diff options
Diffstat (limited to 'doc/handbook/chapters/user.texi')
-rw-r--r-- | doc/handbook/chapters/user.texi | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/doc/handbook/chapters/user.texi b/doc/handbook/chapters/user.texi index b5889891b..409a89e47 100644 --- a/doc/handbook/chapters/user.texi +++ b/doc/handbook/chapters/user.texi | |||
@@ -71,7 +71,7 @@ $ gnunet-arm -e | |||
71 | ``.pin'' is a default zone which points to a zone managed by gnunet.org. | 71 | ``.pin'' is a default zone which points to a zone managed by gnunet.org. |
72 | Use @code{gnunet-config -s gns} to view the GNS configuration, including | 72 | Use @code{gnunet-config -s gns} to view the GNS configuration, including |
73 | all configured zones that are operated by other users. The respective | 73 | all configured zones that are operated by other users. The respective |
74 | configuration entry names start with a ``.'', i.e. ``.pin''. | 74 | configuration entry names start with a ``.'', e.g. ``.pin''. |
75 | 75 | ||
76 | You can configure any number of top-level domains, and point them to | 76 | You can configure any number of top-level domains, and point them to |
77 | the respective zones of your friends! For this, simply obtain the | 77 | the respective zones of your friends! For this, simply obtain the |
@@ -109,7 +109,7 @@ rules - GO0T87F9BPMF8NKD5A54L2AH1T0GRML539TPFSRMCEA98182QD30 | |||
109 | @subsection The GNS Tab | 109 | @subsection The GNS Tab |
110 | 110 | ||
111 | 111 | ||
112 | Maintaing your zones is through the NAMESTORE service and is discussed | 112 | Maintaining your zones is through the NAMESTORE service and is discussed |
113 | here. You can manage your zone using @command{gnunet-identity} and | 113 | here. You can manage your zone using @command{gnunet-identity} and |
114 | @command{gnunet-namestore}, or most conveniently using | 114 | @command{gnunet-namestore}, or most conveniently using |
115 | @command{gnunet-namestore-gtk}. | 115 | @command{gnunet-namestore-gtk}. |
@@ -1620,7 +1620,7 @@ under "*.friend.gnu". | |||
1620 | BOX records are there to integrate information from TLSA or | 1620 | BOX records are there to integrate information from TLSA or |
1621 | SRV records under the main label. In DNS, TLSA and SRV records | 1621 | SRV records under the main label. In DNS, TLSA and SRV records |
1622 | use special names of the form @code{_port._proto.(label.)*tld} to | 1622 | use special names of the form @code{_port._proto.(label.)*tld} to |
1623 | indicate the port number and protocol (i.e. tcp or udp) for which | 1623 | indicate the port number and protocol (like TCP or UDP) for which |
1624 | the TLSA or SRV record is valid. This causes various problems, and | 1624 | the TLSA or SRV record is valid. This causes various problems, and |
1625 | is elegantly solved in GNS by integrating the protocol and port | 1625 | is elegantly solved in GNS by integrating the protocol and port |
1626 | numbers together with the respective value into a "BOX" record. | 1626 | numbers together with the respective value into a "BOX" record. |
@@ -1633,7 +1633,7 @@ are BOXed up. | |||
1633 | @subsubsection LEHO | 1633 | @subsubsection LEHO |
1634 | 1634 | ||
1635 | The LEgacy HOstname of a server. Some webservers expect a specific | 1635 | The LEgacy HOstname of a server. Some webservers expect a specific |
1636 | hostname to provide a service (virtiual hosting). Also SSL | 1636 | hostname to provide a service (virtual hosting). Also SSL |
1637 | certificates usually contain DNS names. To provide the expected | 1637 | certificates usually contain DNS names. To provide the expected |
1638 | legacy DNS name for a server, the LEHO record can be used. | 1638 | legacy DNS name for a server, the LEHO record can be used. |
1639 | To mitigate the just mentioned issues the GNS proxy has to be used. | 1639 | To mitigate the just mentioned issues the GNS proxy has to be used. |
@@ -1700,7 +1700,7 @@ be useful if you do not want to start resolution in the DNS root zone | |||
1700 | (due to issues such as censorship or availability). | 1700 | (due to issues such as censorship or availability). |
1701 | 1701 | ||
1702 | Note that you would typically want to use a relative name for the | 1702 | Note that you would typically want to use a relative name for the |
1703 | nameserver, i.e. | 1703 | nameserver, like so: |
1704 | 1704 | ||
1705 | @example | 1705 | @example |
1706 | Name: pet; RRType: GNS2DNS; Value: gnunet.org@@ns-joker.+@ | 1706 | Name: pet; RRType: GNS2DNS; Value: gnunet.org@@ns-joker.+@ |
