diff --git a/doc/EN/installation.org b/doc/EN/installation.org index bfa20234..2c700b6b 100644 --- a/doc/EN/installation.org +++ b/doc/EN/installation.org @@ -7,7 +7,7 @@ #+BEGIN_CENTER [[./images/logo.png]] #+END_CENTER -| [[file:index.html][Home]] | [[Building an image for an SBC or Virtual Machine]] | [[Checklist]] | [[./mesh.html][Mesh network]] | [[Installation]] | [[Social Key Management (aka 'The Unforgettable Key')]] | [[Final Setup]] | [[Keydrives]] | [[On Client Machines]] | +| [[file:index.html][Home]] | [[Building an image for an SBC or Virtual Machine]] | [[Checklist]] | [[./mesh.html][Mesh network]] | [[Installation]] | [[Social Key Management (aka 'The Unforgettable Key')]] | [[Final Setup]] | [[Keydrives]] | [[On Client Machines]] | [[Administering the system]] | * Building an image for an SBC or Virtual Machine You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the *freedombone-image* command. @@ -200,3 +200,14 @@ cd freedombone sudo make install freedombone-client #+END_SRC + +* Administering the system +To administer the system after installation log in via ssh, become the root user and then launch the control panel. + +#+BEGIN_SRC bash +ssh myusername@freedombone.local -p 2222 +sudo su +control +#+END_SRC + +From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages. diff --git a/man/freedombone.1.gz b/man/freedombone.1.gz index 403a0eb4..bcaaa8c6 100644 Binary files a/man/freedombone.1.gz and b/man/freedombone.1.gz differ diff --git a/website/EN/installation.html b/website/EN/installation.html index 74be66de..21f75c65 100644 --- a/website/EN/installation.html +++ b/website/EN/installation.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
- +If you are installing one of the mesh network variants then see these instructions for details.
@@ -288,9 +291,9 @@ There are three install options: Laptop/Desktop/Netbook, SBC and Virtual MachineIf you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
@@ -309,9 +312,9 @@ freedombone menuconfigCurrently the following boards are supported:
@@ -393,9 +396,9 @@ Using the password 'freedombone'. Take a note of the new login password and thenVirtualbox and Qemu are supported. You can run a 64 bit Qemu image with:
@@ -425,25 +428,25 @@ If you are using the interactive installer then you will be aked if you wish toIf you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more Keydrives.
Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
@@ -582,9 +585,9 @@ On your internet router, typically under firewall settings, open the following p After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the Disk Utility application. Then plug it into the Freedombone system, then from your local machine run:
@@ -602,9 +605,9 @@ Select Backup and Restore then Backup GPG key to USB (master keydrive)This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this can be done from the Disk Utility application. Plug it into the Freedombone system then from your local machine run the following commands:
@@ -646,6 +649,27 @@ freedombone-client+To administer the system after installation log in via ssh, become the root user and then launch the control panel. +
+ +ssh myusername@freedombone.local -p 2222 +sudo su +control ++
+From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages. +
+