Просмотр исходного кода

Documentation for social key management

Bob Mottram 9 лет назад
Родитель
Сommit
f98e243718
2 измененных файлов: 255 добавлений и 136 удалений
  1. 38
    8
      doc/EN/installation.org
  2. 217
    128
      website/EN/installation.html

+ 38
- 8
doc/EN/installation.org Просмотреть файл

7
 #+BEGIN_CENTER
7
 #+BEGIN_CENTER
8
 [[./images/logo.png]]
8
 [[./images/logo.png]]
9
 #+END_CENTER
9
 #+END_CENTER
10
-| [[file:index.html][Home]] | [[Preparation for the Beaglebone Black]] | [[Checklist]] | [[GPG Keys]] | [[Interactive Setup]] | [[Non-Interactive Setup]] | [[Post-Setup]] | [[On Client Machines]] |
10
+| [[file:index.html][Home]] | [[Preparation for the Beaglebone Black]] | [[Checklist]] | [[Interactive Setup]] | [[Non-Interactive Setup]] | [[Post-Setup]] | [[Keydrives]] | [[On Client Machines]] |
11
 
11
 
12
 
12
 
13
 * Preparation for the Beaglebone Black
13
 * Preparation for the Beaglebone Black
57
   * If you want to set up a social network or microblog then you will need SSL certificates corresponding to those domains
57
   * If you want to set up a social network or microblog then you will need SSL certificates corresponding to those domains
58
   * Have ssh access to the system
58
   * Have ssh access to the system
59
 
59
 
60
-* GPG Keys
61
-If you have existing GPG keys then copy the .gnupg directory onto the system.
62
-
63
-#+BEGIN_SRC bash
64
-scp -r ~/.gnupg username@freedombone_IP_address:/home/username
65
-#+END_SRC
66
-
67
 * Interactive Setup
60
 * Interactive Setup
68
 The interactive server configuration setup is recommended for most users. On the system where freedombone is to be installed create a configuration file.
61
 The interactive server configuration setup is recommended for most users. On the system where freedombone is to be installed create a configuration file.
69
 
62
 
126
 MICROBLOG_DOMAIN_NAME=mymicroblogdomain
119
 MICROBLOG_DOMAIN_NAME=mymicroblogdomain
127
 REDMATRIX_DOMAIN_NAME=myredmatrixdomain
120
 REDMATRIX_DOMAIN_NAME=myredmatrixdomain
128
 OWNCLOUD_DOMAIN_NAME=myownclouddomain
121
 OWNCLOUD_DOMAIN_NAME=myownclouddomain
122
+HWRNG_TYPE=haveged
123
+ENABLE_SOCIAL_KEY_MANAGEMENT="no"
129
 #+END_SRC
124
 #+END_SRC
130
 
125
 
131
 Both of the IP addresses are local IP addresses, typically of the form 192.168.x.x, with one being for the system and the other being for the internet router.
126
 Both of the IP addresses are local IP addresses, typically of the form 192.168.x.x, with one being for the system and the other being for the internet router.
142
 
137
 
143
 Also see the manpage for additional options which can be used instead of a configuration file.
138
 Also see the manpage for additional options which can be used instead of a configuration file.
144
 
139
 
140
+* Social Key Management
141
+If you are using the interactive installer then you will be aked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
142
+
143
+** You have the gnupg keyring on an encrypted USB drive
144
+If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
145
+** You have a number of key fragments on USB drives retrieved from friends
146
+If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more [[Keydrives]].
147
+** You can specify some ssh login details for friends servers containing key fragments
148
+Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
145
 * Post-Setup
149
 * Post-Setup
146
 Setup of the server and installation of all the relevant packages is not quick, and depends upon which variant you choose and your internet bandwidth. Allow about three hours for a full installation on the Beaglebone Black. On the Beaglebone installation is in two parts, since a reboot is needed to enable the hardware random number generator and zram.
150
 Setup of the server and installation of all the relevant packages is not quick, and depends upon which variant you choose and your internet bandwidth. Allow about three hours for a full installation on the Beaglebone Black. On the Beaglebone installation is in two parts, since a reboot is needed to enable the hardware random number generator and zram.
147
 
