Browse Source

Syncthing port

Bob Mottram 9 years ago
parent
commit
a2a5d39608
3 changed files with 83 additions and 77 deletions
  1. 20
    19
      doc/EN/installation.org
  2. BIN
      man/freedombone.1.gz
  3. 63
    58
      website/EN/installation.html

+ 20
- 19
doc/EN/installation.org View File

178
 
178
 
179
 On your internet router, typically under firewall settings, open the following ports and forward them to your server.
179
 On your internet router, typically under firewall settings, open the following ports and forward them to your server.
180
 
180
 
181
-| Service |      Ports |
182
-|---------+------------|
183
-| HTTP    |         80 |
184
-| HTTPS   |        443 |
185
-| SSH     |       2222 |
186
-| DLNA    |       1900 |
187
-| DLNA    |       8200 |
188
-| XMPP    | 5222..5223 |
189
-| XMPP    |       5269 |
190
-| XMPP    | 5280..5281 |
191
-| IRC     |       6697 |
192
-| Git     |       9418 |
193
-| Email   |         25 |
194
-| Email   |        587 |
195
-| Email   |        465 |
196
-| Email   |        993 |
197
-| VoIP    |      64738 |
198
-| VoIP    |       5060 |
199
-| Tox     |      33445 |
181
+| Service   |      Ports |
182
+|-----------+------------|
183
+| HTTP      |         80 |
184
+| HTTPS     |        443 |
185
+| SSH       |       2222 |
186
+| DLNA      |       1900 |
187
+| DLNA      |       8200 |
188
+| XMPP      | 5222..5223 |
189
+| XMPP      |       5269 |
190
+| XMPP      | 5280..5281 |
191
+| IRC       |       6697 |
192
+| Git       |       9418 |
193
+| Email     |         25 |
194
+| Email     |        587 |
195
+| Email     |        465 |
196
+| Email     |        993 |
197
+| VoIP      |      64738 |
198
+| VoIP      |       5060 |
199
+| Tox       |      33445 |
200
+| Syncthing |      22000 |
200
 
201
 
201
 * Keydrives
202
 * Keydrives
202
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
203
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:

BIN
man/freedombone.1.gz View File


+ 63
- 58
website/EN/installation.html View File

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-04-06 Wed 18:50 -->
6
+<!-- 2016-04-23 Sat 13:25 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
170
 </colgroup>
170
 </colgroup>
171
 <tbody>
171
 <tbody>
172
 <tr>
172
 <tr>
173
-<td class="org-left"><a href="#orgheadline1">Building an image for a Single Board Computer or Virtual Machine</a></td>
173
+<td class="org-left"><a href="#orgf5eb1b9">Building an image for a Single Board Computer or Virtual Machine</a></td>
174
 </tr>
174
 </tr>
175
 
175
 
176
 <tr>
176
 <tr>
177
-<td class="org-left"><a href="#orgheadline2">Checklist</a></td>
177
+<td class="org-left"><a href="#orgbb187ae">Checklist</a></td>
178
 </tr>
178
 </tr>
179
 
179
 
180
 <tr>
180
 <tr>
182
 </tr>
182
 </tr>
183
 
183
 
184
 <tr>
184
 <tr>
185
-<td class="org-left"><a href="#orgheadline3">Installation</a></td>
185
+<td class="org-left"><a href="#orgde28312">Installation</a></td>
186
 </tr>
186
 </tr>
187
 
187
 
188
 <tr>
188
 <tr>
189
-<td class="org-left"><a href="#orgheadline4">Social Key Management - the 'Unforgettable Key'</a></td>
189
+<td class="org-left"><a href="#orgfb04cde">Social Key Management - the 'Unforgettable Key'</a></td>
190
 </tr>
190
 </tr>
191
 
191
 
192
 <tr>
192
 <tr>
193
-<td class="org-left"><a href="#orgheadline5">Final Setup</a></td>
193
+<td class="org-left"><a href="#org9c24556">Final Setup</a></td>
194
 </tr>
194
 </tr>
195
 
195
 
196
 <tr>
196
 <tr>
197
-<td class="org-left"><a href="#orgheadline6">Keydrives</a></td>
197
+<td class="org-left"><a href="#org45dffb">Keydrives</a></td>
198
 </tr>
198
 </tr>
199
 
199
 
200
 <tr>
200
 <tr>
201
-<td class="org-left"><a href="#orgheadline7">On Client Machines</a></td>
201
+<td class="org-left"><a href="#orgeabcb9d">On Client Machines</a></td>
202
 </tr>
202
 </tr>
203
 
203
 
204
 <tr>
204
 <tr>
205
-<td class="org-left"><a href="#orgheadline8">Administering the system</a></td>
205
+<td class="org-left"><a href="#org53e4300">Administering the system</a></td>
206
 </tr>
206
 </tr>
207
 </tbody>
207
 </tbody>
208
 </table>
208
 </table>
209
 
