Show tox bootstrap ID

This commit is contained in:
Bob Mottram 2016-11-20 17:59:58 +00:00
parent 62b689667d
commit 8674bb7faa
5 changed files with 104 additions and 99 deletions

View File

@ -106,6 +106,15 @@ function install_interactive_tox {
APP_INSTALLED=1 APP_INSTALLED=1
} }
function configure_interactive_tox {
if [ ! -f $TOX_BOOTSTRAP_ID_FILE ]; then
return
fi
bootstrap_id=$(cat $TOX_BOOTSTRAP_ID_FILE)
dialog --title $"Tox Bootstrap Node" \
--msgbox $"$bootstrap_id" 6 70
}
function mesh_tox_qtox { function mesh_tox_qtox {
if [ ! ${rootdir}$INSTALL_DIR ]; then if [ ! ${rootdir}$INSTALL_DIR ]; then
INSTALL_DIR=${rootdir}/root/build INSTALL_DIR=${rootdir}/root/build

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<!-- 2016-11-20 Sun 16:26 --> <!-- 2016-11-20 Sun 16:31 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" /> <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" /> <meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title> <title></title>
@ -251,18 +251,18 @@ for the JavaScript code in this tag.
Mumble is a well known VoIP system originally used for gaming, but which works just as well for any general conference calls or meetings. Mumble is a well known VoIP system originally used for gaming, but which works just as well for any general conference calls or meetings.
</p> </p>
<div id="outline-container-org1fd07be" class="outline-2"> <div id="outline-container-orgb002e13" class="outline-2">
<h2 id="org1fd07be">Text chat</h2> <h2 id="orgb002e13">Text chat</h2>
<div class="outline-text-2" id="text-org1fd07be"> <div class="outline-text-2" id="text-orgb002e13">
<p> <p>
In addition to voice it is also possible to do text chat via mumble. The security of this is pretty good provided that you do it via Plumble and Orbot on mobile, but compared to other options such as XMPP/Conversations or Tox the security is not as good, since the mumble server currently doesn't support forward secrecy. In addition to voice it is also possible to do text chat via mumble. The security of this is pretty good provided that you do it via Plumble and Orbot on mobile, but compared to other options such as XMPP/Conversations or Tox the security is not as good, since the mumble server currently doesn't support forward secrecy.
</p> </p>
</div> </div>
</div> </div>
<div id="outline-container-org0591866" class="outline-2"> <div id="outline-container-org1832e9f" class="outline-2">
<h2 id="org0591866">Using with Ubuntu</h2> <h2 id="org1832e9f">Using with Ubuntu</h2>
<div class="outline-text-2" id="text-org0591866"> <div class="outline-text-2" id="text-org1832e9f">
<p> <p>
Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard. Within the software center search for "mumble" and install the client then run it. Skip through the audio setup wizard.
</p> </p>
@ -273,9 +273,9 @@ Click on "add new" to add a new server and enter the default domain name for the
</div> </div>
</div> </div>
<div id="outline-container-orgbe9ea62" class="outline-2"> <div id="outline-container-org055c114" class="outline-2">
<h2 id="orgbe9ea62">Using with Android</h2> <h2 id="org055c114">Using with Android</h2>
<div class="outline-text-2" id="text-orgbe9ea62"> <div class="outline-text-2" id="text-org055c114">
<p> <p>
Install <a href="https://f-droid.org/">F-Droid</a> Install <a href="https://f-droid.org/">F-Droid</a>
</p> </p>
@ -293,7 +293,7 @@ Press the plus button to add a Mumble server.
</p> </p>
<p> <p>
Enter a label (which can be any name you choose for the server), the default domain name of the Freedombone or preferably the mumble onion address as shown on the <b>About</b> screen of the <b>Administrator control panel</b>, your username (which can also be anything) and the VoIP server password which can be found in the README file on the Freedombone. Enter a label (which can be any name you choose for the server), the default domain name of the Freedombone or preferably the mumble onion address as shown on the <b>About</b> screen of the <b>Administrator control panel</b>, your username (which can also be anything) and the mumble password which can be found in the <b>Passwords</b> section of the <b>Administrator control panel</b>.
</p> </p>
<p> <p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<!-- 2016-11-12 Sat 22:23 --> <!-- 2016-11-20 Sun 16:32 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" /> <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" /> <meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title> <title></title>
@ -248,12 +248,12 @@ for the JavaScript code in this tag.
