Quellcode durchsuchen

Setting hostname in gajim

Bob Mottram vor 8 Jahren
Ursprung
Commit
a4ba665017
2 geänderte Dateien mit 25 neuen und 19 gelöschten Zeilen
  1. 2
    0
      doc/EN/app_xmpp.org
  2. 23
    19
      website/EN/app_xmpp.html

+ 2
- 0
doc/EN/app_xmpp.org Datei anzeigen

40
 
40
 
41
 Go to *Edit/Preferences* and select the *Advanced* tab. Under *Global Proxy* select *Tor* and the *Close* button. Then select *Edit/Plugins* and make sure that OMEMO is active (ticked), then select the *Close* button.
41
 Go to *Edit/Preferences* and select the *Advanced* tab. Under *Global Proxy* select *Tor* and the *Close* button. Then select *Edit/Plugins* and make sure that OMEMO is active (ticked), then select the *Close* button.
42
 
42
 
43
+Go to *Edit/Accounts*, select your account then the *Connection* tab. Ensure that *Use custom hostname/port* is checked and enter your onion address there as the hostname (it can be found on the /About/ screen of the administrator control panel). Using the onion address will give you better protection against correlation attacks within the Tor network.
44
+
43
 When you start a conversation make sure that the OMEMO box is ticked. You can also click on the keys button and trust various fingerprints. Both sides will need to do that before an encrypted chat can start.
45
 When you start a conversation make sure that the OMEMO box is ticked. You can also click on the keys button and trust various fingerprints. Both sides will need to do that before an encrypted chat can start.
44
 
46
 
45
 If you wish to make backups of the OMEMO keys then they can be found within:
47
 If you wish to make backups of the OMEMO keys then they can be found within:

+ 23
- 19
website/EN/app_xmpp.html Datei anzeigen

3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
-<!-- 2016-11-12 Sat 21:12 -->
6
+<!-- 2016-12-06 Tue 11:19 -->
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9
 <title></title>
9
 <title></title>
259
 A well written article on the state of XMPP and how it compares to other chat protocols <a href="https://gultsch.de/xmpp_2016.html">can be found here</a>.
259
 A well written article on the state of XMPP and how it compares to other chat protocols <a href="https://gultsch.de/xmpp_2016.html">can be found here</a>.
260
 </p>
260
 </p>
261
 
261
 
262
-<div id="outline-container-orgfdc65c1" class="outline-2">
263
-<h2 id="orgfdc65c1">Using with Gajim</h2>
264
-<div class="outline-text-2" id="text-orgfdc65c1">
262
+<div id="outline-container-org08af6ae" class="outline-2">
263
+<h2 id="org08af6ae">Using with Gajim</h2>
264
+<div class="outline-text-2" id="text-org08af6ae">
265
 <p>
265
 <p>
266
 In mid 2016 <a href="https://gajim.org/">Gajim</a> became the first desktop XMPP client to support the <a href="https://en.wikipedia.org/wiki/OMEMO">OMEMO end-to-end security standard</a>, which is superior to the more traditional <a href="https://en.wikipedia.org/wiki/Off-the-Record_Messaging">OTR</a> since it also includes multi-user chat and the ratcheting mechanism pioneered by Open Whisper Systems. To install it:
266
 In mid 2016 <a href="https://gajim.org/">Gajim</a> became the first desktop XMPP client to support the <a href="https://en.wikipedia.org/wiki/OMEMO">OMEMO end-to-end security standard</a>, which is superior to the more traditional <a href="https://en.wikipedia.org/wiki/Off-the-Record_Messaging">OTR</a> since it also includes multi-user chat and the ratcheting mechanism pioneered by Open Whisper Systems. To install it:
267
 </p>
267
 </p>
287
 </p>
287
 </p>
288
 