151
 
174
 | Email   |        993 |
178
 | Email   |        993 |
175
 | VoIP    |      64738 |
179
 | VoIP    |      64738 |
176
 
180
 
181
+* Keydrives
182
+After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
183
+** Master Keydrive
184
+This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the "Discs" application. Then plug it into the Freedombone system, then from your local machine run:
185
+
186
+#+BEGIN_SRC bash
187
+ssh myusername@mydomainname -p 2222
188
+su
189
+freedombone-keydrive -u myusername -d sdb --master yes
190
+exit
191
+exit
192
+#+END_SRC
193
+
194
+If you are on a Beaglebone Black then use /sda/ rather than /sdb/ for the drive parameter.
195
+** Fragment keydrives
196
+This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the "Discs" application. Plug it into the Freedombone system then from your local machine run the following commands:
197
+
198
+#+BEGIN_SRC bash
199
+ssh myusername@mydomainname -p 2222
200
+su
201
+freedombone-keydrive -u myusername -d sdb
202
+exit
203
+exit
204
+#+END_SRC
205
+
206
+Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
177
 * On Client Machines
207
 * On Client Machines
178
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
208
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
179
 
209
 

+ 217
- 128
website/EN/installation.html Просмотреть файл

4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5
 <head>
5
 <head>
6
 <title></title>
6
 <title></title>
7
-<!-- 2015-02-03 Tue 20:51 -->
7
+<!-- 2015-07-05 Sun 19:34 -->
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9
 <meta  name="generator" content="Org-mode" />
9
 <meta  name="generator" content="Org-mode" />
10
 <meta  name="author" content="Bob Mottram" />
10
 <meta  name="author" content="Bob Mottram" />
11
 <meta  name="description" content="Turn the Beaglebone Black into a personal communications server"
11
 <meta  name="description" content="Turn the Beaglebone Black into a personal communications server"
12
  />
12
  />
13
 <meta  name="keywords" content="freedombox, debian, beaglebone, red matrix, email, web server, home server, internet, censorship, surveillance, social network, irc, jabber" />
13
 <meta  name="keywords" content="freedombox, debian, beaglebone, red matrix, email, web server, home server, internet, censorship, surveillance, social network, irc, jabber" />
14
+<meta  name="viewport" content="width=device-width, initial-scale=1" />
14
 <style type="text/css">
15
 <style type="text/css">
15
  <!--/*--><![CDATA[/*><!--*/
16
  <!--/*--><![CDATA[/*><!--*/
16
-  .title  { text-align: center; }
17
+  .title  { text-align: center;
18
+             margin-bottom: .2em; }
19
+  .subtitle { text-align: center;
20
+              font-size: medium;
21
+              font-weight: bold;
22
+              margin-top:0; }
17
   .todo   { font-family: monospace; color: red; }
23
   .todo   { font-family: monospace; color: red; }
18
-  .done   { color: green; }
24
+  .done   { font-family: monospace; color: green; }
25
+  .priority { font-family: monospace; color: orange; }
19
   .tag    { background-color: #eee; font-family: monospace;
26
   .tag    { background-color: #eee; font-family: monospace;
20
             padding: 2px; font-size: 80%; font-weight: normal; }
27
             padding: 2px; font-size: 80%; font-weight: normal; }
21
   .timestamp { color: #bebebe; }
28
   .timestamp { color: #bebebe; }
