From 62b689667d2704aa24681130f9f05d968b020518 Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Sun, 20 Nov 2016 17:37:37 +0000 Subject: [PATCH] Remove any previous freedombone avahi entries from known hosts --- doc/EN/app_dokuwiki.org | 6 +----- doc/EN/app_etherpad.org | 6 +----- doc/EN/app_ghost.org | 6 +----- doc/EN/app_gnusocial.org | 7 ++----- doc/EN/app_gogs.org | 6 ------ doc/EN/app_htmly.org | 6 +----- doc/EN/app_hubzilla.org | 7 +------ doc/EN/app_lychee.org | 8 +------- doc/EN/app_mailpile.org | 6 +----- doc/EN/app_mumble.org | 4 ++-- doc/EN/app_postactiv.org | 6 +----- doc/EN/app_radicale.org | 2 +- doc/EN/app_rss.org | 2 +- doc/EN/app_tox.org | 2 +- doc/EN/installation.org | 2 +- doc/EN/usage.org | 8 +++----- src/freedombone-client | 8 ++++++++ website/EN/app_dokuwiki.html | 21 ++++++++------------- website/EN/app_etherpad.html | 21 ++++++++------------- website/EN/app_ghost.html | 21 ++++++++------------- website/EN/app_gnusocial.html | 34 +++++++++++++++------------------- website/EN/app_gogs.html | 23 +++++++---------------- website/EN/app_htmly.html | 21 ++++++++------------- website/EN/app_hubzilla.html | 24 ++++++++---------------- website/EN/app_lychee.html | 25 ++++++++----------------- website/EN/app_mailpile.html | 21 ++++++++------------- website/EN/app_mumble.html | 22 +++++++++++----------- website/EN/app_radicale.html | 16 ++++++++-------- website/EN/app_rss.html | 22 +++++++++++----------- 29 files changed, 135 insertions(+), 228 deletions(-) diff --git a/doc/EN/app_dokuwiki.org b/doc/EN/app_dokuwiki.org index ebef2f4c..4bc7839c 100644 --- a/doc/EN/app_dokuwiki.org +++ b/doc/EN/app_dokuwiki.org @@ -35,8 +35,4 @@ After the install has completed go to *Security settings* and select *Create a n * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Dokuwiki domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src +To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system. diff --git a/doc/EN/app_etherpad.org b/doc/EN/app_etherpad.org index f30863d2..e0da27c8 100644 --- a/doc/EN/app_etherpad.org +++ b/doc/EN/app_etherpad.org @@ -36,8 +36,4 @@ If you have just obtained a Lets Encrypt certificate as above then go to *About* Please be aware that after installation the etherpad daemon takes a while to start up for the first time. On a low powered system such as a Beaglebone Black this can take ten minutes or more. So if you navigate to the site and see a "/Bad Gateway/" error then don't panic. Wait for ten minutes and try again. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src +To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system. diff --git a/doc/EN/app_ghost.org b/doc/EN/app_ghost.org index 304cc162..0acca30a 100644 --- a/doc/EN/app_ghost.org +++ b/doc/EN/app_ghost.org @@ -34,11 +34,7 @@ After the install has completed go to *Security settings* and select *Create a n * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Ghost blog domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src +To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system. Navigate to https://yourghostblogdomain/ghost and click on *create your account* diff --git a/doc/EN/app_gnusocial.org b/doc/EN/app_gnusocial.org index 2ae3accc..7f62ef6c 100644 --- a/doc/EN/app_gnusocial.org +++ b/doc/EN/app_gnusocial.org @@ -35,14 +35,11 @@ Select *Add/Remove Apps* then *gnusocial*. You will then be asked for a domain n After the install has completed go to *Security settings* and select *Create a new Let's Encrypt certificate* and enter the domain name that you are using for GNU Social. If you're using the "onion only" version of the system then you don't need to do this. If the certificate is obtained successfully then you will see a congratulations message. + * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your GNU Social domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src +To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system. Once you have logged in to GNU Social you may then want to select *Admin* and check or change the details. You may also wish to change the license for the site to be either Creative Commons or private. diff --git a/doc/EN/app_gogs.org b/doc/EN/app_gogs.org index beeaf8b1..bb3669a7 100644 --- a/doc/EN/app_gogs.org +++ b/doc/EN/app_gogs.org @@ -36,12 +36,6 @@ After the install has completed go to *Security settings* and select *Create a n * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Gogs domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src - In a browser navigate to your Gogs site and click the *Register* button. The first user registered on the system becomes the administrator. Once you've done that then it's a good idea to disable further registrations. Currently that's a little complicated, but you can do it as follows: #+begin_src bash :tangle no diff --git a/doc/EN/app_htmly.org b/doc/EN/app_htmly.org index 775882ce..e3fd5059 100644 --- a/doc/EN/app_htmly.org +++ b/doc/EN/app_htmly.org @@ -34,10 +34,6 @@ After the install has completed go to *Security settings* and select *Create a n * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your HTMLy blog domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src +To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system. Navigate to https://yourhtmlyblogdomain/login and enter your username and password. You can