[Freedombox-discuss] FreedomBox Unstable Image 2012.0930 Available

Nick M. Daly nick.m.daly at gmail.com
Mon Oct 1 02:55:39 UTC 2012

                    FreedomBox Weekly Image Report

Author: Nick Daly
Date: 2012-09-30 Sun

Hi folks, welcome to the fourteenth weekly FreedomBox test image and
progress report.

These images include several FreedomBox-related projects.  The changes
are changes made by project contributors in the last week that have made
it into the test image.  The outstanding TODOs are the changes needed
before the beta-release is complete.  If you'd like to contribute in any
way, fork and send me a pull request.

The image is available at:




Today's image was produced with:

    $ make weekly-image

Table of Contents
^ Introduction
2 How do I try it out?
3 Verification
    3.1 ~freedombox-unstable_2012.0930_dreamplug-armel-card.img.tar.bz2~
    3.2 ~freedombox-unstable_2012.0930_virtualbox-i386-hdd.vdi.tar.bz2~
4 Issues
5 Changes
6 Outstanding TODOs
    6.1 Freedom Maker: https://github.com/nickdaly/freedom-maker
    6.2 Plinth: https://github.com/nickdaly/plinth
    6.3 FreedomBox Privoxy: https://github.com/jvasile/freedombox-privoxy
    6.4 FreedomBuddy: https://gitorious.org/freedombuddy/freedombuddy
    6.5 Project Publish: https://gitorious.org/project-publish/project-publish
    6.6 PlugServer Setup: https://bitbucket.org/nickdaly/plugserver
    6.7 With SQLite: https://github.com/jvasile/withsqlite

2 How do I try it out?

  There are two ways you can test it out.  The easy way is to use
  VirtualBox and run the image in a virtual machine.  These instructions
  have more details:


  You can also install the image to your DreamPlug directly.  If you've
  bought your own DreamPlug, you'll probably need to flash the firmware,
  which requires a JTAG.  Follow these instructions:


  These are the users and their passwords:

  root: freedom

            The root user.

  fbx: frdm

           The normal user.  All the FreedomBox tools are stored in

3 Verification

  You can validate that the files have been downloaded correctly and
  haven't changed since I've published them by checking the files'

  First, download my key:

      $ gpg --keyserver hkp://keys.gnupg.net --recv-key D95C32042EE54FFDB25EC3489F2733F40928D23A

  Then, verify each file's signature:

$ gpg --verify freedombox-unstable_2012.0930_dreamplug-armel-card.tar.bz2.sig freedombox-unstable_2012.0930_dreamplug-armel-card.tar.bz2
$ gpg --verify freedombox-unstable_2012.0930_virtualbox-i386-hdd.vdi.tar.bz2.sig freedombox-unstable_2012.0930_virtualbox-i386-hdd.vdi.tar.bz2

   The checksums for each file, useful for additional verification, also

3.1 ~freedombox-unstable_2012.0930_dreamplug-armel-card.img.tar.bz2~

  md5sum      d8649d2014866bb312fe72de9612cd5a
  sha512sum   0fc62016ff3173eec5e3ec16d7e3291d625fd573061024d4b4bb69c2d33fba59507a12663c6a74c065dc748d4337ea7cf4326e87a6f501804b9e345963fb0642

3.2 ~freedombox-unstable_2012.0930_virtualbox-i386-hdd.vdi.tar.bz2~

  md5sum      dd39cd79eb533dc67fc2469ee5ad1043
  sha512sum   d99c9c27d393b7a2255299614c02053a221aca806d1e51d33f0863c74e662340b9013cc290ee3bcc0a9568a919c7e0023c9c8fa8476dbd9699f5434dc87a22db

4 Issues

  - I believe I've fixed the microSD non-booting bug, but haven't had a
    chance to test.  Would appreciate many eyes on this one.

    In doing so, I've broken the USB image, so we need a solution that
    doesn't involve manually correcting =freedom-maker/source/etc/fstab=
    for each image.

5 Changes

  - FreedomBuddy is easier to test.

  - I've merged almost all of FBuddy's security bugs into one.  Two
    currently remain: one's pretty easy to fix (the authentication bug),
    the other involves correcting the CLI/socket controller.

6 Outstanding TODOs

6.1 Freedom Maker: [https://github.com/nickdaly/freedom-maker]

   The FBX image build tool.

   - The setup process generates GPG keys for user.
   - Setup generates GPG and SSL keys for the box itself.

6.2 Plinth: [https://github.com/nickdaly/plinth]

   The UI layer.

   - Turn DHCP (for clients) on/off through Plinth
   - Select DHCP or Static IP in Plinth
   - Integrate basic OpenVPN settings into Plinth
   - Integrate Dnsmasq into Plinth
   - Integrate FreedomBuddy into Plinth.
   - Hook FreedomBuddy into SSH.
   - Add more OpenVPN FreedomBuddy setup instructions.

6.3 FreedomBox Privoxy: [https://github.com/jvasile/freedombox-privoxy]

   A privacy-focused web-proxy.

   - Privoxy should use the released HTTPS Everywhere regexp ruleset.
   - Add enabling and disabling Privoxy to the Plinth UI.

6.4 FreedomBuddy: [https://gitorious.org/freedombuddy/freedombuddy]

   A resilient communication tool.

   - Build an SSH-VPN connector.
   - Fix Outstanding FIXMEs

6.5 Project Publish: [https://gitorious.org/project-publish/project-publish]

   An easy-to-use publishing tool.

   - *Complete*

6.6 PlugServer Setup: [https://bitbucket.org/nickdaly/plugserver]

   A configuration tool.

   - *Complete*

6.7 With SQLite: [https://github.com/jvasile/withsqlite]

   A database-management Python package.

   - *Complete*

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 835 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/freedombox-discuss/attachments/20120930/0df73198/attachment.pgp>

More information about the Freedombox-discuss mailing list