22
   .timestamp-kwd { color: #5f9ea0; }
29
   .timestamp-kwd { color: #5f9ea0; }
23
-  .right  { margin-left: auto; margin-right: 0px;  text-align: right; }
24
-  .left   { margin-left: 0px;  margin-right: auto; text-align: left; }
25
-  .center { margin-left: auto; margin-right: auto; text-align: center; }
30
+  .org-right  { margin-left: auto; margin-right: 0px;  text-align: right; }
31
+  .org-left   { margin-left: 0px;  margin-right: auto; text-align: left; }
32
+  .org-center { margin-left: auto; margin-right: auto; text-align: center; }
26
   .underline { text-decoration: underline; }
33
   .underline { text-decoration: underline; }
27
   #postamble p, #preamble p { font-size: 90%; margin: .2em; }
34
   #postamble p, #preamble p { font-size: 90%; margin: .2em; }
28
   p.verse { margin-left: 3%; }
35
   p.verse { margin-left: 3%; }
61
   caption.t-above { caption-side: top; }
68
   caption.t-above { caption-side: top; }
62
   caption.t-bottom { caption-side: bottom; }
69
   caption.t-bottom { caption-side: bottom; }
63
   td, th { vertical-align:top;  }
70
   td, th { vertical-align:top;  }
64
-  th.right  { text-align: center;  }
65
-  th.left   { text-align: center;   }
66
-  th.center { text-align: center; }
67
-  td.right  { text-align: right;  }
68
-  td.left   { text-align: left;   }
69
-  td.center { text-align: center; }
71
+  th.org-right  { text-align: center;  }
72
+  th.org-left   { text-align: center;   }
73
+  th.org-center { text-align: center; }
74
+  td.org-right  { text-align: right;  }
75
+  td.org-left   { text-align: left;   }
76
+  td.org-center { text-align: center; }
70
   dt { font-weight: bold; }
77
   dt { font-weight: bold; }
71
   .footpara:nth-child(2) { display: inline; }
78
   .footpara:nth-child(2) { display: inline; }
72
   .footpara { display: block; }
79
   .footpara { display: block; }
147
 <a name="top" id="top"></a>
154
 <a name="top" id="top"></a>
148
 </div>
155
 </div>
149
 <div id="content">
156
 <div id="content">
150
-<h1 class="title"></h1>
157
+<div id="table-of-contents">
158
+<h2>Table of Contents</h2>
159
+<div id="text-table-of-contents">
160
+<ul>
161
+<li><a href="#orgheadline1">Preparation for the Beaglebone Black</a></li>
162
+<li><a href="#orgheadline2">Checklist</a></li>
163
+<li><a href="#orgheadline3">Interactive Setup</a></li>
164
+<li><a href="#orgheadline4">Non-Interactive Setup</a></li>
165
+<li><a href="#orgheadline8">Social Key Management</a>
166
+<ul>
167
+<li><a href="#orgheadline9">You have the gnupg keyring on an encrypted USB drive</a></li>
168
+<li><a href="#orgheadline10">You have a number of key fragments on USB drives retrieved from friends</a></li>
169
+<li><a href="#orgheadline11">You can specify some ssh login details for friends servers containing key fragments</a></li>
170
+</ul>
171
+</li>
172
+<li><a href="#orgheadline5">Post-Setup</a></li>
173
+<li><a href="#orgheadline6">Keydrives</a>
174
+<ul>
175
+<li><a href="#orgheadline12">Master Keydrive</a></li>
176
+<li><a href="#orgheadline13">Fragment keydrives</a></li>
177
+</ul>
178
+</li>
179
+<li><a href="#orgheadline7">On Client Machines</a></li>
180
+</ul>
181
+</div>
182
+</div>
151
 <div class="center">
183
 <div class="center">
152
 
184
 
153
 <div class="figure">
185
 <div class="figure">
159
 
191
 
160
 
192
 
161
 <colgroup>
193
 <colgroup>
162
-<col  class="left" />
194
+<col  class="org-left" />
163
 
