Change profanity documentation on xmpp page

This commit is contained in:
Bob Mottram 2017-05-16 21:13:05 +01:00
parent 46db0c6068
commit dd387dffee
2 changed files with 34 additions and 161 deletions

View File

@ -22,6 +22,8 @@ With regard to chat apps you might have read a lot of stuff about /end-to-end se
A well written article on the state of XMPP and how it compares to other chat protocols [[https://gultsch.de/xmpp_2016.html][can be found here]].
* Using with Profanity
You can install the [[./app_profanity.html][profanity app]] via *Add/remove apps* on the *Administrator control panel*. Logging in and then selecting *Run App* and *profanity* will start it.
* Using with Gajim
In mid 2016 [[https://gajim.org/][Gajim]] became the first desktop XMPP client to support the [[https://en.wikipedia.org/wiki/OMEMO][OMEMO end-to-end security standard]], which is superior to the more traditional [[https://en.wikipedia.org/wiki/Off-the-Record_Messaging][OTR]] since it also includes multi-user chat and the ratcheting mechanism pioneered by Open Whisper Systems. To install it:
@ -52,59 +54,6 @@ If you wish to make backups of the OMEMO keys then they can be found within:
If you wish to use OpenPGP to encrypt your messages then go to *Edit/Accounts*, select your account and then the *Personal Information* tab. You can then choose your GPG key. When initiating a chat you can select the *Advanced* button and then select *Toggle OpenPGP Encryption*. OpenPGP is not as secure as OMEMO, but does allow you to use XMPP in a similar style to email in that the recipient of the message does not necessarily need to be online at the same time that you send it.
* Using with Profanity
The [[https://profanity.im][Profanity]] shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
#+BEGIN_SRC bash
ssh username@domain -p 2222
#+END_SRC
Then select XMPP. Generate an [[https://en.wikipedia.org/wiki/Off-the-Record_Messaging][OTR]] key with:
#+BEGIN_SRC bash
/otr gen
#+END_SRC
Then to start a conversation using OTR:
#+BEGIN_SRC bash
/otr start otherusername@otheruserdomain
#+END_SRC
or if you're already in an insecure chat with someone just use:
#+BEGIN_SRC bash
/otr start
#+END_SRC
Set a security question and answer:
#+BEGIN_SRC bash
/otr question "What is the name of your best friends rabbit?" fiffi
#+END_SRC
On the other side the user can enter:
#+BEGIN_SRC bash
/otr answer fiffi
#+END_SRC
For the most paranoid you can also obtain your fingerprint:
#+BEGIN_SRC bash
/otr myfp
#+END_SRC
and quote that. If they quote theirs back you can check it with:
#+BEGIN_SRC bash
/otr theirfp
#+END_SRC
If the fingerprints match then you can be pretty confident that unless you have been socially engineered via the question and answer you probably are talking to who you think you are, and that it will be difficult for mass surveillance systems to know the content of the conversation. For more details see [[https://www.profanity.im/otr.html][this guide]]
When accessed via the user control panel the client is automatically routed through Tor and so if you are also using OTR then this provides protection for both message content and metadata.
* Using with Jitsi
Jitsi can be downloaded from https://jitsi.org

