aboutsummaryrefslogtreecommitdiff
path: root/doc/handbook/chapters/user.texi
diff options
context:
space:
mode:
Diffstat (limited to 'doc/handbook/chapters/user.texi')
-rw-r--r--doc/handbook/chapters/user.texi22
1 files changed, 11 insertions, 11 deletions
diff --git a/doc/handbook/chapters/user.texi b/doc/handbook/chapters/user.texi
index b5889891b..409a89e47 100644
--- a/doc/handbook/chapters/user.texi
+++ b/doc/handbook/chapters/user.texi
@@ -71,7 +71,7 @@ $ gnunet-arm -e
71``.pin'' is a default zone which points to a zone managed by gnunet.org. 71``.pin'' is a default zone which points to a zone managed by gnunet.org.
72Use @code{gnunet-config -s gns} to view the GNS configuration, including 72Use @code{gnunet-config -s gns} to view the GNS configuration, including
73all configured zones that are operated by other users. The respective 73all configured zones that are operated by other users. The respective
74configuration entry names start with a ``.'', i.e. ``.pin''. 74configuration entry names start with a ``.'', e.g. ``.pin''.
75 75
76You can configure any number of top-level domains, and point them to 76You can configure any number of top-level domains, and point them to
77the respective zones of your friends! For this, simply obtain the 77the respective zones of your friends! For this, simply obtain the
@@ -109,7 +109,7 @@ rules - GO0T87F9BPMF8NKD5A54L2AH1T0GRML539TPFSRMCEA98182QD30
109@subsection The GNS Tab 109@subsection The GNS Tab
110 110
111 111
112Maintaing your zones is through the NAMESTORE service and is discussed 112Maintaining your zones is through the NAMESTORE service and is discussed
113here. You can manage your zone using @command{gnunet-identity} and 113here. You can manage your zone using @command{gnunet-identity} and
114@command{gnunet-namestore}, or most conveniently using 114@command{gnunet-namestore}, or most conveniently using
115@command{gnunet-namestore-gtk}. 115@command{gnunet-namestore-gtk}.
@@ -1620,7 +1620,7 @@ under "*.friend.gnu".
1620BOX records are there to integrate information from TLSA or 1620BOX records are there to integrate information from TLSA or
1621SRV records under the main label. In DNS, TLSA and SRV records 1621SRV records under the main label. In DNS, TLSA and SRV records
1622use special names of the form @code{_port._proto.(label.)*tld} to 1622use special names of the form @code{_port._proto.(label.)*tld} to
1623indicate the port number and protocol (i.e. tcp or udp) for which 1623indicate the port number and protocol (like TCP or UDP) for which
1624the TLSA or SRV record is valid. This causes various problems, and 1624the TLSA or SRV record is valid. This causes various problems, and
1625is elegantly solved in GNS by integrating the protocol and port 1625is elegantly solved in GNS by integrating the protocol and port
1626numbers together with the respective value into a "BOX" record. 1626numbers together with the respective value into a "BOX" record.
@@ -1633,7 +1633,7 @@ are BOXed up.
1633@subsubsection LEHO 1633@subsubsection LEHO
1634 1634
1635The LEgacy HOstname of a server. Some webservers expect a specific 1635The LEgacy HOstname of a server. Some webservers expect a specific
1636hostname to provide a service (virtiual hosting). Also SSL 1636hostname to provide a service (virtual hosting). Also SSL
1637certificates usually contain DNS names. To provide the expected 1637certificates usually contain DNS names. To provide the expected
1638legacy DNS name for a server, the LEHO record can be used. 1638legacy DNS name for a server, the LEHO record can be used.
1639To mitigate the just mentioned issues the GNS proxy has to be used. 1639To mitigate the just mentioned issues the GNS proxy has to be used.
@@ -1700,7 +1700,7 @@ be useful if you do not want to start resolution in the DNS root zone
1700(due to issues such as censorship or availability). 1700(due to issues such as censorship or availability).