195
 
164
-<col  class="left" />
196
+<col  class="org-left" />
165
 
197
 
166
-<col  class="left" />
198
+<col  class="org-left" />
167
 
199
 
168
-<col  class="left" />
200
+<col  class="org-left" />
169
 
201
 
170
-<col  class="left" />
202
+<col  class="org-left" />
171
 
203
 
172
-<col  class="left" />
204
+<col  class="org-left" />
173
 
205
 
174
-<col  class="left" />
206
+<col  class="org-left" />
175
 
207
 
176
-<col  class="left" />
208
+<col  class="org-left" />
177
 </colgroup>
209
 </colgroup>
178
 <tbody>
210
 <tbody>
179
 <tr>
211
 <tr>
180
-<td class="left"><a href="index.html">Home</a></td>
181
-<td class="left"><a href="#unnumbered-1">Preparation for the Beaglebone Black</a></td>
182
-<td class="left"><a href="#unnumbered-2">Checklist</a></td>
183
-<td class="left"><a href="#unnumbered-3">GPG Keys</a></td>
184
-<td class="left"><a href="#unnumbered-4">Interactive Setup</a></td>
185
-<td class="left"><a href="#unnumbered-5">Non-Interactive Setup</a></td>
186
-<td class="left"><a href="#unnumbered-6">Post-Setup</a></td>
187
-<td class="left"><a href="#unnumbered-7">On Client Machines</a></td>
212
+<td class="org-left"><a href="index.html">Home</a></td>
213
+<td class="org-left"><a href="#orgheadline1">Preparation for the Beaglebone Black</a></td>
214
+<td class="org-left"><a href="#orgheadline2">Checklist</a></td>
215
+<td class="org-left"><a href="#orgheadline3">Interactive Setup</a></td>
216
+<td class="org-left"><a href="#orgheadline4">Non-Interactive Setup</a></td>
217
+<td class="org-left"><a href="#orgheadline5">Post-Setup</a></td>
218
+<td class="org-left"><a href="#orgheadline6">Keydrives</a></td>
219
+<td class="org-left"><a href="#orgheadline7">On Client Machines</a></td>
188
 </tr>
220
 </tr>
189
 </tbody>
221
 </tbody>
190
 </table>
222
 </table>
191
 
223
 
192
 
224
 
193
-<div id="outline-container-unnumbered-1" class="outline-2">
194
-<h2 id="unnumbered-1">Preparation for the Beaglebone Black</h2>
195
-<div class="outline-text-2" id="text-unnumbered-1">
225
+<div id="outline-container-orgheadline1" class="outline-2">
226
+<h2 id="orgheadline1">Preparation for the Beaglebone Black</h2>
227
+<div class="outline-text-2" id="text-orgheadline1">
196
 <p>
228
 <p>
197
 This section is specific to the Beaglebone Black hardware. If you're not using that hardware then just skip to the next section.
229
 This section is specific to the Beaglebone Black hardware. If you're not using that hardware then just skip to the next section.
198
 </p>
230
 </p>
202
 </p>
234
 </p>
203
 
235
 
204
 <ul class="org-ul">
236
 <ul class="org-ul">
205
-<li>A Beaglebone Black
206
-</li>
207
-<li>A MicroSD card
208
-</li>
209
-<li>Ethernet cable
210
-</li>
211
-<li>Optionally a 5V 2A power supply for the Beaglebone Black
212
-</li>
213
-<li>Access to the internet via a router with ethernet sockets
214
-</li>
215
-<li>USB thumb drive (for backups or storing media)
216
-</li>
217
-<li>One or more domains available via a dynamic DNS provider, such as <a href="https://freedns.afraid.org/">https://freedns.afraid.org/</a>
218
-</li>
219
-<li>A purchased domain name and SSL certificate (only needed for Red Matrix)
220
-</li>
221
-<li>A laptop or desktop machine with the ability to write to a microSD card (might need an adaptor)
222
-</li>
237
+<li>A Beaglebone Black</li>
238
+<li>A MicroSD card</li>
239
+<li>Ethernet cable</li>
240
+<li>Optionally a 5V 2A power supply for the Beaglebone Black</li>
241
+<li>Access to the internet via a router with ethernet sockets</li>
242
+<li>USB thumb drive (for backups or storing media)</li>
243
+<li>One or more domains available via a dynamic DNS provider, such as <a href="https://freedns.afraid.org/">https://freedns.afraid.org/</a></li>
244
+<li>A purchased domain name and SSL certificate (only needed for Red Matrix)</li>
245
+<li>A laptop or desktop machine with the ability to write to a microSD card (might need an adaptor)</li>
223
 </ul>
246
 </ul>
224
 
