgba36f85" class="outline-3">
408
-<h3 id="orgba36f85">On a Laptop, Netbook or Desktop machine</h3>
409
-<div class="outline-text-3" id="text-orgba36f85">
398
+<div id="outline-container-orgb37e388" class="outline-3">
399
+<h3 id="orgb37e388">On a Laptop, Netbook or Desktop machine</h3>
400
+<div class="outline-text-3" id="text-orgb37e388">
410
 <p>
401
 <p>
411
 If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
402
 If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
412
 </p>
403
 </p>
424
 </div>
415
 </div>
425
 </div>
416
 </div>
426
 
417
 
427
-<div id="outline-container-org7010e61" class="outline-3">
428
-<h3 id="org7010e61">On a single board computer (SBC)</h3>
429
-<div class="outline-text-3" id="text-org7010e61">
418
+<div id="outline-container-orgd247df0" class="outline-3">
419
+<h3 id="orgd247df0">On a single board computer (SBC)</h3>
420
+<div class="outline-text-3" id="text-orgd247df0">
430
 <p>
421
 <p>
431
 Currently the following boards are supported:
422
 Currently the following boards are supported:
432
 </p>
423
 </p>
504
 </div>
495
 </div>
505
 </div>
496
 </div>
506
 
497
 
507
-<div id="outline-container-org9eb1542" class="outline-3">
508
-<h3 id="org9eb1542">As a Virtual Machine</h3>
509
-<div class="outline-text-3" id="text-org9eb1542">
498
+<div id="outline-container-org84fbe0a" class="outline-3">
499
+<h3 id="org84fbe0a">As a Virtual Machine</h3>
500
+<div class="outline-text-3" id="text-org84fbe0a">
510
 <p>
501
 <p>
511
-Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
502
+Qemu is currently supported, since it's s fully free software system. You can run a 64 bit Qemu image with:
512
 </p>
503
 </p>
513
 
504
 
514
 <div class="org-src-container">
505
 <div class="org-src-container">
517
 </div>
508
 </div>
518
 
509
 
519
 <p>
510
 <p>
520
-If you are using Virtualbox then add a new VM and select the Freedombone <b>vdi</b> image.
521
-</p>
522
-
523
-<p>
524
 The default login will be username 'fbone' and password 'freedombone'. Take a note of the new login password and then you can proceed through the rest of the installation.
511
 The default login will be username 'fbone' and password 'freedombone'. Take a note of the new login password and then you can proceed through the rest of the installation.
525
 </p>
512
 </p>
526
 </div>
513
 </div>
527
 </div>
514
 </div>
528
 </div>
515
 </div>
529
 
516
 
530
-<div id="outline-container-org11c44aa" class="outline-2">
531
-<h2 id="org11c44aa">Social Key Management - the 'Unforgettable Key'</h2>
532
-<div class="outline-text-2" id="text-org11c44aa">
517
+<div id="outline-container-org23e93ff" class="outline-2">
518
+<h2 id="org23e93ff">Social Key Management - the 'Unforgettable Key'</h2>
519
+<div class="outline-text-2" id="text-org23e93ff">
533
 <p>
520
 <p>
534
 During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
521
 During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
535
 </p>
522
 </p>
536
 </div>
523
 </div>
537
 