</center> </center>
<p> <p>
Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within the README within your home directory. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available. Tox is an encrypted peer-to-peer messaging system and so should work without Freedombone. It uses a system of nodes which act as a sort of directory service allowing users to find and connect to each other. The Tox node ID on the Freedombone can be found within <b>App Settings</b> under <b>tox</b> within the <b>Administrator control panel</b>. If you have other users connect to your node then you will be able to continue chatting even when no other nodes are available.
</p> </p>
<div id="outline-container-org51ad4cf" class="outline-2"> <div id="outline-container-org6e45c83" class="outline-2">
<h2 id="org51ad4cf">The Toxic client</h2> <h2 id="org6e45c83">The Toxic client</h2>
<div class="outline-text-2" id="text-org51ad4cf"> <div class="outline-text-2" id="text-org6e45c83">
<p> <p>
Log into your system with: Log into your system with:
</p> </p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<!-- 2016-10-31 Mon 16:23 --> <!-- 2016-11-20 Sun 17:10 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" /> <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" /> <meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title> <title></title>
@ -255,11 +255,11 @@ for the JavaScript code in this tag.
</colgroup> </colgroup>
<tbody> <tbody>
<tr> <tr>
<td class="org-left"><a href="#org3995420">Building an image for a Single Board Computer or Virtual Machine</a></td> <td class="org-left"><a href="#orge03d33c">Building an image for a Single Board Computer or Virtual Machine</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org8399257">Checklist</a></td> <td class="org-left"><a href="#org175cfc0">Checklist</a></td>
</tr> </tr>
<tr> <tr>
@ -267,34 +267,34 @@ for the JavaScript code in this tag.
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org2fc6a30">Installation</a></td> <td class="org-left"><a href="#orgdf2add4">Installation</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org26423c9">Social Key Management - the 'Unforgettable Key'</a></td> <td class="org-left"><a href="#org9f6b4ea">Social Key Management - the 'Unforgettable Key'</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org03d29d8">Final Setup</a></td> <td class="org-left"><a href="#org27cecee">Final Setup</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org2817eb6">Keydrives</a></td> <td class="org-left"><a href="#org7b0166c">Keydrives</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org6d69295">On Client Machines</a></td> <td class="org-left"><a href="#orgab1d21b">On Client Machines</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#orge549942">Administering the system</a></td> <td class="org-left"><a href="#orga6b2eee">Administering the system</a></td>
</tr> </tr>
</tbody> </tbody>
</table> </table>
<div id="outline-container-org3995420" class="outline-2"> <div id="outline-container-orge03d33c" class="outline-2">
<h2 id="org3995420">Building an image for a Single Board Computer or Virtual Machine</h2> <h2 id="orge03d33c">Building an image for a Single Board Computer or Virtual Machine</h2>
<div class="outline-text-2" id="text-org3995420"> <div class="outline-text-2" id="text-orge03d33c">
<p> <p>
You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command. You don't have to trust images downloaded from random internet locations signed with untrusted keys. You can build one from scratch yourself, and this is the recommended procedure for maximum security. For guidance on how to build images see the manpage for the <b>freedombone-image</b> command.
</p> </p>
@ -371,9 +371,9 @@ If the image build fails with an error such as "<i>Error reading from server. Re
</div> </div>
</div> </div>
<div id="outline-container-org8399257" class="outline-2"> <div id="outline-container-org175cfc0" class="outline-2">
<h2 id="org8399257">Checklist</h2> <h2 id="org175cfc0">Checklist</h2>
<div class="outline-text-2" id="text-org8399257"> <div class="outline-text-2" id="text-org175cfc0">
<p> <p>
Before installing Freedombone you will need a few things. Before installing Freedombone you will need a few things.
</p> </p>
@ -387,17 +387,17 @@ Before installing Freedombone you will need a few things.
</ul> </ul>
</div> </div>
</div> </div>
<div id="outline-container-org2fc6a30" class="outline-2"> <div id="outline-container-orgdf2add4" class="outline-2">
<h2 id="org2fc6a30">Installation</h2> <h2 id="orgdf2add4">Installation</h2>
<div class="outline-text-2" id="text-org2fc6a30"> <div class="outline-text-2" id="text-orgdf2add4">
<p> <p>
There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine. There are three install options: Laptop/Desktop/Netbook, SBC and Virtual Machine.
