Remove any previous freedombone avahi entries from known hosts

This commit is contained in:
Bob Mottram 2016-11-20 17:37:37 +00:00
parent 5a22bc4785
commit 62b689667d
29 changed files with 135 additions and 228 deletions

View File

@ -35,8 +35,4 @@ After the install has completed go to *Security settings* and select *Create a n
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Dokuwiki domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

View File

@ -36,8 +36,4 @@ If you have just obtained a Lets Encrypt certificate as above then go to *About*
Please be aware that after installation the etherpad daemon takes a while to start up for the first time. On a low powered system such as a Beaglebone Black this can take ten minutes or more. So if you navigate to the site and see a "/Bad Gateway/" error then don't panic. Wait for ten minutes and try again.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

View File

@ -34,11 +34,7 @@ After the install has completed go to *Security settings* and select *Create a n
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Ghost blog domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
Navigate to https://yourghostblogdomain/ghost and click on *create your account*

View File

@ -35,14 +35,11 @@ Select *Add/Remove Apps* then *gnusocial*. You will then be asked for a domain n
After the install has completed go to *Security settings* and select *Create a new Let's Encrypt certificate* and enter the domain name that you are using for GNU Social. If you're using the "onion only" version of the system then you don't need to do this. If the certificate is obtained successfully then you will see a congratulations message.
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your GNU Social domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
Once you have logged in to GNU Social you may then want to select *Admin* and check or change the details. You may also wish to change the license for the site to be either Creative Commons or private.

View File

@ -36,12 +36,6 @@ After the install has completed go to *Security settings* and select *Create a n
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Gogs domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
In a browser navigate to your Gogs site and click the *Register* button. The first user registered on the system becomes the administrator. Once you've done that then it's a good idea to disable further registrations. Currently that's a little complicated, but you can do it as follows:
#+begin_src bash :tangle no

View File

@ -34,10 +34,6 @@ After the install has completed go to *Security settings* and select *Create a n
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your HTMLy blog domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
Navigate to https://yourhtmlyblogdomain/login and enter your username and password. You can then create posts or edit existing ones.

View File

@ -31,15 +31,10 @@ Select *Add/Remove Apps* then *hubzilla*. You will then be asked for a domain na
After the install has completed go to *Security settings* and select *Create a new Let's Encrypt certificate* and enter the domain name that you are using for Hubzilla. If you're using the "onion only" version of the system then you don't need to do this. If the certificate is obtained successfully then you will see a congratulations message.
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Hubzilla domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is *register* a new user. The first user on the system then becomes its administrator.
#+BEGIN_CENTER

View File

@ -34,13 +34,7 @@ After the install has completed go to *Security settings* and select *Create a n
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Lychee domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the README file in your home directory.
Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the *Passwords* section of the *Administrator control panel*.
#+BEGIN_CENTER
[[file:images/lychee_setup.jpg]]

View File

@ -38,11 +38,7 @@ After the install has completed go to *Security settings* and select *Create a n
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
If you're viewing your mail domain site on a mobile device via OrFox then make sure you allow the domain in the NoScript settings.

View File

@ -24,7 +24,7 @@ In addition to voice it is also possible to do text chat via mumble. The securit
* Using with Ubuntu
Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the README file on the Freedombone. Accept the self-signed SSL certificate. You are now ready to chat.
Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the *Passwords* section of the *Administrator control panel*. Accept the self-signed SSL certificate if you don't have a Let's Encrypt certificate set up for your default domain. You are now ready to chat.
* Using with Android
Install [[https://f-droid.org/][F-Droid]]
@ -35,7 +35,7 @@ Search for and install Plumble.
Press the plus button to add a Mumble server.
Enter a label (which can be any name you choose for the server), the default domain name of the Freedombone or preferably the mumble onion address as shown on the *About* screen of the *Administrator control panel*, your username (which can also be anything) and the VoIP server password which can be found in the README file on the Freedombone.
Enter a label (which can be any name you choose for the server), the default domain name of the Freedombone or preferably the mumble onion address as shown on the *About* screen of the *Administrator control panel*, your username (which can also be anything) and the mumble password which can be found in the *Passwords* section of the *Administrator control panel*.
Open the settings. Select General, then Connect via Tor. This will provide better protection, making it more difficult for adversaries to know who is talking to who.