then create posts or edit existing ones. diff --git a/doc/EN/app_hubzilla.org b/doc/EN/app_hubzilla.org index 01bbfed5..18d1a225 100644 --- a/doc/EN/app_hubzilla.org +++ b/doc/EN/app_hubzilla.org @@ -31,15 +31,10 @@ Select *Add/Remove Apps* then *hubzilla*. You will then be asked for a domain na After the install has completed go to *Security settings* and select *Create a new Let's Encrypt certificate* and enter the domain name that you are using for Hubzilla. If you're using the "onion only" version of the system then you don't need to do this. If the certificate is obtained successfully then you will see a congratulations message. + * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Hubzilla domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src - On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is *register* a new user. The first user on the system then becomes its administrator. #+BEGIN_CENTER diff --git a/doc/EN/app_lychee.org b/doc/EN/app_lychee.org index c87fad9d..8c28d924 100644 --- a/doc/EN/app_lychee.org +++ b/doc/EN/app_lychee.org @@ -34,13 +34,7 @@ After the install has completed go to *Security settings* and select *Create a n * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Lychee domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src - -Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the README file in your home directory. +Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the *Passwords* section of the *Administrator control panel*. #+BEGIN_CENTER [[file:images/lychee_setup.jpg]] diff --git a/doc/EN/app_mailpile.org b/doc/EN/app_mailpile.org index 2d42aa70..20213d94 100644 --- a/doc/EN/app_mailpile.org +++ b/doc/EN/app_mailpile.org @@ -38,11 +38,7 @@ After the install has completed go to *Security settings* and select *Create a n * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src +To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system. If you're viewing your mail domain site on a mobile device via OrFox then make sure you allow the domain in the NoScript settings. diff --git a/doc/EN/app_mumble.org b/doc/EN/app_mumble.org index e571fc44..bea1d1f0 100644 --- a/doc/EN/app_mumble.org +++ b/doc/EN/app_mumble.org @@ -24,7 +24,7 @@ In addition to voice it is also possible to do text chat via mumble. The securit * Using with Ubuntu Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard. -Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the README file on the Freedombone. Accept the self-signed SSL certificate. You are now ready to chat. +Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the *Passwords* section of the *Administrator control panel*. Accept the self-signed SSL certificate if you don't have a Let's Encrypt certificate set up for your default domain. You are now ready to chat. * Using with Android Install [[https://f-droid.org/][F-Droid]] @@ -35,7 +35,7 @@ Search for and install Plumble. Press the plus button to add a Mumble server. -Enter a label (which can be any name you choose for the server), the default domain name of the Freedombone or preferably the mumble onion address as shown on the *About* screen of the *Administrator control panel*, your username (which can also be anything) and the VoIP server password which can be found in the README file on the Freedombone. +Enter a label (which can be any name you choose for the server), the default domain name of the Freedombone or preferably the mumble onion address as shown on the *About* screen of the *Administrator control panel*, your username (which can also be anything) and the mumble password which can be found in the *Passwords* section of the *Administrator control panel*. Open the settings. Select General, then Connect via Tor. This will provide better protection, making it more difficult for adversaries to know who is talking to who. diff --git a/doc/EN/app_postactiv.org b/doc/EN/app_postactiv.org index 3f17af89..b879870a 100644 --- a/doc/EN/app_postactiv.org +++ b/doc/EN/app_postactiv.org @@ -34,10 +34,6 @@ After the install has completed go to *Security settings* and select *Create a n * Initial setup If you have just obtained a Lets Encrypt certificate as above then go to *About* on the administrator control panel and you should see your Postactiv domain listed there along with an onion address. You can then navigate to your site in a browser. -If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select *Exit to the command line* and then run: - -#+begin_src bash -editor README -#+end_src +To see the login password for your site go to *Passwords* on the *Administrator control panel* and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system. Navigate to your PostActiv domain name and log in. diff --git a/doc/EN/app_radicale.org b/doc/EN/app_radicale.org index 8d02073f..d6acc4c8 100644 --- a/doc/EN/app_radicale.org +++ b/doc/EN/app_radicale.org @@ -34,7 +34,7 @@ Via F-droid install *DAVdroid*. There seems to be a problem with Let's Encrypt certificates with this app, but it's possible to get around it. Open DAVdroid and select the side *menu* followed by *Settings*. Enable *Distrust system certificates* and press *Reset untrusted certificates*. -Exit from settings and press the *plus button* to add an account. Select *Login with URL and user name*. The URL should be https://yourmaindomainname/radicale/. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within the README file within your home directory. +Exit from settings and press the *plus button* to add an account. Select *Login with URL and user name*. The URL should be https://yourmaindomainname/radicale/. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within *Passwords* section of the *Administrator control panel*. You will be prompted to approve the Let's Encrypt cerificate for your domain name, and once that's done then you should see your account as a large yellow box. Press on that and ensure that *Addresses* and *calendar* are selected. diff --git a/doc/EN/app_rss.org b/doc/EN/app_rss.org index a2d3fa6d..cbb54951 100644 --- a/doc/EN/app_rss.org +++ b/doc/EN/app_rss.org @@ -33,7 +33,7 @@ Select *Administrator controls* then select the *About* screen. The RSS reader is accessible only via an onion address. This provides a reasonable degree of reading privacy, making it difficult for passive adversaries such as governments, corporations or criminals to create lists of sites which you are subscribed to. -To set up the system open http://rss_reader_onion_address and log in with username *admin* and the password obtained either at the beginning of the install or from the README file in your home directory. You can then select the *Actions* menu and begin adding your feeds. +To set up the system open http://rss_reader_onion_address and log in with username *admin* and the password which can be found within the *Passwords* section of the *Administrator control panel*. You can then select the *Actions* menu and begin adding your feeds. * On mobile To access the RSS reader from a mobile device you can install a Tor compatible browser such as OrFox, then use the mobile onion address shown on the *About* screen of the *Administrator controls*. Remember to add the site to the NoScript whitelist, and you may also need to turn HTTPS Everywhere off. diff --git a/doc/EN/app_tox.org b/doc/EN/app_tox.org index 9b842acf..21fd89d5 100644 --- a/doc/EN/app_tox.org +++ b/doc/EN/app_tox.org @@ -16,7 +16,7 @@ #+END_EXPORT -Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available. +Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within *App Settings* under *tox* within the *Administrator control panel*. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available. * The Toxic client Log into your system with: diff --git a/doc/EN/installation.org b/doc/EN/installation.org index f3492586..aa832f23 100644 --- a/doc/EN/installation.org +++ b/doc/EN/installation.org @@ -170,7 +170,7 @@ If you previously made some USB drives containing key fragments then retrieve th ** You can specify some ssh login details for friends servers containing key fragments Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled. * Final Setup -Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX. +Any manual post-installation setup instructions or passwords can be found in /home/username/README. On your internet router, typically under firewall settings, open the following ports and forward them to your server. diff --git a/doc/EN/usage.org b/doc/EN/usage.org index ade7d6c5..71abd3a6 100644 --- a/doc/EN/usage.org +++ b/doc/EN/usage.org @@ -43,16 +43,14 @@ | [[./app_pihole.html][Blocking Ads]] | * Readme -After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands: +After the system has installed a README file will be generated which contains any advice on particular apps installed. Ordinarily you won't need to read it though. You can access it with the following commands: #+BEGIN_SRC bash ssh username@domainname -p 2222 -emacs ~/README +editor ~/README #+END_SRC -You should transfer any passwords to a password manager such as [[https://www.keepassx.org/][KeepassX]] and then delete them from the README file. To save the file after removing passwords use *CTRL-x CTRL-s*. - -To exit you can either just close the terminal or use *CTRL-x CTRL-c* followed by the *exit* command. +To exit if you're using emacs (which is the default editor, but can be changed to vim) you can either just close the terminal or use *CTRL-x CTRL-c* followed by the *exit* command. * Improving ssh security To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone. diff --git a/src/freedombone-client b/src/freedombone-client index 5501f58e..1c1a6ea4 100755 --- a/src/freedombone-client +++ b/src/freedombone-client @@ -260,6 +260,13 @@ function setup_client_app { exit 0 } +function remove_known_hosts_entries { + # remove any previous freedombone entries from known hosts + if [ -f /home/$CURR_USER/.ssh/known_hosts ]; then + sed -i "/${PROJECT_NAME}.local/d" /home/$CURR_USER/.ssh/known_hosts + fi +} + while [[ $# > 1 ]] do key="$1" @@ -301,6 +308,7 @@ refresh_gpg_keys configure_ssh_client global_rate_limit configure_monkeysphere +remove_known_hosts_entries if [[ $MESH_CLIENT_INSTALL == $'yes' || $MESH_CLIENT_INSTALL == $'y' || $MESH_CLIENT_INSTALL == $'on' ]]; then echo $'Installing mesh packages' if [ ! -f /usr/bin/pacman ]; then diff --git a/website/EN/app_dokuwiki.html b/website/EN/app_dokuwiki.html index 11658d75..380ff49c 100644 --- a/website/EN/app_dokuwiki.html +++ b/website/EN/app_dokuwiki.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -252,9 +252,9 @@ Dokuwiki is a wiki which stores its content in text files. Having no database ma