247
 
225
 <p>
248
 <p>
260
 </div>
283
 </div>
261
 </div>
284
 </div>
262
 
285
 
263
-<div id="outline-container-unnumbered-2" class="outline-2">
264
-<h2 id="unnumbered-2">Checklist</h2>
265
-<div class="outline-text-2" id="text-unnumbered-2">
286
+<div id="outline-container-orgheadline2" class="outline-2">
287
+<h2 id="orgheadline2">Checklist</h2>
288
+<div class="outline-text-2" id="text-orgheadline2">
266
 <p>
289
 <p>
267
 Before running the freedombone command you will need a few things.
290
 Before running the freedombone command you will need a few things.
268
 </p>
291
 </p>
269
 
292
 
270
 <ul class="org-ul">
293
 <ul class="org-ul">
271
-<li>Have some domains, or subdomains, registered with a dynamic DNS service
272
-</li>
273
-<li>System with a new installation of Debian Jessie
274
-</li>
275
-<li>Ethernet connection to an internet router
276
-</li>
277
-<li>It is possible to forward ports from the internet router to the system
278
-</li>
279
-<li>If you want to set up a social network or microblog then you will need SSL certificates corresponding to those domains
280
-</li>
281
-<li>Have ssh access to the system
282
-</li>
294
+<li>Have some domains, or subdomains, registered with a dynamic DNS service</li>
295
+<li>System with a new installation of Debian Jessie</li>
296
+<li>Ethernet connection to an internet router</li>
297
+<li>It is possible to forward ports from the internet router to the system</li>
298
+<li>If you want to set up a social network or microblog then you will need SSL certificates corresponding to those domains</li>
299
+<li>Have ssh access to the system</li>
283
 </ul>
300
 </ul>
284
 </div>
301
 </div>
285
 </div>
302
 </div>
286
 
303
 
287
-<div id="outline-container-unnumbered-3" class="outline-2">
288
-<h2 id="unnumbered-3">GPG Keys</h2>
289
-<div class="outline-text-2" id="text-unnumbered-3">
290
-<p>
291
-If you have existing GPG keys then copy the .gnupg directory onto the system.
292
-</p>
293
-
294
-<div class="org-src-container">
295
-
296
-<pre class="src src-bash">scp -r ~/.gnupg username@freedombone_IP_address:/home/username
297
-</pre>
298
-</div>
299
-</div>
300
-</div>
301
-
302
-<div id="outline-container-unnumbered-4" class="outline-2">
303
-<h2 id="unnumbered-4">Interactive Setup</h2>
304
-<div class="outline-text-2" id="text-unnumbered-4">
304
+<div id="outline-container-orgheadline3" class="outline-2">
305
+<h2 id="orgheadline3">Interactive Setup</h2>
306
+<div class="outline-text-2" id="text-orgheadline3">
305
 <p>
307
 <p>
306
 The interactive server configuration setup is recommended for most users. On the system where freedombone is to be installed create a configuration file.
308
 The interactive server configuration setup is recommended for most users. On the system where freedombone is to be installed create a configuration file.
307
 </p>
309
 </p>
334
 </div>
336
 </div>
335
 </div>
337
 </div>
336
 