View File

@ -34,10 +34,6 @@ After the install has completed go to *Security settings* and select *Create a n
* Initial setup
If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Postactiv domain listed there along with an onion address. You can then navigate to your site in a browser.
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run:
#+begin_src bash
editor README
#+end_src
To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
Navigate to your PostActiv domain name and log in.

View File

@ -34,7 +34,7 @@ Via F-droid install *DAVdroid*.
There seems to be a problem with Let's Encrypt certificates with this app, but it's possible to get around it. Open DAVdroid and select the side *menu* followed by *Settings*. Enable *Distrust system certificates* and press *Reset untrusted certificates*.
Exit from settings and press the *plus button* to add an account. Select *Login with URL and user name*. The URL should be https://yourmaindomainname/radicale/. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within the README file within your home directory.
Exit from settings and press the *plus button* to add an account. Select *Login with URL and user name*. The URL should be https://yourmaindomainname/radicale/. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within *Passwords* section of the *Administrator control panel*.
You will be prompted to approve the Let's Encrypt cerificate for your domain name, and once that's done then you should see your account as a large yellow box. Press on that and ensure that *Addresses* and *calendar* are selected.

View File

@ -33,7 +33,7 @@ Select *Administrator controls* then select the *About* screen.
The RSS reader is accessible only via an onion address. This provides a reasonable degree of reading privacy, making it difficult for passive adversaries such as governments, corporations or criminals to create lists of sites which you are subscribed to.
To set up the system open http://rss_reader_onion_address and log in with username *admin* and the password obtained either at the beginning of the install or from the README file in your home directory. You can then select the *Actions* menu and begin adding your feeds.
To set up the system open http://rss_reader_onion_address and log in with username *admin* and the password which can be found within the *Passwords* section of the *Administrator control panel*. You can then select the *Actions* menu and begin adding your feeds.
* On mobile
To access the RSS reader from a mobile device you can install a Tor compatible browser such as OrFox, then use the mobile onion address shown on the *About* screen of the *Administrator controls*. Remember to add the site to the NoScript whitelist, and you may also need to turn HTTPS Everywhere off.

View File

@ -16,7 +16,7 @@
</center>
#+END_EXPORT
Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within *App Settings* under *tox* within the *Administrator control panel*. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
* The Toxic client
Log into your system with:

View File

@ -170,7 +170,7 @@ If you previously made some USB drives containing key fragments then retrieve th
** You can specify some ssh login details for friends servers containing key fragments
Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
* Final Setup
Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX.
Any manual post-installation setup instructions or passwords can be found in /home/username/README.
On your internet router, typically under firewall settings, open the following ports and forward them to your server.

View File

@ -43,16 +43,14 @@
| [[./app_pihole.html][Blocking Ads]] |
* Readme
After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands:
After the system has installed a README file will be generated which contains any advice on particular apps installed. Ordinarily you won't need to read it though. You can access it with the following commands:
#+BEGIN_SRC bash
ssh username@domainname -p 2222
emacs ~/README
editor ~/README
#+END_SRC
You should transfer any passwords to a password manager such as [[https://www.keepassx.org/][KeepassX]] and then delete them from the README file. To save the file after removing passwords use *CTRL-x CTRL-s*.
To exit you can either just close the terminal or use *CTRL-x CTRL-c* followed by the *exit* command.
To exit if you're using emacs (which is the default editor, but can be changed to vim) you can either just close the terminal or use *CTRL-x CTRL-c* followed by the *exit* command.
* Improving ssh security
To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.