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -278,21 +278,16 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your Dokuwiki domain listed there along with an onion address. You can then navigate to your site in a browser.

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: +To see the login password for your site go to Passwords on the Administrator control panel and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

- -
-
editor README
-
-
diff --git a/website/EN/app_etherpad.html b/website/EN/app_etherpad.html index a03a8324..390e93f0 100644 --- a/website/EN/app_etherpad.html +++ b/website/EN/app_etherpad.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -251,9 +251,9 @@ for the JavaScript code in this tag. For collaborative document editing Etherpad is hard to beat. Just log in, choose a document title and then edit. Different users will appear in different colours, and can also chat in the sidebar. This is installed as a private system in which only users on your Freedombone server will be able to create and edit documents, so it's not open to any random users on the internet.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -277,9 +277,9 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your Etherpad domain listed there along with an onion address. You can then navigate to your site in a browser.

@@ -289,13 +289,8 @@ Please be aware that after installation the etherpad daemon takes a while to sta

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: +To see the login password for your site go to Passwords on the Administrator control panel and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

- -
-
editor README
-
-
diff --git a/website/EN/app_ghost.html b/website/EN/app_ghost.html index 8a978a2f..69e30a79 100644 --- a/website/EN/app_ghost.html +++ b/website/EN/app_ghost.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -251,9 +251,9 @@ for the JavaScript code in this tag. Ghost is a blogging system which uses markdown formatted posts. It's quite simple to use, and also looks nice even on small mobile screens.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -277,22 +277,17 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your Ghost blog domain listed there along with an onion address. You can then navigate to your site in a browser.

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: +To see the login password for your site go to Passwords on the Administrator control panel and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

-
-
editor README
-
-
-

Navigate to https://yourghostblogdomain/ghost and click on create your account

diff --git a/website/EN/app_gnusocial.html b/website/EN/app_gnusocial.html index 3c9ed111..55eae090 100644 --- a/website/EN/app_gnusocial.html +++ b/website/EN/app_gnusocial.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -259,9 +259,9 @@ You can host your own GNU Social instance and then "remote follow" other You should regard anything posted to GNU Social as being public communication visible to anyone on the internet. There is a direct messaging capability between users but it's not particularly secure, so for one-to-one messages stick to better methods, such as XMPP with OTR/OMEMO or Tox.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -285,22 +285,18 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+ +
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your GNU Social domain listed there along with an onion address. You can then navigate to your site in a browser.

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: +To see the login password for your site go to Passwords on the Administrator control panel and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

-
-
editor README
-
-
-

Once you have logged in to GNU Social you may then want to select Admin and check or change the details. You may also wish to change the license for the site to be either Creative Commons or private.