209
 
210
-<div id="outline-container-orgheadline1" class="outline-2">
211
-<h2 id="orgheadline1">Building an image for a Single Board Computer or Virtual Machine</h2>
212
-<div class="outline-text-2" id="text-orgheadline1">
210
+<div id="outline-container-orgf5eb1b9" class="outline-2">
211
+<h2 id="orgf5eb1b9">Building an image for a Single Board Computer or Virtual Machine</h2>
212
+<div class="outline-text-2" id="text-orgf5eb1b9">
213
 <p>
213
 <p>
214
 You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
214
 You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
215
 </p>
215
 </p>
295
 </div>
295
 </div>
296
 </div>
296
 </div>
297
 
297
 
298
-<div id="outline-container-orgheadline2" class="outline-2">
299
-<h2 id="orgheadline2">Checklist</h2>
300
-<div class="outline-text-2" id="text-orgheadline2">
298
+<div id="outline-container-orgbb187ae" class="outline-2">
299
+<h2 id="orgbb187ae">Checklist</h2>
300
+<div class="outline-text-2" id="text-orgbb187ae">
301
 <p>
301
 <p>
302
 Before installing Freedombone you will need a few things.
302
 Before installing Freedombone you will need a few things.
303
 </p>
303
 </p>
311
 </ul>
311
 </ul>
312
 </div>
312
 </div>
313
 </div>
313
 </div>
314
-<div id="outline-container-orgheadline3" class="outline-2">
315
-<h2 id="orgheadline3">Installation</h2>
316
-<div class="outline-text-2" id="text-orgheadline3">
314
+<div id="outline-container-orgde28312" class="outline-2">
315
+<h2 id="orgde28312">Installation</h2>
316
+<div class="outline-text-2" id="text-orgde28312">
317
 <p>
317
 <p>
318
 There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
318
 There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
319
 </p>
319
 </p>
320
 </div>
320
 </div>
321
 
321
 
322
-<div id="outline-container-orgheadline9" class="outline-3">
323
-<h3 id="orgheadline9">On a Laptop, Netbook or Desktop machine</h3>
324
-<div class="outline-text-3" id="text-orgheadline9">
322
+<div id="outline-container-orgbbfdf87" class="outline-3">
323
+<h3 id="orgbbfdf87">On a Laptop, Netbook or Desktop machine</h3>
324
+<div class="outline-text-3" id="text-orgbbfdf87">
325
 <p>
325
 <p>
326
 If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
326
 If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
327
 </p>
327
 </p>
340
 </div>
340
 </div>
341
 </div>
341
 </div>
342
 
342
 
343
-<div id="outline-container-orgheadline10" class="outline-3">
344
-<h3 id="orgheadline10">On a single board computer (SBC)</h3>
345
-<div class="outline-text-3" id="text-orgheadline10">
343
+<div id="outline-container-org447e0ab" class="outline-3">
344
+<h3 id="org447e0ab">On a single board computer (SBC)</h3>
345
+<div class="outline-text-3" id="text-org447e0ab">
346
 <p>
346
 <p>
347
 Currently the following boards are supported:
347
 Currently the following boards are supported:
348
 </p>
348
 </p>
426
 </div>
426
 </div>
427
 </div>
427
 </div>
428
 
428
 
429
-<div id="outline-container-orgheadline11" class="outline-3">
430
-<h3 id="orgheadline11">As a Virtual Machine</h3>
431
-<div class="outline-text-3" id="text-orgheadline11">
429
+<div id="outline-container-org7807744" class="outline-3">
430
+<h3 id="org7807744">As a Virtual Machine</h3>
431
+<div class="outline-text-3" id="text-org7807744">
432
 <p>
432
 <p>
433
 Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
433
 Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
434
 </p>
434
 </p>
450
 </div>
450
 </div>
451
 </div>
451
 </div>
452
 
452
 
453
-<div id="outline-container-orgheadline4" class="outline-2">
454
-<h2 id="orgheadline4">Social Key Management - the 'Unforgettable Key'</h2>
455
-<div class="outline-text-2" id="text-orgheadline4">
453
+<div id="outline-container-orgfb04cde" class="outline-2">
454
+<h2 id="orgfb04cde">Social Key Management - the 'Unforgettable Key'</h2>
455
+<div class="outline-text-2" id="text-orgfb04cde">
456
 <p>
456
 <p>
457
 During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
457
 During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
458
 </p>
458
 </p>
459
 </div>
459
 </div>
460
 