View File

@ -260,6 +260,13 @@ function setup_client_app {
exit 0
}
function remove_known_hosts_entries {
# remove any previous freedombone entries from known hosts
if [ -f /home/$CURR_USER/.ssh/known_hosts ]; then
sed -i "/${PROJECT_NAME}.local/d" /home/$CURR_USER/.ssh/known_hosts
fi
}
while [[ $# > 1 ]]
do
key="$1"
@ -301,6 +308,7 @@ refresh_gpg_keys
configure_ssh_client
global_rate_limit
configure_monkeysphere
remove_known_hosts_entries
if [[ $MESH_CLIENT_INSTALL == $'yes' || $MESH_CLIENT_INSTALL == $'y' || $MESH_CLIENT_INSTALL == $'on' ]]; then
echo $'Installing mesh packages'
if [ ! -f /usr/bin/pacman ]; then

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 14:48 -->
<!-- 2016-11-20 Sun 15:35 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -252,9 +252,9 @@ Dokuwiki is a wiki which stores its content in text files. Having no database ma
</p>
<div id="outline-container-orgd467478" class="outline-2">
<h2 id="orgd467478">Installation</h2>
<div class="outline-text-2" id="text-orgd467478">
<div id="outline-container-orgd54ed27" class="outline-2">
<h2 id="orgd54ed27">Installation</h2>
<div class="outline-text-2" id="text-orgd54ed27">
<p>
Log into your system with:
</p>
@ -278,21 +278,16 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orgfabf8b6" class="outline-2">
<h2 id="orgfabf8b6">Initial setup</h2>
<div class="outline-text-2" id="text-orgfabf8b6">
<div id="outline-container-org022ff5a" class="outline-2">
<h2 id="org022ff5a">Initial setup</h2>
<div class="outline-text-2" id="text-org022ff5a">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Dokuwiki domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
To see the login password for your site go to <b>Passwords</b> on the <b>Administrator control panel</b> and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
</div>
</div>
</div>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-18 Fri 23:55 -->
<!-- 2016-11-20 Sun 15:35 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -251,9 +251,9 @@ for the JavaScript code in this tag.
For collaborative document editing Etherpad is hard to beat. Just log in, choose a document title and then edit. Different users will appear in different colours, and can also chat in the sidebar. This is installed as a private system in which only users on your Freedombone server will be able to create and edit documents, so it's not open to any random users on the internet.
</p>
<div id="outline-container-org62df1b2" class="outline-2">
<h2 id="org62df1b2">Installation</h2>
<div class="outline-text-2" id="text-org62df1b2">
<div id="outline-container-orge184e4f" class="outline-2">
<h2 id="orge184e4f">Installation</h2>
<div class="outline-text-2" id="text-orge184e4f">
<p>
Log into your system with:
</p>
@ -277,9 +277,9 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orgf51f407" class="outline-2">
<h2 id="orgf51f407">Initial setup</h2>
<div class="outline-text-2" id="text-orgf51f407">
<div id="outline-container-org50c1610" class="outline-2">
<h2 id="org50c1610">Initial setup</h2>
<div class="outline-text-2" id="text-org50c1610">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Etherpad domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
@ -289,13 +289,8 @@ Please be aware that after installation the etherpad daemon takes a while to sta
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
To see the login password for your site go to <b>Passwords</b> on the <b>Administrator control panel</b> and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
</div>
</div>
</div>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 18:14 -->
<!-- 2016-11-20 Sun 15:35 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -251,9 +251,9 @@ for the JavaScript code in this tag.
Ghost is a blogging system which uses markdown formatted posts. It's quite simple to use, and also looks nice even on small mobile screens.
</p>
<div id="outline-container-org4cfb1be" class="outline-2">
<h2 id="org4cfb1be">Installation</h2>
<div class="outline-text-2" id="text-org4cfb1be">
<div id="outline-container-org3a5c5c6" class="outline-2">
<h2 id="org3a5c5c6">Installation</h2>
<div class="outline-text-2" id="text-org3a5c5c6">
<p>
Log into your system with:
</p>
@ -277,22 +277,17 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orgddd9e90" class="outline-2">
<h2 id="orgddd9e90">Initial setup</h2>
<div class="outline-text-2" id="text-orgddd9e90">
<div id="outline-container-orga576613" class="outline-2">
<h2 id="orga576613">Initial setup</h2>
<div class="outline-text-2" id="text-orga576613">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Ghost blog domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