524
 
538
-<div id="outline-container-orgbf3c5bf" class="outline-3">
539
-<h3 id="orgbf3c5bf">You have the gnupg keyring on an encrypted USB drive</h3>
540
-<div class="outline-text-3" id="text-orgbf3c5bf">
525
+<div id="outline-container-orgff516ed" class="outline-3">
526
+<h3 id="orgff516ed">You have the gnupg keyring on an encrypted USB drive</h3>
527
+<div class="outline-text-3" id="text-orgff516ed">
541
 <p>
528
 <p>
542
 If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
529
 If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
543
 </p>
530
 </p>
544
 </div>
531
 </div>
545
 </div>
532
 </div>
546
-<div id="outline-container-org17a4ad3" class="outline-3">
547
-<h3 id="org17a4ad3">You have a number of key fragments on USB drives retrieved from friends</h3>
548
-<div class="outline-text-3" id="text-org17a4ad3">
533
+<div id="outline-container-orga588ce7" class="outline-3">
534
+<h3 id="orga588ce7">You have a number of key fragments on USB drives retrieved from friends</h3>
535
+<div class="outline-text-3" id="text-orga588ce7">
549
 <p>
536
 <p>
550
-If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#orge4309c7">Keydrives</a>.
537
+If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#org5f418b6">Keydrives</a>.
551
 </p>
538
 </p>
552
 </div>
539
 </div>
553
 </div>
540
 </div>
554
-<div id="outline-container-orgd982332" class="outline-3">
555
-<h3 id="orgd982332">You can specify some ssh login details for friends servers containing key fragments</h3>
556
-<div class="outline-text-3" id="text-orgd982332">
541
+<div id="outline-container-org45458e2" class="outline-3">
542
+<h3 id="org45458e2">You can specify some ssh login details for friends servers containing key fragments</h3>
543
+<div class="outline-text-3" id="text-org45458e2">
557
 <p>
544
 <p>
558
 Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
545
 Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
559
 </p>
546
 </p>
560
 </div>
547
 </div>
561
 </div>
548
 </div>
562
 </div>
549
 </div>
563
-<div id="outline-container-org90d37f2" class="outline-2">
564
-<h2 id="org90d37f2">Final Setup</h2>
565
-<div class="outline-text-2" id="text-org90d37f2">
550
+<div id="outline-container-orgc8c45e3" class="outline-2">
551
+<h2 id="orgc8c45e3">Final Setup</h2>
552
+<div class="outline-text-2" id="text-orgc8c45e3">
566
 <p>
553
 <p>
567
 Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
554
 Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
568
 </p>
555
 </p>
680
 </div>
667
 </div>
681
 </div>
668
 </div>
682
 
669
 
683
-<div id="outline-container-orge4309c7" class="outline-2">
684
-<h2 id="orge4309c7">Keydrives</h2>
685
-<div class="outline-text-2" id="text-orge4309c7">
670
+<div id="outline-container-org5f418b6" class="outline-2">
671
+<h2 id="org5f418b6">Keydrives</h2>
672
+<div class="outline-text-2" id="text-org5f418b6">
686
 <p>
673
 <p>
687
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
674
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
688
 </p>
675
 </p>
689
 </div>
676
 </div>
690
-<div id="outline-container-org3f9bab9" class="outline-3">
691
-<h3 id="org3f9bab9">Master Keydrive</h3>
692
-<div class="outline-text-3" id="text-org3f9bab9">
677
+<div id="outline-container-org94c4265" class="outline-3">
678
+<h3 id="org94c4265">Master Keydrive</h3>
679
+<div class="outline-text-3" id="text-org94c4265">
693
 <p>
680
 <p>
694
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
681
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
695
 </p>
682
 </p>
704
 </p>
691
 </p>
705
 </div>
692
 </div>
706
 </div>
693
 </div>
707
-<div id="outline-container-orgad83839" class="outline-3">
708
-<h3 id="orgad83839">Fragment keydrives</h3>
709
-<div class="outline-text-3" id="text-orgad83839">
694
+<div id="outline-container-org4ff71c3" class="outline-3">
695
+<h3 id="org4ff71c3">Fragment keydrives</h3>
696
+<div class="outline-text-3" id="text-org4ff71c3">
710
 <p>
697
 <p>
711
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
698
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
712
 </p>
699
 </p>
726
 </div>
713
 </div>
727
 </div>
714
 </div>
728
 </div>
715
 </div>
729
-<div id="outline-container-org0b60a26" class="outline-2">
730
-<h2 id="org0b60a26">On Client Machines</h2>
731
-<div class="outline-text-2" id="text-org0b60a26">
716
+<div id="outline-container-org542028e" class="outline-2">
717
+<h2 id="org542028e">On Client Machines</h2>
718
+<div class="outline-text-2" id="text-org542028e">
732
 <p>
719
 <p>
733
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
720
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
734
 </p>
721
 </p>
745
 </div>
732
 </div>
746
 </div>
733
 </div>
747
 
734
 
748
-<div id="outline-container-org9c63345" class="outline-2">
749
-<h2 id="org9c63345">Administering the system</h2>
750
-<div class="outline-text-2" id="text-org9c63345">
735
+<div id="outline-container-org3f1ed1f" class="outline-2">
736
+<h2 id="org3f1ed1f">Administering the system</h2>
737
+<div class="outline-text-2" id="text-org3f1ed1f">
751
 <p>
738
 <p>
752
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
739
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
753
 </p>
740
 </p>