1701 1701
1702Note that you would typically want to use a relative name for the 1702Note that you would typically want to use a relative name for the
1703nameserver, i.e. 1703nameserver, like so:
1704 1704
1705@example 1705@example
1706Name: pet; RRType: GNS2DNS; Value: gnunet.org@@ns-joker.+@ 1706Name: pet; RRType: GNS2DNS; Value: gnunet.org@@ns-joker.+@
@@ -2244,7 +2244,7 @@ that subnet to the GNUnet exit's TUN interface.
2244 2244
2245When running a local service, you should make sure that the local 2245When running a local service, you should make sure that the local
2246service is (also) bound to the IP address of your EXIT interface 2246service is (also) bound to the IP address of your EXIT interface
2247(i.e. 169.254.86.1). It will NOT work if your local service is 2247(e.g. 169.254.86.1). It will NOT work if your local service is
2248just bound to loopback. You may also want to create a "VPN" record 2248just bound to loopback. You may also want to create a "VPN" record
2249in your zone of the GNU Name System to make it easy for others to 2249in your zone of the GNU Name System to make it easy for others to
2250access your service via a name instead of just the full service 2250access your service via a name instead of just the full service
@@ -2315,7 +2315,7 @@ and restart your peer, your Internet traffic should be tunneled
2315over the GNUnet VPN. 2315over the GNUnet VPN.
2316 2316
2317The GNUnet VPN uses DNS-ALG to hijack your IP traffic. Whenever an 2317The GNUnet VPN uses DNS-ALG to hijack your IP traffic. Whenever an
2318application resolves a hostname (i.e. 'gnunet.org'), the 2318application resolves a hostname (like 'gnunet.org'), the
2319"gnunet-daemon-pt" will instruct the "gnunet-service-dns" to intercept 2319"gnunet-daemon-pt" will instruct the "gnunet-service-dns" to intercept
2320the request (possibly route it over GNUnet as well) and replace the 2320the request (possibly route it over GNUnet as well) and replace the
2321normal answer with an IP in the range of the VPN's interface. 2321normal answer with an IP in the range of the VPN's interface.
@@ -2325,8 +2325,8 @@ destination.
2325 2325
2326For applications that do not use DNS, you can also manually create 2326For applications that do not use DNS, you can also manually create
2327such a mapping using the gnunet-vpn command-line tool. Here, you 2327such a mapping using the gnunet-vpn command-line tool. Here, you
2328specify the desired address family of the result (i.e. "-4"), and the 2328specify the desired address family of the result (e.g. "-4"), and the
2329intended target IP on the Internet ("-i 131.159.74.67") and 2329intended target IP on the Internet (e.g. "-i 131.159.74.67") and
2330"gnunet-vpn" will tell you which IP address in the range of your 2330"gnunet-vpn" will tell you which IP address in the range of your
2331VPN tunnel was mapped. 2331VPN tunnel was mapped.
2332 2332
@@ -2404,7 +2404,7 @@ $ gnunet-peerinfo -s
2404 2404
2405A ROOMKEY gets entered in readable text form. The service will then hash the 2405A ROOMKEY gets entered in readable text form. The service will then hash the
2406entered ROOMKEY and use the result as shared secret for transmission through 2406entered ROOMKEY and use the result as shared secret for transmission through
2407the CADET submodule. You can also optionally leave out the '-r' paramter and 2407the CADET submodule. You can also optionally leave out the '-r' parameter and
2408the ROOMKEY to use the zeroed hash instead. 2408the ROOMKEY to use the zeroed hash instead.
2409 2409
2410If no IDENTITY is provided you will not send any name to others, you will be 2410If no IDENTITY is provided you will not send any name to others, you will be
@@ -2478,7 +2478,7 @@ $ gnunet-messenger [-e IDENTITY] -d PEERIDENTITY -r ROOMKEY -p
2478@end example 2478@end example
2479 2479
2480Notice that you can only send such encrypted messages to members who use an ego 2480Notice that you can only send such encrypted messages to members who use an ego
2481which is not publically known as the anonymous ego to ensure transparency. If 2481which is not publicly known as the anonymous ego to ensure transparency. If
2482any user could decrypt these messages they would not be private. So as receiver 2482any user could decrypt these messages they would not be private. So as receiver
2483of such messages the IDENTITY is required and it has to match a local ego. 2483of such messages the IDENTITY is required and it has to match a local ego.
2484 2484