[Freedombox-discuss] Announcing FreedomBuddy v0.3
Nick M. Daly
nick.m.daly at gmail.com
Fri Jun 29 04:12:12 UTC 2012
Hi folks, FreedomBuddy version 0.3 is out and available on GitHub [0].
It now comes with:
- A UI: Because everybody likes UIs.
- JSON Output: Good for utilities relying on FBuddy.
- Zero known injection attack vulnerabilities: For either the server or
its clients. I'm currently trying to debug what's going on with one
unexpected output and may release a new version depending on my
findings.
- Tests: But we still need more of 'em.
You'll still need to follow the setup instructions I mentioned in a
previous email, reproduced and updated below:
1. If you want to test over Tor, get the Tor Browser Bundle:
https://www.torproject.org/projects/torbrowser.html.en
2. Install pre-requisites:
Python 2, python-gnupg (Debian Testing only)
3. You need a PGP key.
If you plan on letting FreedomBuddy run all the time (as a daemon),
you'll probably want to make a new password-less key specifically for
FBuddy. Otherwise FBuddy will block or fail while waiting for the
password.
If you want to control when FBuddy runs, install gnupg-agent to
manage your keys and passwords while the system's running.
4. You need a ``production.cfg`` or ``test.cfg`` file with contents like
the following:
[pgpprocessor]
keyid = (your 40-character key identifier from step 3)
5. You need an SSL certificate (the ``ssl-cert`` package is required).
Run the following as root, changing the group as necessary:
# make-ssl-cert generate-default-snakeoil
# make-ssl-cert /usr/share/ssl-cert/ssleay.cnf santiago.crt
# chgrp 1000 santiago.crt
# chmod g+r santiago.crt
See ``/usr/share/doc/apache2.2-common/README.Debian.gz`` for more
details.
6. Either set up a Tor listener on port 8118, or set the proxy port to
"None" or 80, if you're running Python 2.7 or later.
7. Run ``make`` once in the Plinth root directory to create the config
files you need.
8. Running ``bash start.sh`` in a console will set up a FreedomBuddy
service. To see it in action, navigate to:
https://localhost:8080
At this point it should successfully interact with other FreedomBuddies
in the world. To serve it correctly over a Tor Hidden Service, you may
need to change the protocol (see santiago.py::728) from "https" to
"http" and symlink the "https" protocol directory as "http".
Next Steps:
- Build scripts to configure VPNs automatically.
Thanks for your time,
Nick
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 835 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/freedombox-discuss/attachments/20120628/9b300bb9/attachment.pgp>
More information about the Freedombox-discuss
mailing list