338
 
337
-<div id="outline-container-unnumbered-5" class="outline-2">
338
-<h2 id="unnumbered-5">Non-Interactive Setup</h2>
339
-<div class="outline-text-2" id="text-unnumbered-5">
339
+<div id="outline-container-orgheadline4" class="outline-2">
340
+<h2 id="orgheadline4">Non-Interactive Setup</h2>
341
+<div class="outline-text-2" id="text-orgheadline4">
340
 <p>
342
 <p>
341
 If you don't want to install interactively then it's possible to manually create a configuration file as follows:
343
 If you don't want to install interactively then it's possible to manually create a configuration file as follows:
342
 </p>
344
 </p>
386
 <span class="org-variable-name">MICROBLOG_DOMAIN_NAME</span>=mymicroblogdomain
388
 <span class="org-variable-name">MICROBLOG_DOMAIN_NAME</span>=mymicroblogdomain
387
 <span class="org-variable-name">REDMATRIX_DOMAIN_NAME</span>=myredmatrixdomain
389
 <span class="org-variable-name">REDMATRIX_DOMAIN_NAME</span>=myredmatrixdomain
388
 <span class="org-variable-name">OWNCLOUD_DOMAIN_NAME</span>=myownclouddomain
390
 <span class="org-variable-name">OWNCLOUD_DOMAIN_NAME</span>=myownclouddomain
391
+<span class="org-variable-name">HWRNG_TYPE</span>=haveged
392
+<span class="org-variable-name">ENABLE_SOCIAL_KEY_MANAGEMENT</span>=<span class="org-string">"no"</span>
389
 </pre>
393
 </pre>
390
 </div>
394
 </div>
391
 
395
 
417
 </div>
421
 </div>
418
 </div>
422
 </div>
419
 
423
 
420
-<div id="outline-container-unnumbered-6" class="outline-2">
421
-<h2 id="unnumbered-6">Post-Setup</h2>
422
-<div class="outline-text-2" id="text-unnumbered-6">
424
+<div id="outline-container-orgheadline8" class="outline-2">
425
+<h2 id="orgheadline8">Social Key Management</h2>
426
+<div class="outline-text-2" id="text-orgheadline8">
427
+<p>
428
+If you are using the interactive installer then you will be aked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
429
+</p>
430
+</div>
431
+
432
+<div id="outline-container-orgheadline9" class="outline-3">
433
+<h3 id="orgheadline9">You have the gnupg keyring on an encrypted USB drive</h3>
434
+<div class="outline-text-3" id="text-orgheadline9">
435
+<p>
436
+If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
437
+</p>
438
+</div>
439
+</div>
440
+<div id="outline-container-orgheadline10" class="outline-3">
441
+<h3 id="orgheadline10">You have a number of key fragments on USB drives retrieved from friends</h3>
442
+<div class="outline-text-3" id="text-orgheadline10">
443
+<p>
444
+If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#orgheadline6">Keydrives</a>.
445
+</p>
446
+</div>
447
+</div>
448
+<div id="outline-container-orgheadline11" class="outline-3">
449
+<h3 id="orgheadline11">You can specify some ssh login details for friends servers containing key fragments</h3>
450
+<div class="outline-text-3" id="text-orgheadline11">
451
+<p>
452
+Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
453
+</p>
454
+</div>
455
+</div>
456
+</div>
457
+<div id="outline-container-orgheadline5" class="outline-2">
458
+<h2 id="orgheadline5">Post-Setup</h2>
459
+<div class="outline-text-2" id="text-orgheadline5">
423
 <p>
460
 <p>
424
 Setup of the server and installation of all the relevant packages is not quick, and depends upon which variant you choose and your internet bandwidth. Allow about three hours for a full installation on the Beaglebone Black. On the Beaglebone installation is in two parts, since a reboot is needed to enable the hardware random number generator and zram.
461
 Setup of the server and installation of all the relevant packages is not quick, and depends upon which variant you choose and your internet bandwidth. Allow about three hours for a full installation on the Beaglebone Black. On the Beaglebone installation is in two parts, since a reboot is needed to enable the hardware random number generator and zram.
425
 </p>
462
 </p>
446
 