</p> </p>
</div> </div>
<div id="outline-container-org9a6b0bc" class="outline-3"> <div id="outline-container-org9e79b36" class="outline-3">
<h3 id="org9a6b0bc">On a Laptop, Netbook or Desktop machine</h3> <h3 id="org9e79b36">On a Laptop, Netbook or Desktop machine</h3>
<div class="outline-text-3" id="text-org9a6b0bc"> <div class="outline-text-3" id="text-org9e79b36">
<p> <p>
If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands: If you have an existing system, such as an old laptop or netbook which you can leave running as a server, then install a new version of Debian Jessie onto it. During the Debian install you won't need the print server or the desktop environment, and unchecking those will reduce the attack surface. Once Debian enter the following commands:
</p> </p>
@ -415,9 +415,9 @@ freedombone menuconfig
</div> </div>
</div> </div>
<div id="outline-container-orgdb17912" class="outline-3"> <div id="outline-container-org28c34d0" class="outline-3">
<h3 id="orgdb17912">On a single board computer (SBC)</h3> <h3 id="org28c34d0">On a single board computer (SBC)</h3>
<div class="outline-text-3" id="text-orgdb17912"> <div class="outline-text-3" id="text-org28c34d0">
<p> <p>
Currently the following boards are supported: Currently the following boards are supported:
</p> </p>
@ -495,9 +495,9 @@ Using the password 'freedombone'. Take a note of the new login password and then
</div> </div>
</div> </div>
<div id="outline-container-orgeba40e0" class="outline-3"> <div id="outline-container-org770fac8" class="outline-3">
<h3 id="orgeba40e0">As a Virtual Machine</h3> <h3 id="org770fac8">As a Virtual Machine</h3>
<div class="outline-text-3" id="text-orgeba40e0"> <div class="outline-text-3" id="text-org770fac8">
<p> <p>
Qemu is currently supported, since it's s fully free software system. You can run a 64 bit Qemu image with: Qemu is currently supported, since it's s fully free software system. You can run a 64 bit Qemu image with:
</p> </p>
@ -514,44 +514,44 @@ The default login will be username 'fbone' and password 'freedombone'. Take a no
</div> </div>
</div> </div>
<div id="outline-container-org26423c9" class="outline-2"> <div id="outline-container-org9f6b4ea" class="outline-2">
<h2 id="org26423c9">Social Key Management - the 'Unforgettable Key'</h2> <h2 id="org9f6b4ea">Social Key Management - the 'Unforgettable Key'</h2>
<div class="outline-text-2" id="text-org26423c9"> <div class="outline-text-2" id="text-org9f6b4ea">
<p> <p>
During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities During the install procedure you will be asked if you wish to import GPG keys. If you don't already possess GPG keys then just select "Ok" and they will be generated during the install. If you do already have GPG keys then there are a few possibilities
</p> </p>
</div> </div>
<div id="outline-container-org7242597" class="outline-3"> <div id="outline-container-orgc29300f" class="outline-3">
<h3 id="org7242597">You have the gnupg keyring on an encrypted USB drive</h3> <h3 id="orgc29300f">You have the gnupg keyring on an encrypted USB drive</h3>
<div class="outline-text-3" id="text-org7242597"> <div class="outline-text-3" id="text-orgc29300f">
<p> <p>
If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments. If you previously made a master keydrive containing the full keyring (the .gnupg directory). This is the most straightforward case, but not as secure as splitting the key into fragments.
</p> </p>
</div> </div>
</div> </div>
<div id="outline-container-org60195d8" class="outline-3"> <div id="outline-container-org56b3c34" class="outline-3">
<h3 id="org60195d8">You have a number of key fragments on USB drives retrieved from friends</h3> <h3 id="org56b3c34">You have a number of key fragments on USB drives retrieved from friends</h3>
<div class="outline-text-3" id="text-org60195d8"> <div class="outline-text-3" id="text-org56b3c34">
<p> <p>
If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#org2817eb6">Keydrives</a>. If you previously made some USB drives containing key fragments then retrieve them from your friends and plug them in one after the other. After the last drive has been read then remove it and just select "Ok". The system will then try to reconstruct the key. For this to work you will need to have previously made three or more <a href="#org7b0166c">Keydrives</a>.
</p> </p>
</div> </div>
</div> </div>
<div id="outline-container-org7b11711" class="outline-3"> <div id="outline-container-org32ca660" class="outline-3">
<h3 id="org7b11711">You can specify some ssh login details for friends servers containing key fragments</h3> <h3 id="org32ca660">You can specify some ssh login details for friends servers containing key fragments</h3>
<div class="outline-text-3" id="text-org7b11711"> <div class="outline-text-3" id="text-org32ca660">
<p> <p>
Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled. Enter three or more sets of login details and the installer will try to retrieve key fragments and then assemble them into the full key. This only works if you previously were using remote backups and had social key management enabled.
