2014-10-26 21:55:12 +01:00
<?xml version="1.0" encoding="utf-8"?>
< !DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
< html xmlns = "http://www.w3.org/1999/xhtml" lang = "en" xml:lang = "en" >
< head >
2015-12-19 23:29:29 +01:00
<!-- 2015 - 12 - 19 Sat 22:28 -->
2015-12-14 23:30:40 +01:00
< meta http-equiv = "Content-Type" content = "text/html;charset=utf-8" / >
2015-12-18 23:29:15 +01:00
< meta name = "viewport" content = "width=device-width, initial-scale=1" / >
< title > < / title >
2014-10-26 21:55:12 +01:00
< meta name = "generator" content = "Org-mode" / >
< meta name = "author" content = "Bob Mottram" / >
< meta name = "description" content = "Turn the Beaglebone Black into a personal communications server"
/>
2015-09-08 20:37:24 +02:00
< meta name = "keywords" content = "freedombox, debian, beaglebone, hubzilla, email, web server, home server, internet, censorship, surveillance, social network, irc, jabber" / >
2014-10-26 21:55:12 +01:00
< style type = "text/css" >
<!-- /* --> <![CDATA[/*> <!-- */
2015-07-05 20:35:57 +02:00
.title { text-align: center;
margin-bottom: .2em; }
.subtitle { text-align: center;
font-size: medium;
font-weight: bold;
margin-top:0; }
2014-10-26 21:55:12 +01:00
.todo { font-family: monospace; color: red; }
2015-07-05 20:35:57 +02:00
.done { font-family: monospace; color: green; }
.priority { font-family: monospace; color: orange; }
2014-10-26 21:55:12 +01:00
.tag { background-color: #eee; font-family: monospace;
padding: 2px; font-size: 80%; font-weight: normal; }
.timestamp { color: #bebebe; }
.timestamp-kwd { color: #5f9ea0; }
2015-07-05 20:35:57 +02:00
.org-right { margin-left: auto; margin-right: 0px; text-align: right; }
.org-left { margin-left: 0px; margin-right: auto; text-align: left; }
.org-center { margin-left: auto; margin-right: auto; text-align: center; }
2014-10-26 21:55:12 +01:00
.underline { text-decoration: underline; }
#postamble p, #preamble p { font-size: 90%; margin: .2em; }
p.verse { margin-left: 3%; }
pre {
border: 1px solid #ccc;
box-shadow: 3px 3px 3px #eee;
padding: 8pt;
font-family: monospace;
overflow: auto;
margin: 1.2em;
}
pre.src {
position: relative;
overflow: visible;
padding-top: 1.2em;
}
pre.src:before {
display: none;
position: absolute;
background-color: white;
top: -10px;
right: 10px;
padding: 3px;
border: 1px solid black;
}
pre.src:hover:before { display: inline;}
pre.src-sh:before { content: 'sh'; }
pre.src-bash:before { content: 'sh'; }
pre.src-emacs-lisp:before { content: 'Emacs Lisp'; }
pre.src-R:before { content: 'R'; }
pre.src-perl:before { content: 'Perl'; }
pre.src-java:before { content: 'Java'; }
pre.src-sql:before { content: 'SQL'; }
table { border-collapse:collapse; }
caption.t-above { caption-side: top; }
caption.t-bottom { caption-side: bottom; }
td, th { vertical-align:top; }
2015-07-05 20:35:57 +02:00
th.org-right { text-align: center; }
th.org-left { text-align: center; }
th.org-center { text-align: center; }
td.org-right { text-align: right; }
td.org-left { text-align: left; }
td.org-center { text-align: center; }
2014-10-26 21:55:12 +01:00
dt { font-weight: bold; }
2015-12-18 23:29:15 +01:00
.footpara { display: inline; }
2014-10-26 21:55:12 +01:00
.footdef { margin-bottom: 1em; }
.figure { padding: 1em; }
.figure p { text-align: center; }
.inlinetask {
padding: 10px;
border: 2px solid gray;
margin: 10px;
background: #ffffcc;
}
#org-div-home-and-up
{ text-align: right; font-size: 70%; white-space: nowrap; }
textarea { overflow-x: auto; }
.linenr { font-size: smaller }
.code-highlighted { background-color: #ffff00; }
.org-info-js_info-navigation { border-style: none; }
#org-info-js_console-label
{ font-size: 10px; font-weight: bold; white-space: nowrap; }
.org-info-js_search-highlight
{ background-color: #ffff00; color: #000000; font-weight: bold; }
/*]]>*/-->
< / style >
< link rel = "stylesheet" type = "text/css"
href="http://sachachua.com/blog/wp-content/themes/sacha-v3/foundation/css/foundation.min.css">< / link >
< link rel = "stylesheet" type = "text/css" href = "http://sachachua.com/org-export.css" > < / link >
< link rel = "stylesheet" type = "text/css" href = "http://sachachua.com/blog/wp-content/themes/sacha-v3/style.css" > < / link >
< script type = "text/javascript" >
/*
@licstart The following is the entire license notice for the
JavaScript code in this tag.
