Fusiondirectory User Manual Documentation Release 1.3

Total Page:16

File Type:pdf, Size:1020Kb

Fusiondirectory User Manual Documentation Release 1.3 FusionDirectory User Manual Documentation Release 1.3 Benoit Mortier Paola Penati Sep 09, 2021 Contents 1 FusionDirectory 3 1.1 What is FusionDirectory ?........................................5 1.2 Prerequisites...............................................6 1.3 Certified distributions..........................................8 1.4 Buy a subscription............................................8 1.5 Activate a subscription..........................................8 1.6 Install FusionDirectory..........................................9 1.7 Update FusionDirectory......................................... 23 1.8 Core................................................... 112 1.9 Configuration............................................... 132 1.10 ACLs................................................... 144 1.11 Plugins.................................................. 159 1.12 Templates................................................. 286 1.13 Triggers.................................................. 296 1.14 Faq.................................................... 300 1.15 Bug report................................................ 301 1.16 Release Policy.............................................. 303 1.17 License.................................................. 304 2 Schema2ldif 307 2.1 What is schema2ldif ?.......................................... 307 2.2 Prerequisites............................................... 307 2.3 Install Schema2ldif............................................ 307 2.4 ldap-schema-manager.......................................... 309 2.5 Schema2ldif............................................... 310 2.6 License.................................................. 311 3 Argonaut 313 3.1 What is Argonaut ?............................................ 315 3.2 Argonaut Components.......................................... 315 3.3 Certified distributions.......................................... 317 3.4 Buy a subscription............................................ 317 3.5 Install Argonaut............................................. 317 3.6 Configure Argonaut........................................... 322 3.7 Argonaut-server............................................. 323 3.8 Argonaut Client............................................. 324 3.9 Applications............................................... 324 i 3.10 License.................................................. 328 4 Support 329 4.1 Professional paid support........................................ 329 4.2 Community support........................................... 330 5 Security 331 5.1 Digital signature............................................. 331 5.2 Security issues.............................................. 331 6 Authors 333 6.1 Original GOsa2 AUTHORS....................................... 333 6.2 FusionDirectory AUTHORS....................................... 334 6.3 FusionDirectory libraries......................................... 337 7 Contact Us 339 8 Code of Conduct 341 8.1 Our Pledge................................................ 341 8.2 Our Standards.............................................. 341 8.3 Our Responsibilities........................................... 342 8.4 Scope................................................... 342 8.5 Enforcement............................................... 342 8.6 Attribution................................................ 342 ii FusionDirectory User Manual Documentation, Release 1.3 Contents: Contents 1 FusionDirectory User Manual Documentation, Release 1.3 2 Contents 3 FusionDirectory User Manual Documentation, Release 1.3 CHAPTER 1 FusionDirectory 4 Chapter 1. FusionDirectory FusionDirectory User Manual Documentation, Release 1.3 Contents: 1.1 What is FusionDirectory ? FusionDirectory provides a solution to daily management of data stored in an LDAP directory. Becoming the cor- nerstone of the information system, the corporate directory becomes more complex offering more data and managing more infrastructure services. This interface is simple and can be used to delegate fully or partly the data management to non-specialists. 