460
 
461
-<div id="outline-container-orgheadline12" class="outline-3">
462
-<h3 id="orgheadline12">You have the gnupg keyring on an encrypted USB drive</h3>
463
-<div class="outline-text-3" id="text-orgheadline12">
461
+<div id="outline-container-org285c7d1" class="outline-3">
462
+<h3 id="org285c7d1">You have the gnupg keyring on an encrypted USB drive</h3>
463
+<div class="outline-text-3" id="text-org285c7d1">
464
 <p>
464
 <p>
465
 If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
465
 If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
466
 </p>
466
 </p>
467
 </div>
467
 </div>
468
 </div>
468
 </div>
469
-<div id="outline-container-orgheadline13" class="outline-3">
470
-<h3 id="orgheadline13">You have a number of key fragments on USB drives retrieved from friends</h3>
471
-<div class="outline-text-3" id="text-orgheadline13">
469
+<div id="outline-container-orgff616ab" class="outline-3">
470
+<h3 id="orgff616ab">You have a number of key fragments on USB drives retrieved from friends</h3>
471
+<div class="outline-text-3" id="text-orgff616ab">
472
 <p>
472
 <p>
473
-If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#orgheadline6">Keydrives</a>.
473
+If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#org45dffb">Keydrives</a>.
474
 </p>
474
 </p>
475
 </div>
475
 </div>
476
 </div>
476
 </div>
477
-<div id="outline-container-orgheadline14" class="outline-3">
478
-<h3 id="orgheadline14">You can specify some ssh login details for friends servers containing key fragments</h3>
479
-<div class="outline-text-3" id="text-orgheadline14">
477
+<div id="outline-container-orgff957c" class="outline-3">
478
+<h3 id="orgff957c">You can specify some ssh login details for friends servers containing key fragments</h3>
479
+<div class="outline-text-3" id="text-orgff957c">
480
 <p>
480
 <p>
481
 Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
481
 Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
482
 </p>
482
 </p>
483
 </div>
483
 </div>
484
 </div>
484
 </div>
485
 </div>
485
 </div>
486
-<div id="outline-container-orgheadline5" class="outline-2">
487
-<h2 id="orgheadline5">Final Setup</h2>
488
-<div class="outline-text-2" id="text-orgheadline5">
486
+<div id="outline-container-org9c24556" class="outline-2">
487
+<h2 id="org9c24556">Final Setup</h2>
488
+<div class="outline-text-2" id="text-org9c24556">
489
 <p>
489
 <p>
490
 Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
490
 Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
491
 </p>
491
 </p>
593
 <td class="org-left">Tox</td>
593
 <td class="org-left">Tox</td>
594
 <td class="org-right">33445</td>
594
 <td class="org-right">33445</td>
595
 </tr>
595
 </tr>
596
+
597
+<tr>
598
+<td class="org-left">Syncthing</td>
599
+<td class="org-right">22000</td>
600
+</tr>
596
 </tbody>
601
 </tbody>
597
 </table>
602
 </table>
598
 </div>
603
 </div>
599
 </div>
604
 </div>
600
 
605
 
601
-<div id="outline-container-orgheadline6" class="outline-2">
602
-<h2 id="orgheadline6">Keydrives</h2>
603
-<div class="outline-text-2" id="text-orgheadline6">
606
+<div id="outline-container-org45dffb" class="outline-2">
607
+<h2 id="org45dffb">Keydrives</h2>
608
+<div class="outline-text-2" id="text-org45dffb">
604
 <p>
609
 <p>
605
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
610
 After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
606
 </p>
611
 </p>
607
 </div>
612
 </div>
608
-<div id="outline-container-orgheadline15" class="outline-3">
609
-<h3 id="orgheadline15">Master Keydrive</h3>
610
-<div class="outline-text-3" id="text-orgheadline15">
613
+<div id="outline-container-org88a0044" class="outline-3">
614
+<h3 id="org88a0044">Master Keydrive</h3>
615
+<div class="outline-text-3" id="text-org88a0044">
611
 <p>
616
 <p>
612
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
617
 This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
613
 </p>
618
 </p>
623
 </p>
628
 </p>
624
 </div>
629
 </div>
625
 </div>
630
 </div>
626
-<div id="outline-container-orgheadline16" class="outline-3">
627
-<h3 id="orgheadline16">Fragment keydrives</h3>
628
-<div class="outline-text-3" id="text-orgheadline16">
631
+<div id="outline-container-org9e44d48" class="outline-3">
632
+<h3 id="org9e44d48">Fragment keydrives</h3>
633
+<div class="outline-text-3" id="text-org9e44d48">
629
 <p>
634
 <p>
630
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
635
 This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
631
 </p>
636
 </p>
646
 </div>
651
 </div>
647
 </div>
652
 </div>
648
 </div>
653
 </div>
649
-<div id="outline-container-orgheadline7" class="outline-2">
650
-<h2 id="orgheadline7">On Client Machines</h2>
651
-<div class="outline-text-2" id="text-orgheadline7">
654
+<div id="outline-container-orgeabcb9d" class="outline-2">
655
+<h2 id="orgeabcb9d">On Client Machines</h2>
656
+<div class="outline-text-2" id="text-orgeabcb9d">
652
 <p>
657
 <p>
653
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
658
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
654
 </p>
659
 </p>
666
 </div>
671
 </div>
667
 </div>
672
 </div>
668
 
673
 
669
-<div id="outline-container-orgheadline8" class="outline-2">
670
-<h2 id="orgheadline8">Administering the system</h2>
671
-<div class="outline-text-2" id="text-orgheadline8">
674
+<div id="outline-container-org53e4300" class="outline-2">
675
+<h2 id="org53e4300">Administering the system</h2>
676
+<div class="outline-text-2" id="text-org53e4300">
672
 <p>
677
 <p>
673
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
678
 To administer the system after installation log in via ssh, become the root user and then launch the control panel.
674
 </p>
679
 </p>