Copyright (C) 2012-2013 Free Software Foundation, Inc.
The JavaScript code in this tag is free software: you can
redistribute it and/or modify it under the terms of the GNU
General Public License (GNU GPL) as published by the Free Software
Foundation, either version 3 of the License, or (at your option)
any later version. The code is distributed WITHOUT ANY WARRANTY;
without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU GPL for more details.
As additional permission under GNU GPL version 3 section 7, you
may distribute non-source (e.g., minimized or compacted) forms of
that code without the copy of the GNU GPL normally required by
section 4, provided you include this license notice and a URL
through which recipients can access the Corresponding Source.
@licend The above is the entire license notice
for the JavaScript code in this tag.
*/
<!-- /* --> <![CDATA[/*> <!-- */
function CodeHighlightOn(elem, id)
{
var target = document.getElementById(id);
if(null != target) {
elem.cacheClassElem = elem.className;
elem.cacheClassTarget = target.className;
target.className = "code-highlighted";
elem.className = "code-highlighted";
}
}
function CodeHighlightOff(elem, id)
{
var target = document.getElementById(id);
if(elem.cacheClassElem)
elem.className = elem.cacheClassElem;
if(elem.cacheClassTarget)
target.className = elem.cacheClassTarget;
}
/*]]>*///-->
< / script >
< / head >
< body >
< div id = "preamble" class = "status" >
< a name = "top" id = "top" > < / a >
< / div >
< div id = "content" >
2015-12-14 23:30:40 +01:00
< center >
2015-12-18 23:29:15 +01:00
< a href = "index.html" > < img style = "max-width: 100%; max-height: 100%; padding: 0; margin: 0; display: block; width:100%; top: 0; left: 0; float:right;" src = "images/candles.jpg" / > < / a >
2015-12-14 23:30:40 +01:00
< / center >
< br > < br > < br > < br > < br >
2015-12-18 23:29:15 +01:00
< font color = "white" > .< / font >
2014-10-26 21:55:12 +01:00
< table border = "2" cellspacing = "0" cellpadding = "6" rules = "groups" frame = "hsides" >
< colgroup >
2015-07-05 20:35:57 +02:00
< col class = "org-left" / >
2015-12-14 23:30:40 +01:00
< / colgroup >
< tbody >
< tr >
< td class = "org-left" > < a href = "#orgheadline1" > Building an image for a Single Board Computer or Virtual Machine< / a > < / td >
< / tr >
2014-10-26 21:55:12 +01:00
2015-12-14 23:30:40 +01:00
< tr >
< td class = "org-left" > < a href = "#orgheadline2" > Checklist< / a > < / td >
< / tr >
2014-10-26 21:55:12 +01:00
2015-12-14 23:30:40 +01:00
< tr >
2015-12-18 23:54:03 +01:00
< td class = "org-left" > < a href = "./mesh.html" > Mesh network< / a > < / td >
2015-12-14 23:30:40 +01:00
< / tr >
2014-10-26 23:03:55 +01:00
2015-12-14 23:30:40 +01:00
< tr >
2015-12-18 23:54:03 +01:00
< td class = "org-left" > < a href = "#orgheadline3" > Installation< / a > < / td >