To see the login password for your site go to <b>Passwords</b> on the <b>Administrator control panel</b> and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
<p>
Navigate to <a href="https://yourghostblogdomain/ghost">https://yourghostblogdomain/ghost</a> and click on <b>create your account</b>
</p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 13:07 -->
<!-- 2016-11-20 Sun 15:36 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -259,9 +259,9 @@ You can host your own GNU Social instance and then "<i>remote follow</i>" other
You should regard anything posted to GNU Social as being <i>public communication</i> visible to anyone on the internet. There is a direct messaging capability between users but it's not particularly secure, so for one-to-one messages stick to better methods, such as XMPP with OTR/OMEMO or Tox.
</p>
<div id="outline-container-orgedf27a4" class="outline-2">
<h2 id="orgedf27a4">Installation</h2>
<div class="outline-text-2" id="text-orgedf27a4">
<div id="outline-container-orgbe819a6" class="outline-2">
<h2 id="orgbe819a6">Installation</h2>
<div class="outline-text-2" id="text-orgbe819a6">
<p>
Log into your system with:
</p>
@ -285,22 +285,18 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-org7940d47" class="outline-2">
<h2 id="org7940d47">Initial setup</h2>
<div class="outline-text-2" id="text-org7940d47">
<div id="outline-container-org8662408" class="outline-2">
<h2 id="org8662408">Initial setup</h2>
<div class="outline-text-2" id="text-org8662408">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your GNU Social domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
To see the login password for your site go to <b>Passwords</b> on the <b>Administrator control panel</b> and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
<p>
Once you have logged in to GNU Social you may then want to select <b>Admin</b> and check or change the details. You may also wish to change the license for the site to be either Creative Commons or private.
</p>
@ -320,9 +316,9 @@ GNU Social has a clutter-free mobile user interface which can be accessed via a
</div>
<div id="outline-container-org7ddbe54" class="outline-2">
<h2 id="org7ddbe54">Using with Emacs</h2>
<div class="outline-text-2" id="text-org7ddbe54">
<div id="outline-container-orgb147eaa" class="outline-2">
<h2 id="orgb147eaa">Using with Emacs</h2>
<div class="outline-text-2" id="text-orgb147eaa">
<p>
If you are an Emacs user it's also possible to set up GNU Social mode as follows:
</p>
@ -406,9 +402,9 @@ And as a quick reference the main keys are:
</div>
<div id="outline-container-orgab5971f" class="outline-2">
<h2 id="orgab5971f">Sharing things</h2>
<div class="outline-text-2" id="text-orgab5971f">
<div id="outline-container-orgc4df87d" class="outline-2">
<h2 id="orgc4df87d">Sharing things</h2>
<div class="outline-text-2" id="text-orgc4df87d">
<p>
If you have the GNU Social microblogging system installed then it's also possible to share things or services between groups or with particular users. This can be useful for sharing items within a family, club or in a local sharing economy. Sharing things freely, without money, reveals the social basis at the root of all economics which money normally conceals or obscures.
</p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 13:15 -->
<!-- 2016-11-20 Sun 15:37 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -255,9 +255,9 @@ Github is ok, but it's proprietary and funded by venture capital. If you been ar
A Git hosting system called <a href="https://gogs.io">Gogs</a> can optionally be installed. This is very similar to Github in appearance and use. It's lightweight and so well suited for use on low power ARM servers.
</p>
<div id="outline-container-org45aa5cf" class="outline-2">
<h2 id="org45aa5cf">Installation</h2>
<div class="outline-text-2" id="text-org45aa5cf">
<div id="outline-container-org94d5253" class="outline-2">
<h2 id="org94d5253">Installation</h2>
<div class="outline-text-2" id="text-org94d5253">
<p>
Log into your system with:
</p>
@ -281,22 +281,13 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orgebd229b" class="outline-2">
<h2 id="orgebd229b">Initial setup</h2>
<div class="outline-text-2" id="text-orgebd229b">
<div id="outline-container-org5bb037b" class="outline-2">
<h2 id="org5bb037b">Initial setup</h2>
<div class="outline-text-2" id="text-org5bb037b">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Gogs domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
<p>
In a browser navigate to your Gogs site and click the <b>Register</b> button. The first user registered on the system becomes the administrator. Once you've done that then it's a good idea to disable further registrations. Currently that's a little complicated, but you can do it as follows:
