Browse Source

Modifying documentation to use the control panel

Bob Mottram 9 years ago
parent
commit
9460b62c01
2 changed files with 12 additions and 13 deletions
  1. 5
    7
      doc/EN/installation.org
  2. 7
    6
      doc/EN/usage.org

+ 5
- 7
doc/EN/installation.org View File

190
 #+BEGIN_SRC bash
190
 #+BEGIN_SRC bash
191
 ssh myusername@mydomainname -p 2222
191
 ssh myusername@mydomainname -p 2222
192
 su
192
 su
193
-freedombone-keydrive -u myusername -d sdb --master yes
194
-exit
195
-exit
193
+control
196
 #+END_SRC
194
 #+END_SRC
197
 
195
 
198
-If you are on a Beaglebone Black then use /sda/ rather than /sdb/ for the drive parameter.
196
+Select /Backup and Restore/ then /Backup GPG key to USB (master keydrive)/.
199
 ** Fragment keydrives
197
 ** Fragment keydrives
200
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be done from the /Disk Utility/ application]]. Plug it into the Freedombone system then from your local machine run the following commands:
198
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be done from the /Disk Utility/ application]]. Plug it into the Freedombone system then from your local machine run the following commands:
201
 
199
 
202
 #+BEGIN_SRC bash
200
 #+BEGIN_SRC bash
203
 ssh myusername@mydomainname -p 2222
201
 ssh myusername@mydomainname -p 2222
204
 su
202
 su
205
-freedombone-keydrive -u myusername -d sdb
206
-exit
207
-exit
203
+control
208
 #+END_SRC
204
 #+END_SRC
209
 
205
 
206
+Select /Backup and Restore/ then /Backup GPG key to USB (fragment keydrive)/.
207
+
210
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
208
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
211
 * On Client Machines
209
 * On Client Machines
212
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
210
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.

+ 7
- 6
doc/EN/usage.org View File

36
 cat ~/.ssh/id_rsa.pub
36
 cat ~/.ssh/id_rsa.pub
37
 #+END_SRC
37
 #+END_SRC
38
 
38
 
39
-Copy the contents of *~/.ssh/id_rsa* and *~/.ssh/id_rsa.pub* to you password manager, together with the private key password if you created one.
40
-
41
-ssh to the Freedombone and edit the authorized keys:
39
+Log into your system and open the control panel.
42
 
40
 
43
 #+BEGIN_SRC bash
41
 #+BEGIN_SRC bash
44
 ssh username@domain -p 2222
42
 ssh username@domain -p 2222
45
-emacs ~/.ssh/authorized_keys
43
+su
44
+control
46
 #+END_SRC
45
 #+END_SRC
47
 
46
 
48
-Now copy and paste the contents of *id_rsa.pub* into the authorized_keys file. Save the file and exit. Open another terminal window and try logging in again and you should notice that you are no longer asked for a password, because the ssh key is used instead.
47
+Select /Manage Users/ then /Change user ssh public key/. Copy and paste the public key here, then exit.
48
+
49
+It's a good idea to also copy the contents of *~/.ssh/id_rsa* and *~/.ssh/id_rsa.pub* to you password manager, together with the private key password if you created one.
49
 
50
 
50
 There are advantages and disadvantages to using ssh keys for logins. The advantage is that this is much more secure than a memorised password, but the disadvantage is that you need to carry your ssh keys around and be able to install them on any computer of mobile device that you use. In high security or hostile infosec environments it may not be possible to carry or use USB thumb drives containing your keys and so memorised passwords may be the only available choice.
51
 There are advantages and disadvantages to using ssh keys for logins. The advantage is that this is much more secure than a memorised password, but the disadvantage is that you need to carry your ssh keys around and be able to install them on any computer of mobile device that you use. In high security or hostile infosec environments it may not be possible to carry or use USB thumb drives containing your keys and so memorised passwords may be the only available choice.
51
 
52
 
52
-If you wish to only use ssh keys then log in to the Freedombone and edit */etc/ssh/sshd_config*, then change *PasswordAuthentication* to "no", save and run *service ssh restart*. Any subsequent attempts to log in via a password will then be denied.
53
+If you wish to only use ssh keys then log in to the Freedombone, become the root user and open the control panel with the 'control' command. Select /Security Settings/ then keep hitting enter until you reach the question about allowing password logins. Select "no" for that, then apply the settings. Any subsequent attempts to log in via a password will then be denied.
53
 
54
 
54
 * Using Email
55
 * Using Email
55
 ** A technical note about email transport security
56
 ** A technical note about email transport security