2015-12-14 23:30:40 +01:00
< / tr >
2015-01-24 21:14:57 +01:00
2015-12-14 23:30:40 +01:00
< tr >
2015-12-18 23:54:03 +01:00
< td class = "org-left" > < a href = "#orgheadline4" > Social Key Management - the 'Unforgettable Key'< / a > < / td >
2015-12-14 23:30:40 +01:00
< / tr >
2015-01-24 21:14:57 +01:00
2015-12-14 23:30:40 +01:00
< tr >
2015-12-18 23:54:03 +01:00
< td class = "org-left" > < a href = "#orgheadline5" > Final Setup< / a > < / td >
2015-12-14 23:30:40 +01:00
< / tr >
2015-01-24 21:14:57 +01:00
2015-12-14 23:30:40 +01:00
< tr >
2015-12-18 23:54:03 +01:00
< td class = "org-left" > < a href = "#orgheadline6" > Keydrives< / a > < / td >
2015-12-14 23:30:40 +01:00
< / tr >
2015-09-05 15:16:45 +02:00
2015-12-14 23:30:40 +01:00
< tr >
2015-12-18 23:54:03 +01:00
< td class = "org-left" > < a href = "#orgheadline7" > On Client Machines< / a > < / td >
2015-12-14 23:30:40 +01:00
< / tr >
2015-12-03 13:20:12 +01:00
2014-10-26 21:55:12 +01:00
< tr >
2015-12-18 23:54:03 +01:00
< td class = "org-left" > < a href = "#orgheadline8" > Administering the system< / a > < / td >
2014-10-26 21:55:12 +01:00
< / tr >
< / tbody >
< / table >
2015-07-05 20:35:57 +02:00
< div id = "outline-container-orgheadline1" class = "outline-2" >
2015-12-14 23:30:40 +01:00
< h2 id = "orgheadline1" > Building an image for a Single Board Computer or Virtual Machine< / h2 >
2015-07-05 20:35:57 +02:00
< div class = "outline-text-2" id = "text-orgheadline1" >
2014-10-26 21:55:12 +01:00
< p >
2015-12-03 13:10:17 +01:00
You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the < b > freedombone-image< / b > command.
2014-10-26 23:03:55 +01:00
< / p >
< p >
2015-12-03 13:10:17 +01:00
Install the freedombone commands onto your laptop/desktop:
2014-10-26 21:55:12 +01:00
< / p >
2015-12-03 13:10:17 +01:00
< div class = "org-src-container" >
2014-10-26 21:55:12 +01:00
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > sudo apt-get install git build-essential dialog
git clone https://github.com/bashrc/freedombone
< span class = "org-builtin" > cd< / span > freedombone
sudo make install
< / pre >
< / div >
2014-10-26 21:55:12 +01:00
< p >
2015-12-03 13:10:17 +01:00
Then install packages needed for building images:
2014-10-26 21:55:12 +01:00
< / p >
2015-01-18 21:19:09 +01:00
< div class = "org-src-container" >
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > sudo apt-get -y install python-docutils mktorrent vmdebootstrap
sudo apt-get -y install dosfstools btrfs-tools extlinux python-distro-info mbr
sudo apt-get -y install qemu-user-static binfmt-support u-boot-tools qemu
2015-01-18 21:19:09 +01:00
< / pre >
< / div >
2014-10-26 21:55:12 +01:00
< p >
2015-12-03 13:10:17 +01:00
A typical use case to build an 8GB image for a Beaglebone Black is as follows. You can change the size depending upon the capacity of your microSD card.