</p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 20:59 -->
<!-- 2016-11-20 Sun 15:37 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -251,9 +251,9 @@ for the JavaScript code in this tag.
HTMLy is a databaseless blogging system.
</p>
<div id="outline-container-orgdeea509" class="outline-2">
<h2 id="orgdeea509">Installation</h2>
<div class="outline-text-2" id="text-orgdeea509">
<div id="outline-container-org4ef0ec6" class="outline-2">
<h2 id="org4ef0ec6">Installation</h2>
<div class="outline-text-2" id="text-org4ef0ec6">
<p>
Log into your system with:
</p>
@ -277,22 +277,17 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-org2b6f177" class="outline-2">
<h2 id="org2b6f177">Initial setup</h2>
<div class="outline-text-2" id="text-org2b6f177">
<div id="outline-container-orgdcb1abf" class="outline-2">
<h2 id="orgdcb1abf">Initial setup</h2>
<div class="outline-text-2" id="text-orgdcb1abf">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your HTMLy blog domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
To see the login password for your site go to <b>Passwords</b> on the <b>Administrator control panel</b> and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
<p>
Navigate to <a href="https://yourhtmlyblogdomain/login">https://yourhtmlyblogdomain/login</a> and enter your username and password. You can then create posts or edit existing ones.
</p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 13:10 -->
<!-- 2016-11-20 Sun 15:38 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -251,9 +251,9 @@ for the JavaScript code in this tag.
Hubzilla is a web publishing and social network system which includes wiki, web pages, photo albums and file storage. It also has privacy controls which allow you to define who can see which content. It's possible to write posts and have them visible only to a group of friends (known as "<i>privacy groups</i>"), with the encryption being handled automatically.
</p>
<div id="outline-container-orga7e6aea" class="outline-2">
<h2 id="orga7e6aea">Installation</h2>
<div class="outline-text-2" id="text-orga7e6aea">
<div id="outline-container-org854761e" class="outline-2">
<h2 id="org854761e">Installation</h2>
<div class="outline-text-2" id="text-org854761e">
<p>
Log into your system with:
</p>
@ -277,22 +277,14 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orgfd765de" class="outline-2">
<h2 id="orgfd765de">Initial setup</h2>
<div class="outline-text-2" id="text-orgfd765de">
<div id="outline-container-orgaf1b525" class="outline-2">
<h2 id="orgaf1b525">Initial setup</h2>
<div class="outline-text-2" id="text-orgaf1b525">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Hubzilla domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
<p>
On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is <b>register</b> a new user. The first user on the system then becomes its administrator.
</p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 21:43 -->
<!-- 2016-11-20 Sun 16:24 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -251,9 +251,9 @@ for the JavaScript code in this tag.
Lychee is a simple and lightweight photo album for the web. Whether you're an amateur or professional photographer, or want to publish random holiday pics or cat pictures. Lychee just does what it says it does without any fuss. There is also a photo album feature within <a href="./app_hubzilla.html">Hubzilla</a> if you need more sophisticated social photo sharing with individualised permissions.
</p>
<div id="outline-container-org0567e9a" class="outline-2">
<h2 id="org0567e9a">Installation</h2>
<div class="outline-text-2" id="text-org0567e9a">
<div id="outline-container-orgc1c8a88" class="outline-2">
<h2 id="orgc1c8a88">Installation</h2>
<div class="outline-text-2" id="text-orgc1c8a88">
<p>
Log into your system with:
</p>
@ -277,24 +277,15 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-org6640800" class="outline-2">
<h2 id="org6640800">Initial setup</h2>
<div class="outline-text-2" id="text-org6640800">
<div id="outline-container-orgf552fe4" class="outline-2">
<h2 id="orgf552fe4">Initial setup</h2>
<div class="outline-text-2" id="text-orgf552fe4">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Lychee domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
<p>
Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the README file in your home directory.
Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the <b>Passwords</b> section of the <b>Administrator control panel</b>.
</p>
<div class="org-center">

