From f98e243718d3daf6fba5e45a2e5cf78ad1d00b0f Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Sun, 5 Jul 2015 19:35:57 +0100 Subject: [PATCH] Documentation for social key management --- doc/EN/installation.org | 46 ++++- website/EN/installation.html | 345 ++++++++++++++++++++++------------- 2 files changed, 255 insertions(+), 136 deletions(-) diff --git a/doc/EN/installation.org b/doc/EN/installation.org index ca69d61c..71b07384 100644 --- a/doc/EN/installation.org +++ b/doc/EN/installation.org @@ -7,7 +7,7 @@ #+BEGIN_CENTER [[./images/logo.png]] #+END_CENTER -| [[file:index.html][Home]] | [[Preparation for the Beaglebone Black]] | [[Checklist]] | [[GPG Keys]] | [[Interactive Setup]] | [[Non-Interactive Setup]] | [[Post-Setup]] | [[On Client Machines]] | +| [[file:index.html][Home]] | [[Preparation for the Beaglebone Black]] | [[Checklist]] | [[Interactive Setup]] | [[Non-Interactive Setup]] | [[Post-Setup]] | [[Keydrives]] | [[On Client Machines]] | * Preparation for the Beaglebone Black @@ -57,13 +57,6 @@ Before running the freedombone command you will need a few things. * If you want to set up a social network or microblog then you will need SSL certificates corresponding to those domains * Have ssh access to the system -* GPG Keys -If you have existing GPG keys then copy the .gnupg directory onto the system. - -#+BEGIN_SRC bash -scp -r ~/.gnupg username@freedombone_IP_address:/home/username -#+END_SRC - * Interactive Setup The interactive server configuration setup is recommended for most users. On the system where freedombone is to be installed create a configuration file. @@ -126,6 +119,8 @@ FULLBLOG_DOMAIN_NAME=myblogdomain MICROBLOG_DOMAIN_NAME=mymicroblogdomain REDMATRIX_DOMAIN_NAME=myredmatrixdomain OWNCLOUD_DOMAIN_NAME=myownclouddomain +HWRNG_TYPE=haveged +ENABLE_SOCIAL_KEY_MANAGEMENT="no" #+END_SRC Both of the IP addresses are local IP addresses, typically of the form 192.168.x.x, with one being for the system and the other being for the internet router. @@ -142,6 +137,15 @@ The above command should be run in the same directory in which your configuratio Also see the manpage for additional options which can be used instead of a configuration file. +* Social Key Management +If you are using the interactive installer then you will be aked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities + +** You have the gnupg keyring on an encrypted USB drive +If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments. +** You have a number of key fragments on USB drives retrieved from friends +If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more [[Keydrives]]. +** You can specify some ssh login details for friends servers containing key fragments +Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled. * Post-Setup Setup of the server and installation of all the relevant packages is not quick, and depends upon which variant you choose and your internet bandwidth. Allow about three hours for a full installation on the Beaglebone Black. On the Beaglebone installation is in two parts, since a reboot is needed to enable the hardware random number generator and zram. @@ -174,6 +178,32 @@ On your internet router, typically under firewall settings, open the following p | Email | 993 | | VoIP | 64738 | +* Keydrives +After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this: +** Master Keydrive +This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the "Discs" application. Then plug it into the Freedombone system, then from your local machine run: + +#+BEGIN_SRC bash +ssh myusername@mydomainname -p 2222 +su +freedombone-keydrive -u myusername -d sdb --master yes +exit +exit +#+END_SRC + +If you are on a Beaglebone Black then use /sda/ rather than /sdb/ for the drive parameter. +** Fragment keydrives +This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the "Discs" application. Plug it into the Freedombone system then from your local machine run the following commands: + +#+BEGIN_SRC bash +ssh myusername@mydomainname -p 2222 +su +freedombone-keydrive -u myusername -d sdb +exit +exit +#+END_SRC + +Fragments are randomly assigned and so you will need at least three or four keydrives to have enough fragments to reconstruct your original key in a worst case scenario. You can store fragments for different Freedombone systems on the same encrypted USB drive, so you can help to ensure that your friends can also recover their systems. This might be called "/the web of backups/" or "/the web of encryption/". Since you can only write a single key fragment from your Freedombone system to a given USB drive each friend doesn't have enough information to decrypt your backups or steal your identity, even if they turn evil. This is based on the assumption that it may be difficult to get three or more friends to conspire against you all at once. * On Client Machines You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security. diff --git a/website/EN/installation.html b/website/EN/installation.html index 04add14e..a89d8132 100644 --- a/website/EN/installation.html +++ b/website/EN/installation.html @@ -4,25 +4,32 @@ - + +