2014-10-26 21:55:12 +01:00
< / p >
< div class = "org-src-container" >
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > freedombone-image -t beaglebone -s 8G
2014-10-26 21:55:12 +01:00
< / pre >
< / div >
< p >
2015-12-03 13:10:17 +01:00
If you prefer an advanced installation with all of the options available then use:
2014-10-26 21:55:12 +01:00
< / p >
2015-12-03 13:10:17 +01:00
< div class = "org-src-container" >
< pre class = "src src-bash" > freedombone-image -t beaglebone -s 8G --minimal no
< / pre >
< / div >
2015-12-03 15:20:03 +01:00
< p >
To build a 64bit Virtualbox image:
< / p >
< div class = "org-src-container" >
< pre class = "src src-bash" > freedombone-image -t virtualbox-amd64 -s 8G
< / pre >
< / div >
< p >
To build a 64bit Qemu image:
< / p >
< div class = "org-src-container" >
< pre class = "src src-bash" > freedombone-image -t qemu-x86_64 -s 8G
< / pre >
< / div >
2014-10-26 21:55:12 +01:00
< p >
2015-12-03 13:10:17 +01:00
Other supported boards are cubieboard2, cubietruck and olinuxino-lime2.
2014-10-26 21:55:12 +01:00
< / p >
2015-01-24 21:14:57 +01:00
< / div >
< / div >
2014-10-26 21:55:12 +01:00
2015-07-05 20:35:57 +02:00
< div id = "outline-container-orgheadline2" class = "outline-2" >
< h2 id = "orgheadline2" > Checklist< / h2 >
< div class = "outline-text-2" id = "text-orgheadline2" >
2015-01-18 21:19:09 +01:00
< p >
2015-12-03 13:10:17 +01:00
Before installing Freedombone you will need a few things.
2015-01-24 21:14:57 +01:00
< / p >
< ul class = "org-ul" >
2015-12-19 23:29:29 +01:00
< li > Have some domains, or subdomains, registered with a dynamic DNS service. For the full install you may need two "official" purchased domains or be using a subdomain provider which is supported by Let's Encrypt.< / li >
2015-12-03 13:10:17 +01:00
< li > System with a new installation of Debian Jessie or a downloaded/prepared disk image< / li >
< li > Ethernet connection between the system and your internet router< / li >
< li > That it is possible to forward ports from the internet router to the system, typically via firewall settings< / li >
< li > Have ssh access to the system, typically via fbone@freedombone.local on port 2222< / li >
2015-01-24 21:14:57 +01:00
< / ul >
< / div >
< / div >
2015-12-14 23:30:40 +01:00
< div id = "outline-container-orgheadline3" class = "outline-2" >
2015-12-18 23:54:03 +01:00
< h2 id = "orgheadline3" > Installation< / h2 >
2015-12-14 23:30:40 +01:00
< div class = "outline-text-2" id = "text-orgheadline3" >
2015-09-05 15:16:45 +02:00
< p >
2015-12-03 13:10:17 +01:00
There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
< / p >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline9" class = "outline-3" >
< h3 id = "orgheadline9" > On a Laptop, Netbook or Desktop machine< / h3 >
< div class = "outline-text-3" id = "text-orgheadline9" >
2015-12-03 13:10:17 +01:00
< p >
If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
2014-10-26 21:55:12 +01:00
< / p >
2015-01-24 21:14:57 +01:00
< div class = "org-src-container" >
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > su
apt-get update
apt-get -y install git dialog build-essential
2015-01-24 21:14:57 +01:00
git clone https://github.com/bashrc/freedombone
< span class = "org-builtin" > cd< / span > freedombone
make install
2015-12-03 13:10:17 +01:00
freedombone menuconfig
2015-01-24 21:14:57 +01:00
< / pre >
< / div >
2015-12-03 13:10:17 +01:00
< / div >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline10" class = "outline-3" >
< h3 id = "orgheadline10" > On a single board computer (SBC)< / h3 >