</p> </p>
</div> </div>
</div> </div>
</div> </div>
<div id="outline-container-org03d29d8" class="outline-2"> <div id="outline-container-org27cecee" class="outline-2">
<h2 id="org03d29d8">Final Setup</h2> <h2 id="org27cecee">Final Setup</h2>
<div class="outline-text-2" id="text-org03d29d8"> <div class="outline-text-2" id="text-org27cecee">
<p> <p>
Any manual post-installation setup instructions or passwords can be found in /home/username/README. You should remove any passwords from that file and store them within a password manager such as KeepassX. Any manual post-installation setup instructions or passwords can be found in /home/username/README.
</p> </p>
<p> <p>
@ -667,16 +667,16 @@ On your internet router, typically under firewall settings, open the following p
</div> </div>
</div> </div>
<div id="outline-container-org2817eb6" class="outline-2"> <div id="outline-container-org7b0166c" class="outline-2">
<h2 id="org2817eb6">Keydrives</h2> <h2 id="org7b0166c">Keydrives</h2>
<div class="outline-text-2" id="text-org2817eb6"> <div class="outline-text-2" id="text-org7b0166c">
<p> <p>
After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this: After installing for the first time it's a good idea to create some keydrives. These will store your gpg key so that if all else fails you will still be able to restore from backup. There are two ways to do this:
</p> </p>
</div> </div>
<div id="outline-container-org0ab125c" class="outline-3"> <div id="outline-container-orgf3e3d0b" class="outline-3">
<h3 id="org0ab125c">Master Keydrive</h3> <h3 id="orgf3e3d0b">Master Keydrive</h3>
<div class="outline-text-3" id="text-org0ab125c"> <div class="outline-text-3" id="text-orgf3e3d0b">
<p> <p>
This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run: This is the traditional security model in which you carry your full keyring on an encrypted USB drive. To make a master keydrive first format a USB drive as a LUKS encrypted drive. In Ubuntu this can be <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">done from the <i>Disk Utility</i> application</a>. Then plug it into the Freedombone system, then from your local machine run:
</p> </p>
@ -691,9 +691,9 @@ Select <i>Administrator controls</i> then <i>Backup and Restore</i> then <i>Back
</p> </p>
</div> </div>
</div> </div>
<div id="outline-container-org2212b96" class="outline-3"> <div id="outline-container-org57b5534" class="outline-3">
<h3 id="org2212b96">Fragment keydrives</h3> <h3 id="org57b5534">Fragment keydrives</h3>
<div class="outline-text-3" id="text-org2212b96"> <div class="outline-text-3" id="text-org57b5534">
<p> <p>
This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands: This breaks your GPG key into a number of fragments and randomly selects one to add to the USB drive. First format a USB drive as a LUKS encrypted drive. In Ubuntu this <a href="https://help.ubuntu.com/community/EncryptedFilesystemsOnRemovableStorage">can be done from the <i>Disk Utility</i> application</a>. Plug it into the Freedombone system then from your local machine run the following commands:
</p> </p>
@ -713,9 +713,9 @@ Fragments are randomly assigned and so you will need at least three or four keyd
</div> </div>
</div> </div>
</div> </div>
<div id="outline-container-org6d69295" class="outline-2"> <div id="outline-container-orgab1d21b" class="outline-2">
<h2 id="org6d69295">On Client Machines</h2> <h2 id="orgab1d21b">On Client Machines</h2>
<div class="outline-text-2" id="text-org6d69295"> <div class="outline-text-2" id="text-orgab1d21b">
<p> <p>
You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security. You can configure laptops or desktop machines which connect to the Freedombone server in the following way. This alters encryption settings to improve overall security.
</p> </p>
@ -732,9 +732,9 @@ freedombone-client
</div> </div>
</div> </div>
<div id="outline-container-orge549942" class="outline-2"> <div id="outline-container-orga6b2eee" class="outline-2">
<h2 id="orge549942">Administering the system</h2> <h2 id="orga6b2eee">Administering the system</h2>
<div class="outline-text-2" id="text-orge549942"> <div class="outline-text-2" id="text-orga6b2eee">
<p> <p>
To administer the system after installation log in via ssh, become the root user and then launch the control panel. To administer the system after installation log in via ssh, become the root user and then launch the control panel.