@@ -320,9 +316,9 @@ GNU Social has a clutter-free mobile user interface which can be accessed via a
-
-

Using with Emacs

-
+
+

Using with Emacs

+

If you are an Emacs user it's also possible to set up GNU Social mode as follows:

@@ -406,9 +402,9 @@ And as a quick reference the main keys are:
-
-

Sharing things

-
+
+

Sharing things

+

If you have the GNU Social microblogging system installed then it's also possible to share things or services between groups or with particular users. This can be useful for sharing items within a family, club or in a local sharing economy. Sharing things freely, without money, reveals the social basis at the root of all economics which money normally conceals or obscures.

diff --git a/website/EN/app_gogs.html b/website/EN/app_gogs.html index 983ca47a..26c05ff5 100644 --- a/website/EN/app_gogs.html +++ b/website/EN/app_gogs.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -255,9 +255,9 @@ Github is ok, but it's proprietary and funded by venture capital. If you been ar A Git hosting system called Gogs can optionally be installed. This is very similar to Github in appearance and use. It's lightweight and so well suited for use on low power ARM servers.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -281,22 +281,13 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your Gogs domain listed there along with an onion address. You can then navigate to your site in a browser.

-

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: -

- -
-
editor README
-
-
-

In a browser navigate to your Gogs site and click the Register button. The first user registered on the system becomes the administrator. Once you've done that then it's a good idea to disable further registrations. Currently that's a little complicated, but you can do it as follows:

diff --git a/website/EN/app_htmly.html b/website/EN/app_htmly.html index 95dc985d..6b0b9c69 100644 --- a/website/EN/app_htmly.html +++ b/website/EN/app_htmly.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -251,9 +251,9 @@ for the JavaScript code in this tag. HTMLy is a databaseless blogging system.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -277,22 +277,17 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your HTMLy blog domain listed there along with an onion address. You can then navigate to your site in a browser.

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: +To see the login password for your site go to Passwords on the Administrator control panel and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

-
-
editor README
-
-
-

Navigate to https://yourhtmlyblogdomain/login and enter your username and password. You can then create posts or edit existing ones.

diff --git a/website/EN/app_hubzilla.html b/website/EN/app_hubzilla.html index 9a4cfd9a..50c8ceac 100644 --- a/website/EN/app_hubzilla.html +++ b/website/EN/app_hubzilla.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -251,9 +251,9 @@ for the JavaScript code in this tag. Hubzilla is a web publishing and social network system which includes wiki, web pages, photo albums and file storage. It also has privacy controls which allow you to define who can see which content. It's possible to write posts and have them visible only to a group of friends (known as "privacy groups"), with the encryption being handled automatically.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -277,22 +277,14 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+ +
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your Hubzilla domain listed there along with an onion address. You can then navigate to your site in a browser.

-

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: -

- -
-
editor README
-
-
-

On first visiting your Hubzilla site you'll see the login screen. The first thing you need to do is register a new user. The first user on the system then becomes its administrator.

diff --git a/website/EN/app_lychee.html b/website/EN/app_lychee.html index 442c608c..340a5a65 100644 --- a/website/EN/app_lychee.html +++ b/website/EN/app_lychee.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -251,9 +251,9 @@ for the JavaScript code in this tag. Lychee is a simple and lightweight photo album for the web. Whether you're an amateur or professional photographer, or want to publish random holiday pics or cat pictures. Lychee just does what it says it does without any fuss. There is also a photo album feature within Hubzilla if you need more sophisticated social photo sharing with individualised permissions.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -277,24 +277,15 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your Lychee domain listed there along with an onion address. You can then navigate to your site in a browser.

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: -

- -
-
editor README
-
-
- -

-Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the README file in your home directory. +Within a browser navigate to your lychee domain name or onion address, enter settings for the database as follows, using the MariaDB password which appears within the Passwords section of the Administrator control panel.

diff --git a/website/EN/app_mailpile.html b/website/EN/app_mailpile.html index 95e7c4a8..f0910754 100644 --- a/website/EN/app_mailpile.html +++ b/website/EN/app_mailpile.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -259,9 +259,9 @@ An advantage of this type of webmail is that it keeps your GPG keys off of an One down side is that this appears to be a single user system, so if you have multiple users on your Freedombone server only the administrator will actually be able to use mailpile.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -285,22 +285,17 @@ After the install has completed go to Security settings and select Cre
-
-

Initial setup

-
+
+

Initial setup

+

If you have just obtained a Lets Encrypt certificate as above then go to About on the administrator control panel and you should see your Mailpile domain listed there along with an onion address. You can then navigate to your site in a browser.