< div class = "outline-text-3" id = "text-orgheadline10" >
2015-12-03 13:10:17 +01:00
< p >
Currently the following boards are supported:
< / p >
2015-12-03 13:26:24 +01:00
< ul class = "org-ul" >
< li > < a href = "http://beagleboard.org/BLACK" > Beaglebone Black< / a > < / li >
< li > < a href = "http://linux-sunxi.org/Cubietech_Cubieboard2" > Cubieboard 2< / a > < / li >
< li > < a href = "https://linux-sunxi.org/Cubietruck" > Cubietruck (Cubieboard 3)< / a > < / li >
< li > < a href = "https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXIno-LIME2/open-source-hardware" > olinuxino Lime2< / a > < / li >
< / ul >
2015-01-18 21:19:09 +01:00
2014-10-26 21:55:12 +01:00
< p >
2015-12-03 13:10:17 +01:00
If there is no existing image available then you can build one from scratch. See the section above on how to do that. If an existing image is available then you can download it and check the signature with:
2014-10-26 21:55:12 +01:00
< / p >
< div class = "org-src-container" >
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > gpg --verify filename.img.asc
2014-10-26 21:55:12 +01:00
< / pre >
< / div >
< p >
2015-12-03 13:10:17 +01:00
And the hash with:
2014-10-26 21:55:12 +01:00
< / p >
2015-12-03 13:10:17 +01:00
< div class = "org-src-container" >
< pre class = "src src-bash" > sha256sum filename.img
< / pre >
2015-01-18 21:19:09 +01:00
< / div >
2014-10-26 21:55:12 +01:00
< p >
2015-12-03 13:10:17 +01:00
If the image is compressed then decompress it with:
2014-10-26 21:55:12 +01:00
< / p >
2015-12-03 13:10:17 +01:00
< div class = "org-src-container" >
< pre class = "src src-bash" > tar -xjvf filename.tar.bz2
< / pre >
< / div >
2015-01-24 21:14:57 +01:00
< p >
2015-12-03 13:10:17 +01:00
Then copy it to a microSD card. Depending on your system you may need an adaptor to be able to do that.
2015-01-24 21:14:57 +01:00
< / p >
2014-10-26 21:55:12 +01:00
2015-01-23 22:20:43 +01:00
< div class = "org-src-container" >
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > sudo dd < span class = "org-variable-name" > bs< / span > =1M < span class = "org-variable-name" > if< / span > =filename.img < span class = "org-variable-name" > of< / span > =/dev/sdX < span class = "org-variable-name" > conv< / span > =fdatasync
2014-10-26 21:55:12 +01:00
< / pre >
< / div >
2015-01-24 21:14:57 +01:00
< p >
2015-12-03 13:10:17 +01:00
Where < b > sdX< / b > is the microSD drive. You can check which drive is the microSD drive using:
2015-01-24 21:14:57 +01:00
< / p >
2015-01-18 21:19:09 +01:00
< div class = "org-src-container" >
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > ls /dev/sd*
2014-12-20 12:07:34 +01:00
< / pre >
2014-10-26 21:55:12 +01:00
< / div >
2014-12-20 12:07:34 +01:00
2015-01-24 21:14:57 +01:00
< p >
2015-12-03 13:10:17 +01:00
With the drive removed and inserted. Copying to the microSD will take a while, so go and do something less boring instead. When it's complete remove it from your system and insert it into the SBC. Connect an ethernet cable between the SBC and your internet router, then connect the power cable. On the Beaglebone Black you will see some flashing LEDs, but on other SBCs there may not be any visual indication that anything is booting.
2015-01-24 21:14:57 +01:00
< / p >
< p >
2015-12-03 13:10:17 +01:00
With the board connected and running you can ssh into the system with:
< / p >
< div class = "org-src-container" >
< pre class = "src src-bash" > ssh fbone@freedombone.local -p 2222
< / pre >
< / div >
< p >
Using the password 'freedombone'. Take a note of the new login password and then you can proceed through the rest of the installation.