483
 
447
 
484
 
448
 <colgroup>
485
 <colgroup>
449
-<col  class="left" />
486
+<col  class="org-left" />
450
 
487
 
451
-<col  class="right" />
488
+<col  class="org-right" />
452
 </colgroup>
489
 </colgroup>
453
 <thead>
490
 <thead>
454
 <tr>
491
 <tr>
455
-<th scope="col" class="left">Service</th>
456
-<th scope="col" class="right">Ports</th>
492
+<th scope="col" class="org-left">Service</th>
493
+<th scope="col" class="org-right">Ports</th>
457
 </tr>
494
 </tr>
458
 </thead>
495
 </thead>
459
 <tbody>
496
 <tbody>
460
 <tr>
497
 <tr>
461
-<td class="left">HTTP</td>
462
-<td class="right">80</td>
498
+<td class="org-left">HTTP</td>
499
+<td class="org-right">80</td>
463
 </tr>
500
 </tr>
464
 
501
 
465
 <tr>
502
 <tr>
466
-<td class="left">HTTPS</td>
467
-<td class="right">443</td>
503
+<td class="org-left">HTTPS</td>
504
+<td class="org-right">443</td>
468
 </tr>
505
 </tr>
469
 
506
 
470
 <tr>
507
 <tr>
471
-<td class="left">SSH</td>
472
-<td class="right">2222</td>
508
+<td class="org-left">SSH</td>
509
+<td class="org-right">2222</td>
473
 </tr>
510
 </tr>
474
 
511
 
475
 <tr>
512
 <tr>
476
-<td class="left">DLNA</td>
477
-<td class="right">1900</td>
513
+<td class="org-left">DLNA</td>
514
+<td class="org-right">1900</td>
478
 </tr>
515
 </tr>
479
 
516
 
480
 <tr>
517
 <tr>
481
-<td class="left">DLNA</td>
482
-<td class="right">8200</td>
518
+<td class="org-left">DLNA</td>
519
+<td class="org-right">8200</td>
483
 </tr>
520
 </tr>
484
 
521
 
485
 <tr>
522
 <tr>
486
-<td class="left">XMPP</td>
487
-<td class="right">5222..5223</td>
523
+<td class="org-left">XMPP</td>
524
+<td class="org-right">5222..5223</td>
488
 </tr>
525
 </tr>
489
 
526
 
490
 <tr>
527
 <tr>
491
-<td class="left">XMPP</td>
492
-<td class="right">5269</td>
528
+<td class="org-left">XMPP</td>
529
+<td class="org-right">5269</td>
493
 </tr>
530
 </tr>
494
 
531
 
495
 <tr>
532
 <tr>
496
-<td class="left">XMPP</td>
497
-<td class="right">5280..5281</td>
533
+<td class="org-left">XMPP</td>
534
+<td class="org-right">5280..5281</td>
498
 </tr>
535
 </tr>
499
 
536
 
500
 <tr>
537
 <tr>
501
-<td class="left">IRC</td>
502
-<td class="right">6697</td>
538
+<td class="org-left">IRC</td>
539
+<td class="org-right">6697</td>
503
 </tr>
540
 </tr>
504
 
541
 
505
 <tr>
542
 <tr>
506
-<td class="left">IRC</td>
507
-<td class="right">9999</td>
543
+<td class="org-left">IRC</td>
544
+<td class="org-right">9999</td>
508
 </tr>
545
 </tr>
509
 
546
 
510
 <tr>
547
 <tr>
511
-<td class="left">Git</td>
512
-<td class="right">9418</td>
548
+<td class="org-left">Git</td>
549
+<td class="org-right">9418</td>
513
 </tr>
550
 </tr>
514
 