@@ -2244,7 +2244,7 @@ that subnet to the GNUnet exit's TUN interface. | |||
2244 | 2244 | ||
2245 | When running a local service, you should make sure that the local | 2245 | When running a local service, you should make sure that the local |
2246 | service is (also) bound to the IP address of your EXIT interface | 2246 | service is (also) bound to the IP address of your EXIT interface |
2247 | (i.e. 169.254.86.1). It will NOT work if your local service is | 2247 | (e.g. 169.254.86.1). It will NOT work if your local service is |
2248 | just bound to loopback. You may also want to create a "VPN" record | 2248 | just bound to loopback. You may also want to create a "VPN" record |
2249 | in your zone of the GNU Name System to make it easy for others to | 2249 | in your zone of the GNU Name System to make it easy for others to |
2250 | access your service via a name instead of just the full service | 2250 | access your service via a name instead of just the full service |
@@ -2315,7 +2315,7 @@ and restart your peer, your Internet traffic should be tunneled | |||
2315 | over the GNUnet VPN. | 2315 | over the GNUnet VPN. |
2316 | 2316 | ||
2317 | The GNUnet VPN uses DNS-ALG to hijack your IP traffic. Whenever an | 2317 | The GNUnet VPN uses DNS-ALG to hijack your IP traffic. Whenever an |
2318 | application resolves a hostname (i.e. 'gnunet.org'), the | 2318 | application resolves a hostname (like 'gnunet.org'), the |
2319 | "gnunet-daemon-pt" will instruct the "gnunet-service-dns" to intercept | 2319 | "gnunet-daemon-pt" will instruct the "gnunet-service-dns" to intercept |
2320 | the request (possibly route it over GNUnet as well) and replace the | 2320 | the request (possibly route it over GNUnet as well) and replace the |
2321 | normal answer with an IP in the range of the VPN's interface. | 2321 | normal answer with an IP in the range of the VPN's interface. |
@@ -2325,8 +2325,8 @@ destination. | |||
2325 | 2325 | ||
2326 | For applications that do not use DNS, you can also manually create | 2326 | For applications that do not use DNS, you can also manually create |
2327 | such a mapping using the gnunet-vpn command-line tool. Here, you | 2327 | such a mapping using the gnunet-vpn command-line tool. Here, you |
2328 | specify the desired address family of the result (i.e. "-4"), and the | 2328 | specify the desired address family of the result (e.g. "-4"), and the |
2329 | intended target IP on the Internet ("-i 131.159.74.67") and | 2329 | intended target IP on the Internet (e.g. "-i 131.159.74.67") and |
2330 | "gnunet-vpn" will tell you which IP address in the range of your | 2330 | "gnunet-vpn" will tell you which IP address in the range of your |
2331 | VPN tunnel was mapped. | 2331 | VPN tunnel was mapped. |
2332 | 2332 | ||
@@ -2404,7 +2404,7 @@ $ gnunet-peerinfo -s | |||
2404 | 2404 | ||
2405 | A ROOMKEY gets entered in readable text form. The service will then hash the | 2405 | A ROOMKEY gets entered in readable text form. The service will then hash the |
2406 | entered ROOMKEY and use the result as shared secret for transmission through | 2406 | entered ROOMKEY and use the result as shared secret for transmission through |
2407 | the CADET submodule. You can also optionally leave out the '-r' paramter and | 2407 | the CADET submodule. You can also optionally leave out the '-r' parameter and |
2408 | the ROOMKEY to use the zeroed hash instead. | 2408 | the ROOMKEY to use the zeroed hash instead. |
2409 | 2409 | ||
2410 | If no IDENTITY is provided you will not send any name to others, you will be | 2410 | If no IDENTITY is provided you will not send any name to others, you will be |
@@ -2478,7 +2478,7 @@ $ gnunet-messenger [-e IDENTITY] -d PEERIDENTITY -r ROOMKEY -p | |||
2478 | @end example | 2478 | @end example |
2479 | 2479 | ||
2480 | Notice that you can only send such encrypted messages to members who use an ego | 2480 | Notice that you can only send such encrypted messages to members who use an ego |
2481 | which is not publically known as the anonymous ego to ensure transparency. If | 2481 | which is not publicly known as the anonymous ego to ensure transparency. If |
2482 | any user could decrypt these messages they would not be private. So as receiver | 2482 | any user could decrypt these messages they would not be private. So as receiver |
2483 | of such messages the IDENTITY is required and it has to match a local ego. | 2483 | of such messages the IDENTITY is required and it has to match a local ego. |
2484 | 2484 | ||