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-14 Mon 13:40 -->
<!-- 2016-11-20 Sun 16:25 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -259,9 +259,9 @@ An advantage of this type of webmail is that <i>it keeps your GPG keys off of an
One down side is that this appears to be a single user system, so if you have multiple users on your Freedombone server only the administrator will actually be able to use mailpile.
</p>
<div id="outline-container-org87b8219" class="outline-2">
<h2 id="org87b8219">Installation</h2>
<div class="outline-text-2" id="text-org87b8219">
<div id="outline-container-orgbb72e25" class="outline-2">
<h2 id="orgbb72e25">Installation</h2>
<div class="outline-text-2" id="text-orgbb72e25">
<p>
Log into your system with:
</p>
@ -285,22 +285,17 @@ After the install has completed go to <b>Security settings</b> and select <b>Cre
</div>
</div>
<div id="outline-container-orgcb63769" class="outline-2">
<h2 id="orgcb63769">Initial setup</h2>
<div class="outline-text-2" id="text-orgcb63769">
<div id="outline-container-org342d100" class="outline-2">
<h2 id="org342d100">Initial setup</h2>
<div class="outline-text-2" id="text-org342d100">
<p>
If you have just obtained a Lets Encrypt certificate as above then go to <b>About</b> on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser.
</p>
<p>
If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select <b>Exit to the command line</b> and then run:
To see the login password for your site go to <b>Passwords</b> on the <b>Administrator control panel</b> and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.
</p>
<div class="org-src-container">
<pre class="src src-bash">editor README
</pre>
</div>
<p>
If you're viewing your mail domain site on a mobile device via OrFox then make sure you allow the domain in the NoScript settings.
</p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-12 Sat 22:51 -->
<!-- 2016-11-20 Sun 16:26 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -251,31 +251,31 @@ for the JavaScript code in this tag.
Mumble is a well known VoIP system originally used for gaming, but which works just as well for any general conference calls or meetings.
</p>
<div id="outline-container-org64adfeb" class="outline-2">
<h2 id="org64adfeb">Text chat</h2>
<div class="outline-text-2" id="text-org64adfeb">
<div id="outline-container-org1fd07be" class="outline-2">
<h2 id="org1fd07be">Text chat</h2>
<div class="outline-text-2" id="text-org1fd07be">
<p>
In addition to voice it is also possible to do text chat via mumble. The security of this is pretty good provided that you do it via Plumble and Orbot on mobile, but compared to other options such as XMPP/Conversations or Tox the security is not as good, since the mumble server currently doesn't support forward secrecy.
</p>
</div>
</div>
<div id="outline-container-org639519e" class="outline-2">
<h2 id="org639519e">Using with Ubuntu</h2>
<div class="outline-text-2" id="text-org639519e">
<div id="outline-container-org0591866" class="outline-2">
<h2 id="org0591866">Using with Ubuntu</h2>
<div class="outline-text-2" id="text-org0591866">
<p>
Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
</p>
<p>
Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the README file on the Freedombone. Accept the self-signed SSL certificate. You are now ready to chat.
Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the <b>Passwords</b> section of the <b>Administrator control panel</b>. Accept the self-signed SSL certificate if you don't have a Let's Encrypt certificate set up for your default domain. You are now ready to chat.
</p>
</div>
</div>
<div id="outline-container-orga14e916" class="outline-2">
<h2 id="orga14e916">Using with Android</h2>
<div class="outline-text-2" id="text-orga14e916">
<div id="outline-container-orgbe9ea62" class="outline-2">
<h2 id="orgbe9ea62">Using with Android</h2>
<div class="outline-text-2" id="text-orgbe9ea62">
<p>
Install <a href="https://f-droid.org/">F-Droid</a>
</p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-17 Thu 16:40 -->
<!-- 2016-11-20 Sun 16:28 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -251,9 +251,9 @@ for the JavaScript code in this tag.
Radicale is a calendar server which allows your to synchronise your calendar across all your devices. Support for CalDAV within various client systems can be quite patchy/flaky though, so use it with caution.