2015-01-24 21:14:57 +01:00
< / p >
2015-12-03 13:10:17 +01:00
< / div >
< / div >
2015-01-24 21:14:57 +01:00
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline11" class = "outline-3" >
< h3 id = "orgheadline11" > As a Virtual Machine< / h3 >
< div class = "outline-text-3" id = "text-orgheadline11" >
2015-01-24 21:14:57 +01:00
< p >
2015-12-03 13:10:17 +01:00
Virtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
2015-01-24 21:14:57 +01:00
< / p >
2014-12-20 12:07:34 +01:00
< div class = "org-src-container" >
2015-12-03 13:10:17 +01:00
< pre class = "src src-bash" > qemu-system-x86_64 filename.img
2014-12-20 12:07:34 +01:00
< / pre >
< / div >
2015-01-24 21:14:57 +01:00
< p >
2015-12-03 13:10:17 +01:00
If you are using Virtualbox then add a new VM and select the Freedombone < b > vdi< / b > image.
2015-01-24 21:14:57 +01:00
< / p >
< p >
2015-12-03 13:10:17 +01:00
The default login will be username 'fbone' and password 'freedombone'. Take a note of the new login password and then you can proceed through the rest of the installation.
2015-01-24 21:14:57 +01:00
< / p >
2014-12-20 12:07:34 +01:00
< / div >
< / div >
2015-12-03 13:10:17 +01:00
< / div >
2015-01-18 21:19:09 +01:00
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline4" class = "outline-2" >
< h2 id = "orgheadline4" > Social Key Management - the 'Unforgettable Key'< / h2 >
< div class = "outline-text-2" id = "text-orgheadline4" >
2015-07-05 20:35:57 +02:00
< p >
2015-12-04 11:00:02 +01:00
During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
2015-07-05 20:35:57 +02:00
< / p >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline12" class = "outline-3" >
< h3 id = "orgheadline12" > You have the gnupg keyring on an encrypted USB drive< / h3 >
< div class = "outline-text-3" id = "text-orgheadline12" >
2015-07-05 20:35:57 +02:00
< p >
If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
< / p >
< / div >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline13" class = "outline-3" >
< h3 id = "orgheadline13" > You have a number of key fragments on USB drives retrieved from friends< / h3 >
< div class = "outline-text-3" id = "text-orgheadline13" >
2015-07-05 20:35:57 +02:00
< p >
2015-12-18 23:54:03 +01:00
If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more < a href = "#orgheadline6" > Keydrives< / a > .
2015-07-05 20:35:57 +02:00
< / p >
< / div >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline14" class = "outline-3" >
< h3 id = "orgheadline14" > You can specify some ssh login details for friends servers containing key fragments< / h3 >
< div class = "outline-text-3" id = "text-orgheadline14" >
2015-07-05 20:35:57 +02:00
< p >
Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
< / p >
< / div >
< / div >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline5" class = "outline-2" >
< h2 id = "orgheadline5" > Final Setup< / h2 >
< div class = "outline-text-2" id = "text-orgheadline5" >
2015-01-18 21:19:09 +01:00
< p >
2015-01-24 21:14:57 +01:00
Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
< / p >
< p >
On your internet router, typically under firewall settings, open the following ports and forward them to your server.