551
 
515
 <tr>
552
 <tr>
516
-<td class="left">Email</td>
517
-<td class="right">25</td>
553
+<td class="org-left">Email</td>
554
+<td class="org-right">25</td>
518
 </tr>
555
 </tr>
519
 
556
 
520
 <tr>
557
 <tr>
521
-<td class="left">Email</td>
522
-<td class="right">587</td>
558
+<td class="org-left">Email</td>
559
+<td class="org-right">587</td>
523
 </tr>
560
 </tr>
524
 
561
 
525
 <tr>
562
 <tr>
526
-<td class="left">Email</td>
527
-<td class="right">465</td>
563
+<td class="org-left">Email</td>
564
+<td class="org-right">465</td>
528
 </tr>
565
 </tr>
529
 
566
 
530
 <tr>
567
 <tr>
531
-<td class="left">Email</td>
532
-<td class="right">993</td>
568
+<td class="org-left">Email</td>
569
+<td class="org-right">993</td>
533
 </tr>
570
 </tr>
534
 
571
 
535
 <tr>
572
 <tr>
536
-<td class="left">VoIP</td>
537
-<td class="right">64738</td>
573
+<td class="org-left">VoIP</td>
574
+<td class="org-right">64738</td>
538
 </tr>
575
 </tr>
539
 </tbody>
576
 </tbody>
540
 </table>
577
 </table>
541
 </div>
578
 </div>
542
 </div>
579
 </div>
543
 
580
 
544
-<div id="outline-container-unnumbered-7" class="outline-2">
545
-<h2 id="unnumbered-7">On Client Machines</h2>
546
-<div class="outline-text-2" id="text-unnumbered-7">
581
+<div id="outline-container-orgheadline6" class="outline-2">
582
+<h2 id="orgheadline6">Keydrives</h2>
583
+<div class="outline-text-2" id="text-orgheadline6">
584
+<p>
585
+After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
586
+</p>
587
+</div>
588
+<div id="outline-container-orgheadline12" class="outline-3">
589
+<h3 id="orgheadline12">Master Keydrive</h3>
590
+<div class="outline-text-3" id="text-orgheadline12">
591
+<p>
592
+This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the "Discs" application. Then plug it into the Freedombone system, then from your local machine run:
593
+</p>
594
+
595
+<div class="org-src-container">
596
+
597
+<pre class="src src-bash">ssh myusername@mydomainname -p 2222
598
+su
599
+freedombone-keydrive -u myusername -d sdb --master yes
600
+<span class="org-keyword">exit</span>
601
+<span class="org-keyword">exit</span>
602
+</pre>
603
+</div>
604
+
605
+<p>
606
+If you are on a Beaglebone Black then use <i>sda</i> rather than <i>sdb</i> for the drive parameter.
607
+</p>
608
+</div>
609
+</div>
610
+<div id="outline-container-orgheadline13" class="outline-3">
611
+<h3 id="orgheadline13">Fragment keydrives</h3>
612
+<div class="outline-text-3" id="text-orgheadline13">
613
+<p>
614
+This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the "Discs" application. Plug it into the Freedombone system then from your local machine run the following commands:
615
+</p>
616
+
617
+<div class="org-src-container">
618
+
619
+<pre class="src src-bash">ssh myusername@mydomainname -p 2222
620
+su
621
+freedombone-keydrive -u myusername -d sdb
622
+<span class="org-keyword">exit</span>
623
+<span class="org-keyword">exit</span>
624
+</pre>
625
+</div>
626
+
627
+<p>
628
+Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "<i>the web of backups</i>" or "<i>the web of encryption</i>". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
629
+</p>
630
+</div>
631
+</div>
632
+</div>
633
+<div id="outline-container-orgheadline7" class="outline-2">
634
+<h2 id="orgheadline7">On Client Machines</h2>
635
+<div class="outline-text-2" id="text-orgheadline7">
547
 <p>
636
 <p>
548
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
637
 You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
549
 </p>
638
 </p>