</p>
<div id="outline-container-org7574c95" class="outline-2">
<h2 id="org7574c95">Installation</h2>
<div class="outline-text-2" id="text-org7574c95">
<div id="outline-container-org125e2b1" class="outline-2">
<h2 id="org125e2b1">Installation</h2>
<div class="outline-text-2" id="text-org125e2b1">
<p>
Log into your system with:
</p>
@ -273,9 +273,9 @@ Select <b>Add/Remove Apps</b> then <b>radicale</b>. If you don't already have an
</div>
</div>
<div id="outline-container-orgde015fe" class="outline-2">
<h2 id="orgde015fe">Setting up on Android</h2>
<div class="outline-text-2" id="text-orgde015fe">
<div id="outline-container-org1a925d4" class="outline-2">
<h2 id="org1a925d4">Setting up on Android</h2>
<div class="outline-text-2" id="text-org1a925d4">
<p>
Via F-droid install <b>DAVdroid</b>.
</p>
@ -285,7 +285,7 @@ There seems to be a problem with Let's Encrypt certificates with this app, but i
</p>
<p>
Exit from settings and press the <b>plus button</b> to add an account. Select <b>Login with URL and user name</b>. The URL should be <a href="https://yourmaindomainname/radicale/">https://yourmaindomainname/radicale/</a>. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within the README file within your home directory.
Exit from settings and press the <b>plus button</b> to add an account. Select <b>Login with URL and user name</b>. The URL should be <a href="https://yourmaindomainname/radicale/">https://yourmaindomainname/radicale/</a>. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within <b>Passwords</b> section of the <b>Administrator control panel</b>.
</p>
<p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2016-11-12 Sat 23:04 -->
<!-- 2016-11-20 Sun 16:29 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -259,9 +259,9 @@ The way that RSS reading is set up on Freedombone gives you strong reading priva
</div>
</div>
<div id="outline-container-orgb5420ab" class="outline-2">
<h2 id="orgb5420ab">Finding the onion address</h2>
<div class="outline-text-2" id="text-orgb5420ab">
<div id="outline-container-org291e4bf" class="outline-2">
<h2 id="org291e4bf">Finding the onion address</h2>
<div class="outline-text-2" id="text-org291e4bf">
<p>
See the control panel for the RSS reader onion address.
</p>
@ -280,14 +280,14 @@ The RSS reader is accessible only via an onion address. This provides a reasonab
</p>
<p>
To set up the system open <a href="http://rss_reader_onion_address">http://rss_reader_onion_address</a> and log in with username <b>admin</b> and the password obtained either at the beginning of the install or from the README file in your home directory. You can then select the <b>Actions</b> menu and begin adding your feeds.
To set up the system open <a href="http://rss_reader_onion_address">http://rss_reader_onion_address</a> and log in with username <b>admin</b> and the password which can be found within the <b>Passwords</b> section of the <b>Administrator control panel</b>. You can then select the <b>Actions</b> menu and begin adding your feeds.
</p>
</div>
</div>
<div id="outline-container-org9ed01db" class="outline-2">
<h2 id="org9ed01db">On mobile</h2>
<div class="outline-text-2" id="text-org9ed01db">
<div id="outline-container-org6517ef1" class="outline-2">
<h2 id="org6517ef1">On mobile</h2>
<div class="outline-text-2" id="text-org6517ef1">
<p>
To access the RSS reader from a mobile device you can install a Tor compatible browser such as OrFox, then use the mobile onion address shown on the <b>About</b> screen of the <b>Administrator controls</b>. Remember to add the site to the NoScript whitelist, and you may also need to turn HTTPS Everywhere off.
</p>
@ -299,9 +299,9 @@ A note for the paranoid is that on mobile devices you get redirected to a differ
</blockquote>
</div>
</div>
<div id="outline-container-orgaafcbb6" class="outline-2">
<h2 id="orgaafcbb6">With Emacs</h2>
<div class="outline-text-2" id="text-orgaafcbb6">
<div id="outline-container-org96b9580" class="outline-2">
<h2 id="org96b9580">With Emacs</h2>
<div class="outline-text-2" id="text-org96b9580">
<p>
If you are an Emacs user then you can also read your RSS feeds via the <a href="https://github.com/dk87/avandu">Avandu</a> mode.
</p>