2014-10-26 21:55:12 +01:00
< / p >
< table border = "2" cellspacing = "0" cellpadding = "6" rules = "groups" frame = "hsides" >
< colgroup >
2015-07-05 20:35:57 +02:00
< col class = "org-left" / >
2014-10-26 21:55:12 +01:00
2015-07-05 20:35:57 +02:00
< col class = "org-right" / >
2014-10-26 21:55:12 +01:00
< / colgroup >
< thead >
< tr >
2015-07-05 20:35:57 +02:00
< th scope = "col" class = "org-left" > Service< / th >
< th scope = "col" class = "org-right" > Ports< / th >
2014-10-26 21:55:12 +01:00
< / tr >
< / thead >
< tbody >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > HTTP< / td >
< td class = "org-right" > 80< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > HTTPS< / td >
< td class = "org-right" > 443< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > SSH< / td >
< td class = "org-right" > 2222< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > DLNA< / td >
< td class = "org-right" > 1900< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > DLNA< / td >
< td class = "org-right" > 8200< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > XMPP< / td >
< td class = "org-right" > 5222..5223< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > XMPP< / td >
< td class = "org-right" > 5269< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > XMPP< / td >
< td class = "org-right" > 5280..5281< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > IRC< / td >
< td class = "org-right" > 6697< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > IRC< / td >
< td class = "org-right" > 9999< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > Git< / td >
< td class = "org-right" > 9418< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > Email< / td >
< td class = "org-right" > 25< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > Email< / td >
< td class = "org-right" > 587< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > Email< / td >
< td class = "org-right" > 465< / td >
2014-10-26 21:55:12 +01:00
< / tr >
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > Email< / td >
< td class = "org-right" > 993< / td >
2014-10-26 21:55:12 +01:00
< / tr >
2015-01-25 16:42:18 +01:00
< tr >
2015-07-05 20:35:57 +02:00
< td class = "org-left" > VoIP< / td >
< td class = "org-right" > 64738< / td >
2015-01-25 16:42:18 +01:00
< / tr >
2015-07-11 13:51:59 +02:00
2015-11-02 00:01:33 +01:00
< tr >
< td class = "org-left" > VoIP< / td >
< td class = "org-right" > 5060< / td >
< / tr >
2015-07-11 13:51:59 +02:00
< tr >
< td class = "org-left" > Tox< / td >
< td class = "org-right" > 33445< / td >
< / tr >
2015-09-30 11:28:23 +02:00
< tr >
< td class = "org-left" > IPFS< / td >
< td class = "org-right" > 4001< / td >
< / tr >
2014-10-26 21:55:12 +01:00
< / tbody >
< / table >
< / div >
< / div >
2015-01-25 16:42:18 +01:00
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline6" class = "outline-2" >
< h2 id = "orgheadline6" > Keydrives< / h2 >
< div class = "outline-text-2" id = "text-orgheadline6" >
2015-07-05 20:35:57 +02:00
< p >
After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
< / p >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline15" class = "outline-3" >
< h3 id = "orgheadline15" > Master Keydrive< / h3 >
< div class = "outline-text-3" id = "text-orgheadline15" >
2015-07-05 20:35:57 +02:00
< p >
2015-07-05 21:33:45 +02:00
This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be < a href = "https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage" > done from the < i > Disk Utility< / i > application< / a > . Then plug it into the Freedombone system, then from your local machine run:
2015-07-05 20:35:57 +02:00
< / p >
< div class = "org-src-container" >
< pre class = "src src-bash" > ssh myusername@mydomainname -p 2222
2015-12-03 13:26:24 +01:00
sudo control
2015-07-05 20:35:57 +02:00
< / pre >
< / div >
< p >
2015-11-03 20:50:15 +01:00
Select < i > Backup and Restore< / i > then < i > Backup GPG key to USB (master keydrive)< / i > .
2015-07-05 20:35:57 +02:00
< / p >
< / div >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline16" class = "outline-3" >
< h3 id = "orgheadline16" > Fragment keydrives< / h3 >
< div class = "outline-text-3" id = "text-orgheadline16" >
2015-07-05 20:35:57 +02:00
< p >
2015-07-05 21:33:45 +02:00
This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this < a href = "https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage" > can be done from the < i > Disk Utility< / i > application< / a > . Plug it into the Freedombone system then from your local machine run the following commands:
2015-07-05 20:35:57 +02:00
< / p >
< div class = "org-src-container" >
< pre class = "src src-bash" > ssh myusername@mydomainname -p 2222
2015-12-03 13:26:24 +01:00
sudo control
2015-07-05 20:35:57 +02:00
< / pre >
< / div >
2015-11-03 20:50:15 +01:00
< p >
Select < i > Backup and Restore< / i > then < i > Backup GPG key to USB (fragment keydrive)< / i > .
< / p >
2015-07-05 20:35:57 +02:00
< p >
Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "< i > the web of backups< / i > " or "< i > the web of encryption< / i > ". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once.
