[Freedombox-discuss] Announcing FreedomBuddy v0.3

Nick M. Daly nick.m.daly at gmail.com
Fri Jun 29 04:12:12 UTC 2012


Hi folks, FreedomBuddy version 0.3 is out and available on GitHub [0].
It now comes with:

- A UI: Because everybody likes UIs.

- JSON Output: Good for utilities relying on FBuddy.

- Zero known injection attack vulnerabilities: For either the server or
  its clients.  I'm currently trying to debug what's going on with one
  unexpected output and may release a new version depending on my
  findings.

- Tests: But we still need more of 'em.

You'll still need to follow the setup instructions I mentioned in a
previous email, reproduced and updated below:

1. If you want to test over Tor, get the Tor Browser Bundle:

    https://www.torproject.org/projects/torbrowser.html.en

2. Install pre-requisites:

    Python 2, python-gnupg (Debian Testing only)

3. You need a PGP key.

   If you plan on letting FreedomBuddy run all the time (as a daemon),
   you'll probably want to make a new password-less key specifically for
   FBuddy.  Otherwise FBuddy will block or fail while waiting for the
   password.

   If you want to control when FBuddy runs, install gnupg-agent to
   manage your keys and passwords while the system's running.

4. You need a ``production.cfg`` or ``test.cfg`` file with contents like
   the following:

     [pgpprocessor]
     keyid = (your 40-character key identifier from step 3)

5. You need an SSL certificate (the ``ssl-cert`` package is required).
   Run the following as root, changing the group as necessary:

     # make-ssl-cert generate-default-snakeoil
     # make-ssl-cert /usr/share/ssl-cert/ssleay.cnf santiago.crt
     # chgrp 1000 santiago.crt
     # chmod g+r santiago.crt

   See ``/usr/share/doc/apache2.2-common/README.Debian.gz`` for more
   details.

6. Either set up a Tor listener on port 8118, or set the proxy port to
   "None" or 80, if you're running Python 2.7 or later.

7. Run ``make`` once in the Plinth root directory to create the config
   files you need.

8. Running ``bash start.sh`` in a console will set up a FreedomBuddy
   service.  To see it in action, navigate to:

     https://localhost:8080

At this point it should successfully interact with other FreedomBuddies
in the world.  To serve it correctly over a Tor Hidden Service, you may
need to change the protocol (see santiago.py::728) from "https" to
"http" and symlink the "https" protocol directory as "http".

Next Steps:

- Build scripts to configure VPNs automatically.

Thanks for your time,
Nick
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 835 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/freedombox-discuss/attachments/20120628/9b300bb9/attachment.pgp>


More information about the Freedombox-discuss mailing list