-If you installed the system using a disk image then you can log in using the username and password which was originally shown when you installed the system. If you didn't install from a disk image then a new random password will be generated for each site and stored within a readme file. If you need to view that file then exit to the user control panel, select Exit to the command line and then run: +To see the login password for your site go to Passwords on the Administrator control panel and select the appropriate username and app. The passwords will be different for each user and may not be the same as the password which you used to originally ssh into the system.

-
-
editor README
-
-
-

If you're viewing your mail domain site on a mobile device via OrFox then make sure you allow the domain in the NoScript settings.

diff --git a/website/EN/app_mumble.html b/website/EN/app_mumble.html index ca4e4d40..bb718a77 100644 --- a/website/EN/app_mumble.html +++ b/website/EN/app_mumble.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -251,31 +251,31 @@ for the JavaScript code in this tag. Mumble is a well known VoIP system originally used for gaming, but which works just as well for any general conference calls or meetings.

-
-

Text chat

-
+
+

Text chat

+

In addition to voice it is also possible to do text chat via mumble. The security of this is pretty good provided that you do it via Plumble and Orbot on mobile, but compared to other options such as XMPP/Conversations or Tox the security is not as good, since the mumble server currently doesn't support forward secrecy.

-
-

Using with Ubuntu

-
+
+

Using with Ubuntu

+

Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.

-Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the README file on the Freedombone. Accept the self-signed SSL certificate. You are now ready to chat. +Click on "add new" to add a new server and enter the default domain name for the Freedombone, your username (which can be anything) and the VoIP server password which can be found in the Passwords section of the Administrator control panel. Accept the self-signed SSL certificate if you don't have a Let's Encrypt certificate set up for your default domain. You are now ready to chat.

-
-

Using with Android

-
+
+

Using with Android

+

Install F-Droid

diff --git a/website/EN/app_radicale.html b/website/EN/app_radicale.html index 8bd9405c..95b9b098 100644 --- a/website/EN/app_radicale.html +++ b/website/EN/app_radicale.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -251,9 +251,9 @@ for the JavaScript code in this tag. Radicale is a calendar server which allows your to synchronise your calendar across all your devices. Support for CalDAV within various client systems can be quite patchy/flaky though, so use it with caution.

-
-

Installation

-
+
+

Installation

+

Log into your system with:

@@ -273,9 +273,9 @@ Select Add/Remove Apps then radicale. If you don't already have an
-
-

Setting up on Android

-
+
+

Setting up on Android

+

Via F-droid install DAVdroid.

@@ -285,7 +285,7 @@ There seems to be a problem with Let's Encrypt certificates with this app, but i

-Exit from settings and press the plus button to add an account. Select Login with URL and user name. The URL should be https://yourmaindomainname/radicale/. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within the README file within your home directory. +Exit from settings and press the plus button to add an account. Select Login with URL and user name. The URL should be https://yourmaindomainname/radicale/. Remember to include the trailing slash on the URL. If you installed Freedombone from a disk image then enter your username and the password which was shown at the start of installation. If not then the password for Radicale will be within Passwords section of the Administrator control panel.

diff --git a/website/EN/app_rss.html b/website/EN/app_rss.html index 60cc8533..78872b04 100644 --- a/website/EN/app_rss.html +++ b/website/EN/app_rss.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -259,9 +259,9 @@ The way that RSS reading is set up on Freedombone gives you strong reading priva

-
-

Finding the onion address

-
+
+

Finding the onion address

+

See the control panel for the RSS reader onion address.

@@ -280,14 +280,14 @@ The RSS reader is accessible only via an onion address. This provides a reasonab

-To set up the system open http://rss_reader_onion_address and log in with username admin and the password obtained either at the beginning of the install or from the README file in your home directory. You can then select the Actions menu and begin adding your feeds. +To set up the system open http://rss_reader_onion_address and log in with username admin and the password which can be found within the Passwords section of the Administrator control panel. You can then select the Actions menu and begin adding your feeds.

-
-

On mobile

-
+
+

On mobile

+

To access the RSS reader from a mobile device you can install a Tor compatible browser such as OrFox, then use the mobile onion address shown on the About screen of the Administrator controls. Remember to add the site to the NoScript whitelist, and you may also need to turn HTTPS Everywhere off.

@@ -299,9 +299,9 @@ A note for the paranoid is that on mobile devices you get redirected to a differ
-
-

With Emacs

-
+
+

With Emacs

+

If you are an Emacs user then you can also read your RSS feeds via the Avandu mode.