< / p >
< / div >
< / div >
< / div >
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline7" class = "outline-2" >
< h2 id = "orgheadline7" > On Client Machines< / h2 >
< div class = "outline-text-2" id = "text-orgheadline7" >
2015-01-24 21:14:57 +01:00
< p >
You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
< / p >
< div class = "org-src-container" >
2015-01-25 23:52:17 +01:00
< pre class = "src src-bash" > sudo apt-get update
sudo apt-get install git dialog haveged build-essential
2015-01-24 21:14:57 +01:00
git clone https://github.com/bashrc/freedombone
< span class = "org-builtin" > cd< / span > freedombone
sudo make install
freedombone-client
< / pre >
< / div >
< / div >
< / div >
2015-12-03 13:20:12 +01:00
2015-12-18 23:54:03 +01:00
< div id = "outline-container-orgheadline8" class = "outline-2" >
< h2 id = "orgheadline8" > Administering the system< / h2 >
< div class = "outline-text-2" id = "text-orgheadline8" >
2015-12-03 13:20:12 +01:00
< p >
To administer the system after installation log in via ssh, become the root user and then launch the control panel.
< / p >
< div class = "org-src-container" >
< pre class = "src src-bash" > ssh myusername@freedombone.local -p 2222
2015-12-03 13:26:24 +01:00
sudo control
2015-12-03 13:20:12 +01:00
< / pre >
< / div >
< p >
2015-12-16 09:27:45 +01:00
From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.< sup > < a id = "fnr.1" class = "footref" href = "#fn.1" > 1< / a > < / sup >
2015-12-03 13:20:12 +01:00
< / p >
< / div >
< / div >
2015-12-16 09:27:45 +01:00
< div id = "footnotes" >
< h2 class = "footnotes" > Footnotes: < / h2 >
< div id = "text-footnotes" >
2015-12-18 23:29:15 +01:00
< div class = "footdef" > < sup > < a id = "fn.1" class = "footnum" href = "#fnr.1" > 1< / a > < / sup > < div class = "footpara" > < p class = "footpara" >
2015-12-16 09:27:45 +01:00
Photo by < a href = "https://www.flickr.com/photos/lilyrhoads/6398868387/in/photolist-aKrSD2-qrZwrp-6LzuVn-6LztvH-6LDC4U-6LDBzj-6Lzsfi-oCuT59-qGa4jb-anKgMq-914kty-pMTbqh-77buJc-9mgVV8-9kuxDx-9kxzk9-9kxyC3-9kxydd-9kuvea-9kuuDg-9kuufv-9kxwmW-9kxvxC-9kurYZ-9kxtKL-9kxtao-9kxsx7-9kupw6-9kuoQZ-9kxqBL-9kunDt-9kxppU-9kumsF-9kxony-9kuksX-9kxnkS-9kujkx-9kuiHk-9kui78-9kxjMy-9kxjbJ-9kuaqi-9kx7Zh-9ku1G6-qCUAg-9jifaD-bSFjEH-9mgJ1W-9fzwjW-6T4cVb" > Lily Rhoads< / a > , CC BY 2.0
2015-12-18 23:29:15 +01:00
< / p > < / div > < / div >
2015-12-16 09:27:45 +01:00
2014-10-26 21:55:12 +01:00
< / div >
2015-12-16 09:27:45 +01:00
< / div > < / div >
2014-10-26 21:55:12 +01:00
< div id = "postamble" class = "status" >
< style type = "text/css" >
.back-to-top {
position: fixed;
bottom: 2em;
right: 0px;
text-decoration: none;
color: #000000;
background-color: rgba(235, 235, 235, 0.80);
font-size: 12px;
padding: 1em;
display: none;
}
.back-to-top:hover {
background-color: rgba(135, 135, 135, 0.50);
}
< / style >
< div class = "back-to-top" >
< a href = "#top" > Back to top< / a > | < a href = "mailto:bob@robotics.uk.to" > E-mail me< / a >
< / div >
< script type = "text/javascript" >
var offset = 220;
var duration = 500;
jQuery(window).scroll(function() {
if (jQuery(this).scrollTop() > offset) {
jQuery('.back-to-top').fadeIn(duration);
} else {
jQuery('.back-to-top').fadeOut(duration);
}
});
< / script >
< / div >
< / body >
< / html >