View File

@ -3,7 +3,7 @@
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<!-- 2017-01-08 Sun 13:43 -->
<!-- 2017-05-16 Tue 21:11 -->
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title></title>
@ -71,6 +71,7 @@
pre.src-fortran:before { content: 'Fortran'; }
pre.src-gnuplot:before { content: 'gnuplot'; }
pre.src-haskell:before { content: 'Haskell'; }
pre.src-hledger:before { content: 'hledger'; }
pre.src-java:before { content: 'Java'; }
pre.src-js:before { content: 'Javascript'; }
pre.src-latex:before { content: 'LaTeX'; }
@ -188,7 +189,7 @@
@licstart The following is the entire license notice for the
JavaScript code in this tag.
Copyright (C) 2012-2013 Free Software Foundation, Inc.
Copyright (C) 2012-2017 Free Software Foundation, Inc.
The JavaScript code in this tag is free software: you can
redistribute it and/or modify it under the terms of the GNU
@ -259,15 +260,23 @@ With regard to chat apps you might have read a lot of stuff about <i>end-to-end
A well written article on the state of XMPP and how it compares to other chat protocols <a href="https://gultsch.de/xmpp_2016.html">can be found here</a>.
</p>
<div id="outline-container-orge45304b" class="outline-2">
<h2 id="orge45304b">Using with Gajim</h2>
<div class="outline-text-2" id="text-orge45304b">
<div id="outline-container-orgf44a6c4" class="outline-2">
<h2 id="orgf44a6c4">Using with Profanity</h2>
<div class="outline-text-2" id="text-orgf44a6c4">
<p>
You can install the <a href="./app_profanity.html">profanity app</a> via <b>Add/remove apps</b> on the <b>Administrator control panel</b>. Logging in and then selecting <b>Run App</b> and <b>profanity</b> will start it.
</p>
</div>
</div>
<div id="outline-container-org5033aae" class="outline-2">
<h2 id="org5033aae">Using with Gajim</h2>
<div class="outline-text-2" id="text-org5033aae">
<p>
In mid 2016 <a href="https://gajim.org/">Gajim</a> became the first desktop XMPP client to support the <a href="https://en.wikipedia.org/wiki/OMEMO">OMEMO end-to-end security standard</a>, which is superior to the more traditional <a href="https://en.wikipedia.org/wiki/Off-the-Record_Messaging">OTR</a> since it also includes multi-user chat and the ratcheting mechanism pioneered by Open Whisper Systems. To install it:
</p>
<div class="org-src-container">
<pre class="src src-bash">su -c <span class="org-string">'echo "deb ftp://ftp.gajim.org/debian unstable main" &gt; /etc/apt/sources.list.d/gajim.list'</span>
<pre><code class="src src-bash">su -c <span class="org-string">'echo "deb ftp://ftp.gajim.org/debian unstable main" &gt; /etc/apt/sources.list.d/gajim.list'</span>
sudo apt-get update
sudo apt-get -y install gajim-dev-keyring
sudo apt-get -y install git tor python-dev python-pip gajim-nightly
@ -275,7 +284,7 @@ mkdir ~/.local/share/gajim/plugins -p
<span class="org-builtin">cd</span> ~/.local/share/gajim/plugins
git clone https://github.com/omemo/gajim-omemo
sudo pip install <span class="org-variable-name">protobuf</span>==2.6.1, python-axolotl==0.1.35
</pre>
</code></pre>
</div>
<p>
@ -299,8 +308,8 @@ If you wish to make backups of the OMEMO keys then they can be found within:
</p>
<div class="org-src-container">
<pre class="src src-bash">~/.local/share/gajim
</pre>
<pre><code class="src src-bash">~/.local/share/gajim
</code></pre>
</div>
<p>
@ -309,94 +318,9 @@ If you wish to use OpenPGP to encrypt your messages then go to <b>Edit/Accounts<
</div>
</div>
<div id="outline-container-orge94392f" class="outline-2">
<h2 id="orge94392f">Using with Profanity</h2>
<div class="outline-text-2" id="text-orge94392f">
<p>
The <a href="https://profanity.im">Profanity</a> shell based user interface and is perhaps the simplest way to use XMPP from a laptop. It's also a good way to ensure that your OTR keys are the same even when logging in from different laptops or devices, and it also means that if those devices later become compomised then there are no locally stored OTR keys to be found.
</p>
<div class="org-src-container">
<pre class="src src-bash">ssh username@domain -p 2222
</pre>
</div>
<p>
Then select XMPP. Generate an <a href="https://en.wikipedia.org/wiki/Off-the-Record_Messaging">OTR</a> key with:
</p>
<div class="org-src-container">
