Browse Source

Modifying documentation to use the control panel

Bob Mottram 9 years ago
parent
commit
9460b62c01
2 changed files with 12 additions and 13 deletions
  1. 5
    7
      doc/EN/installation.org
  2. 7
    6
      doc/EN/usage.org

+ 5
- 7
doc/EN/installation.org View File

@@ -190,23 +190,21 @@ This is the traditional security model in which you carry your full keyring on a
190 190
 #+BEGIN_SRC bash
191 191
 ssh myusername@mydomainname -p 2222
192 192
 su
193
-freedombone-keydrive -u myusername -d sdb --master yes
194
-exit
195
-exit
193
+control
196 194
 #+END_SRC
197 195
 
198
-If you are on a Beaglebone Black then use /sda/ rather than /sdb/ for the drive parameter.
196
+Select /Backup and Restore/ then /Backup GPG key to USB (master keydrive)/.
199 197
 ** Fragment keydrives
200 198
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this [[https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage][can be done from the /Disk Utility/ application]]. Plug it into the Freedombone system then from your local machine run the following commands:
201 199
 
202 200
 #+BEGIN_SRC bash
203 201
 ssh myusername@mydomainname -p 2222
204 202
 su
205
-freedombone-keydrive -u myusername -d sdb
206
-exit
207
-exit
203
+control
208 204
 #+END_SRC
209 205
 
206
+Select /Backup and Restore/ then /Backup GPG key to USB (fragment keydrive)/.
207
+
210 208
 Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
211 209
 * On Client Machines
212 210
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.

+ 7
- 6
doc/EN/usage.org View File

@@ -36,20 +36,21 @@ For extra security you may also want to add a passphrase to the ssh private key.
36 36
 cat ~/.ssh/id_rsa.pub
37 37
 #+END_SRC
38 38
 
39
-Copy the contents of *~/.ssh/id_rsa* and *~/.ssh/id_rsa.pub* to you password manager, together with the private key password if you created one.
40
-
41
-ssh to the Freedombone and edit the authorized keys:
39
+Log into your system and open the control panel.
42 40
 
43 41
 #+BEGIN_SRC bash
44 42
 ssh username@domain -p 2222
45
-emacs ~/.ssh/authorized_keys
43
+su
44
+control
46 45
 #+END_SRC
47 46
 
48
-Now copy and paste the contents of *id_rsa.pub* into the authorized_keys file. Save the file and exit. Open another terminal window and try logging in again and you should notice that you are no longer asked for a password, because the ssh key is used instead.
47
+Select /Manage Users/ then /Change user ssh public key/. Copy and paste the public key here, then exit.
48
+
49
+It's a good idea to also copy the contents of *~/.ssh/id_rsa* and *~/.ssh/id_rsa.pub* to you password manager, together with the private key password if you created one.
49 50
 
50 51
 There are advantages and disadvantages to using ssh keys for logins. The advantage is that this is much more secure than a memorised password, but the disadvantage is that you need to carry your ssh keys around and be able to install them on any computer of mobile device that you use. In high security or hostile infosec environments it may not be possible to carry or use USB thumb drives containing your keys and so memorised passwords may be the only available choice.
51 52
 
52
-If you wish to only use ssh keys then log in to the Freedombone and edit */etc/ssh/sshd_config*, then change *PasswordAuthentication* to "no", save and run *service ssh restart*. Any subsequent attempts to log in via a password will then be denied.
53
+If you wish to only use ssh keys then log in to the Freedombone, become the root user and open the control panel with the 'control' command. Select /Security Settings/ then keep hitting enter until you reach the question about allowing password logins. Select "no" for that, then apply the settings. Any subsequent attempts to log in via a password will then be denied.
53 54
 
54 55
 * Using Email
55 56
 ** A technical note about email transport security