288
 
289
 <p>
289
 <p>
290
+Go to <b>Edit/Accounts</b>, select your account then the <b>Connection</b> tab. Ensure that <b>Use custom hostname/port</b> is checked and enter your onion address there as the hostname (it can be found on the <i>About</i> screen of the administrator control panel). Using the onion address will give you better protection against correlation attacks within the Tor network.
291
+</p>
292
+
293
+<p>
290
 When you start a conversation make sure that the OMEMO box is ticked. You can also click on the keys button and trust various fingerprints. Both sides will need to do that before an encrypted chat can start.
294
 When you start a conversation make sure that the OMEMO box is ticked. You can also click on the keys button and trust various fingerprints. Both sides will need to do that before an encrypted chat can start.
291
 </p>
295
 </p>
292
 
296
 
305
 </div>
309
 </div>
306
 </div>
310
 </div>
307
 
311
 
308
-<div id="outline-container-org90afa1a" class="outline-2">
309
-<h2 id="org90afa1a">Using with Profanity</h2>
310
-<div class="outline-text-2" id="text-org90afa1a">
312
+<div id="outline-container-orgbf02634" class="outline-2">
313
+<h2 id="orgbf02634">Using with Profanity</h2>
314
+<div class="outline-text-2" id="text-orgbf02634">
311
 <p>
315
 <p>
312
 The <a href="https://profanity.im">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
316
 The <a href="https://profanity.im">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
313
 </p>
317
 </p>
390
 </div>
394
 </div>
391
 </div>
395
 </div>
392
 
396
 
393
-<div id="outline-container-org6aeefab" class="outline-2">
394
-<h2 id="org6aeefab">Using with Jitsi</h2>
395
-<div class="outline-text-2" id="text-org6aeefab">
397
+<div id="outline-container-org0f76f13" class="outline-2">
398
+<h2 id="org0f76f13">Using with Jitsi</h2>
399
+<div class="outline-text-2" id="text-org0f76f13">
396
 <p>
400
 <p>
397
 Jitsi can be downloaded from <a href="https://jitsi.org">https://jitsi.org</a>
401
 Jitsi can be downloaded from <a href="https://jitsi.org">https://jitsi.org</a>
398
 </p>
402
 </p>
419
 </div>
423
 </div>
420
 </div>
424
 </div>
421
 
425
 
422
-<div id="outline-container-orgefffbcb" class="outline-2">
423
-<h2 id="orgefffbcb">Using with Ubuntu</h2>
424
-<div class="outline-text-2" id="text-orgefffbcb">
426
+<div id="outline-container-org79d0ce4" class="outline-2">
427
+<h2 id="org79d0ce4">Using with Ubuntu</h2>
428
+<div class="outline-text-2" id="text-org79d0ce4">
425
 <p>
429
 <p>
426
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
430
 The default XMPP client in Ubuntu is Empathy.  Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
427
 </p>
431
 </p>
440
 </div>
444
 </div>
441
 </div>
445
 </div>
442
 
446
 
443
-<div id="outline-container-org175673d" class="outline-2">
444
-<h2 id="org175673d">Using Tor Messenger</h2>
445
-<div class="outline-text-2" id="text-org175673d">
447
+<div id="outline-container-org436abd8" class="outline-2">
448
+<h2 id="org436abd8">Using Tor Messenger</h2>
449
+<div class="outline-text-2" id="text-org436abd8">
446
 <p>
450
 <p>
447
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org">torproject.org</a> and the setup is pretty simple.
451
 Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org">torproject.org</a> and the setup is pretty simple.
448
 </p>
452
 </p>
449
 </div>
453
 </div>
450
 </div>
454
 </div>
451
 
455
 
452
-<div id="outline-container-org14cc22e" class="outline-2">
453
-<h2 id="org14cc22e">Using with Android/Conversations</h2>
454
-<div class="outline-text-2" id="text-org14cc22e">
456
+<div id="outline-container-org186f007" class="outline-2">
457
+<h2 id="org186f007">Using with Android/Conversations</h2>
458
+<div class="outline-text-2" id="text-org186f007">
455
 <p>
459
 <p>
456
 Install <a href="https://f-droid.org/">F-Droid</a>
460
 Install <a href="https://f-droid.org/">F-Droid</a>
457
 </p>
461
 </p>