<pre class="src src-bash">/otr gen
</pre>
</div>
<p>
Then to start a conversation using OTR:
</p>
<div class="org-src-container">
<pre class="src src-bash">/otr start otherusername@otheruserdomain
</pre>
</div>
<p>
or if you're already in an insecure chat with someone just use:
</p>
<div class="org-src-container">
<pre class="src src-bash">/otr start
</pre>
</div>
<p>
Set a security question and answer:
</p>
<div class="org-src-container">
<pre class="src src-bash">/otr question <span class="org-string">"What is the name of your best friends rabbit?"</span> fiffi
</pre>
</div>
<p>
On the other side the user can enter:
</p>
<div class="org-src-container">
<pre class="src src-bash">/otr answer fiffi
</pre>
</div>
<p>
For the most paranoid you can also obtain your fingerprint:
</p>
<div class="org-src-container">
<pre class="src src-bash">/otr myfp
</pre>
</div>
<p>
and quote that. If they quote theirs back you can check it with:
</p>
<div class="org-src-container">
<pre class="src src-bash">/otr theirfp
</pre>
</div>
<p>
If the fingerprints match then you can be pretty confident that unless you have been socially engineered via the question and answer you probably are talking to who you think you are, and that it will be difficult for mass surveillance systems to know the content of the conversation. For more details see <a href="https://www.profanity.im/otr.html">this guide</a>
</p>
<p>
When accessed via the user control panel the client is automatically routed through Tor and so if you are also using OTR then this provides protection for both message content and metadata.
</p>
</div>
</div>
<div id="outline-container-orgeafb4a2" class="outline-2">
<h2 id="orgeafb4a2">Using with Jitsi</h2>
<div class="outline-text-2" id="text-orgeafb4a2">
<div id="outline-container-orga1b2804" class="outline-2">
<h2 id="orga1b2804">Using with Jitsi</h2>
<div class="outline-text-2" id="text-orga1b2804">
<p>
Jitsi can be downloaded from <a href="https://jitsi.org">https://jitsi.org</a>
</p>
@ -423,9 +347,9 @@ You can also <a href="https://www.youtube.com/watch?v=vgx7VSrDGjk">see this vide
</div>
</div>
<div id="outline-container-orgdc856f7" class="outline-2">
<h2 id="orgdc856f7">Using with Ubuntu</h2>
<div class="outline-text-2" id="text-orgdc856f7">
<div id="outline-container-org9e45966" class="outline-2">
<h2 id="org9e45966">Using with Ubuntu</h2>
<div class="outline-text-2" id="text-org9e45966">
<p>
The default XMPP client in Ubuntu is Empathy. Using Empathy isn't as secure as using Jitsi, since it doesn't include the <i>off the record</i> feature, but since it's the default it's what many users will have easy access to.
</p>
@ -444,18 +368,18 @@ Click on <b>Advanced</b> and make sure that <b>Encryption required</b> and <b>Ig
</div>
</div>
<div id="outline-container-org9cdcce3" class="outline-2">
<h2 id="org9cdcce3">Using Tor Messenger</h2>
<div class="outline-text-2" id="text-org9cdcce3">
<div id="outline-container-orgebb228c" class="outline-2">
<h2 id="orgebb228c">Using Tor Messenger</h2>
<div class="outline-text-2" id="text-orgebb228c">
<p>
Tor Messenger is a messaging client which supports XMPP, and its onion routing enables you to protect the metadata of chat interactions to some extent by making it difficult for an adversary to know which server is talking to which. You can download Tor Messenger from <a href="https://torproject.org">torproject.org</a> and the setup is pretty simple.
</p>
</div>
</div>
<div id="outline-container-orga36a236" class="outline-2">
<h2 id="orga36a236">Using with Android/Conversations</h2>
<div class="outline-text-2" id="text-orga36a236">
<div id="outline-container-org1a2d0c5" class="outline-2">
<h2 id="org1a2d0c5">Using with Android/Conversations</h2>
<div class="outline-text-2" id="text-org1a2d0c5">
<p>
Install <a href="https://f-droid.org/">F-Droid</a>
</p>
@ -477,11 +401,11 @@ From the menu select <b>Manage accounts</b> and add a new account.
</p>
<div class="org-src-container">
<pre class="src src-bash">Jabber ID: myusername@mydomain
<pre><code class="src src-bash">Jabber ID: myusername@mydomain
Password: your XMPP password
Hostname: mydomain (preferably your xmpp onion address)
Port: 5222
</pre>
</code></pre>
</div>
<p>