</p> </p>

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<!-- 2016-11-17 Thu 11:03 --> <!-- 2016-11-20 Sun 17:09 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" /> <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" /> <meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title> <title></title>
@ -255,15 +255,15 @@ for the JavaScript code in this tag.
</colgroup> </colgroup>
<tbody> <tbody>
<tr> <tr>
<td class="org-left"><a href="#orga3d3ab6">Readme</a></td> <td class="org-left"><a href="#orgdbaccc3">Readme</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org5f13d98">Improving ssh security</a></td> <td class="org-left"><a href="#org9144c86">Improving ssh security</a></td>
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org7cf8b25">Administrating the system via an onion address (Tor)</a></td> <td class="org-left"><a href="#org60b4bc6">Administrating the system via an onion address (Tor)</a></td>
</tr> </tr>
<tr> <tr>
@ -347,7 +347,7 @@ for the JavaScript code in this tag.
</tr> </tr>
<tr> <tr>
<td class="org-left"><a href="#org3910f98">Adding or removing users</a></td> <td class="org-left"><a href="#org7c0835c">Adding or removing users</a></td>
</tr> </tr>
<tr> <tr>
@ -356,31 +356,27 @@ for the JavaScript code in this tag.
</tbody> </tbody>
</table> </table>
<div id="outline-container-orga3d3ab6" class="outline-2"> <div id="outline-container-orgdbaccc3" class="outline-2">
<h2 id="orga3d3ab6">Readme</h2> <h2 id="orgdbaccc3">Readme</h2>
<div class="outline-text-2" id="text-orga3d3ab6"> <div class="outline-text-2" id="text-orgdbaccc3">
<p> <p>
After the system has installed a README file will be generated which contains passwords and some brief advice on using the installed systems. You can read this with the following commands: After the system has installed a README file will be generated which contains any advice on particular apps installed. Ordinarily you won't need to read it though. You can access it with the following commands:
</p> </p>
<div class="org-src-container"> <div class="org-src-container">
<pre class="src src-bash">ssh username@domainname -p 2222 <pre class="src src-bash">ssh username@domainname -p 2222
emacs ~/README editor ~/README
</pre> </pre>
</div> </div>
<p> <p>
You should transfer any passwords to a password manager such as <a href="https://www.keepassx.org/">KeepassX</a> and then delete them from the README file. To save the file after removing passwords use <b>CTRL-x CTRL-s</b>. To exit if you're using emacs (which is the default editor, but can be changed to vim) you can either just close the terminal or use <b>CTRL-x CTRL-c</b> followed by the <b>exit</b> command.
</p>
<p>
To exit you can either just close the terminal or use <b>CTRL-x CTRL-c</b> followed by the <b>exit</b> command.
</p> </p>
</div> </div>
</div> </div>
<div id="outline-container-org5f13d98" class="outline-2"> <div id="outline-container-org9144c86" class="outline-2">
<h2 id="org5f13d98">Improving ssh security</h2> <h2 id="org9144c86">Improving ssh security</h2>
<div class="outline-text-2" id="text-org5f13d98"> <div class="outline-text-2" id="text-org9144c86">
<p> <p>
To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone. To improve ssh security you can generate an ssh key pair on your system and then upload the public key to the Freedombone.
</p> </p>
@ -430,9 +426,9 @@ If you wish to only use ssh keys then log in to the Freedombone, become the root
</div> </div>
</div> </div>
<div id="outline-container-org7cf8b25" class="outline-2"> <div id="outline-container-org60b4bc6" class="outline-2">
<h2 id="org7cf8b25">Administrating the system via an onion address (Tor)</h2> <h2 id="org60b4bc6">Administrating the system via an onion address (Tor)</h2>
<div class="outline-text-2" id="text-org7cf8b25"> <div class="outline-text-2" id="text-org60b4bc6">
<p> <p>
You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following: You can also access your system via the Tor system using an onion address. To find out what the onion address for ssh access is you can do the following:
</p> </p>
@ -474,9 +470,9 @@ Subsequently even if dynamic DNS isn't working you may still be able to administ
</p> </p>
</div> </div>
</div> </div>
<div id="outline-container-org3910f98" class="outline-2"> <div id="outline-container-org7c0835c" class="outline-2">
<h2 id="org3910f98">Adding or removing users</h2> <h2 id="org7c0835c">Adding or removing users</h2>
<div class="outline-text-2" id="text-org3910f98"> <div class="outline-text-2" id="text-org7c0835c">
<p> <p>
Log into the system with: Log into the system with:
</p> </p>