1.1.1 Features • Users, groups, mail, ssh, personal management. • Supann norm Management. • PARTAGE mail integration • Systems management : dhcp, dns, sudo, all kind of systems. • System deployment management : FAI, OPSI • Complex Roles Management. • Access to multiple LDAP trees. • FusionDirectory Triggers 1.1.2 Acls and roles • ACLs are only used by FusionDirectory and not the underlying ldap server. • ACLs can be assigned to roles. – Global administrator : Can do everything. – Local administrator : Can manage users and groups and also a branch. – Human resources : Can create users from template to optimize the arrival of new people. – User : Will only be able to change his data permitted by an administrator 1.1.3 FusionDirectory Triggers FusionDirectory incorporates a series of triggers that can launch a specific action based on a task FusionDirec- tory must run. These triggers are associated with a content type (LDAP user, group, server, password, service and the triggering ac- tion (create, edit, delete, change password . ) For example, when creating a user, a script generation form can be executed automatically with informa- tion from the LDAP server. This can be useful for generating badges with photo, a form of access to the canteen or sending an email to warn other services of the actual arrival of the person. This system is also convenient when we want to deploy the account of that person on an application that does not sup- port LDAP. 1.1. What is FusionDirectory ? 5 FusionDirectory User Manual Documentation, Release 1.3 Another example is when a user leaves, you must: • archive and delete his mailbox • archive and remove its network space • delete him from third party applications not connected to LDAP. All of this can be easily done by shell scripts (at least in UNIX environment) and run automatically after the suppres- sion of the person by the administrator in FusionDirectory 1.1.4 The interaction with non-LDAP applications FusionDirectory stores information of a service or a server on an LDAP server. How about when this service does not have the opportunity to interact with LDAP? This question can be solved by creating: • LDAP schema suitable for application to the LDAP server • A plugin for its management in FusionDirectory with the simple plugin API • An Argonaut module for the client installed on the server 1.2 Prerequisites FusionDirectory is a Web application that will need: • a webserver; • PHP; • an ldap server; • perl 1.2.1 Web server FusionDirectory requires a web server that supports PHP, like: • Apache 2 (or more recent); • Nginx; • Microsoft IIS. 1.2.2 PHP As of 1.3 release, FusionDirectory requires PHP 5.6 until 7.4 Note: We recommand to use the most recent stable PHP release for better performances. 6 Chapter 1. FusionDirectory FusionDirectory User Manual Documentation, Release 1.3 Mandatory extensions Following PHP extensions are required for the app to work properly: • cas: for CAS authentication; • curl: to communicate with different types of servers and protocols • filter: to filters a variable with a specified filter; • fpdf: to export data in pdf format; • gd: to generate images; • iconv : for the samba integration; • imagick : to handle images; • imap: to handle imap servers management; • json: to get support for JSON data format; • mbstring: to manage multi bytes characters; • ldap: to connect and query the ldap server; • openssl: secured communications and generation of secure tokens; • session: to get user sessions support; • simplexml; • xml. Optional extensions Note: Even if those extensions are not mandatory, we advise you to install them anyways. Following PHP extensions are required for some extra features of FusionDirectory : • gettext : for an internationalized interface. • mhash : to make use of SSHA encryption • sha1 : to make use of SSHA encryption • zlib: to handle snapshots; Configuration PHP configuration file (php.ini) must be adapted to reflect following variables: expose_php= Off; implicit_flush= Off; memory_limit= 128M ; // max memory limit max_execution_time= 30 ; // not mandatory but adviced session.auto_start= off ; 1.2. Prerequisites 7 FusionDirectory User Manual Documentation, Release 1.3 1.2.3 LDAP server For FusionDirectory to work you need an ldap server. Servers know to work are : • OpenLDAP • 389DS 1.3 Certified distributions We certify FusionDirectory with all the most common distributions, here is a table which summarizes the level of support by distribution and version. Fusiondirectory need at least PHP 5.6. • Fusiondirectory 1.3 need >= PHP 5.6 • Fusiondirectory 1.4 need >= PHP 7.0 DISTRIBUTION FusionDirectory 1.2 FusionDirectory 1.3 Debian Jessie need a support contract need a support contract Debian Stretch not supported supported Debian Buster not supported supported Ubuntu 16.04 LTS need a support contract supported Ubuntu 18.04 LTS not supported supported Ubuntu 20.04 LTS not supported work in progress Centos 7 need a support contract supported Centos 8 not supported not supported 1.4 Buy a subscription FusionDirectory source code is published under the free software licence GPL 2+ and thus is freely available for download, use and share. You use your distribution package manager or inspect the code in the public code repository A FusionDirectory Subscription is an additional service program designed to help IT professionals and businesses to keep your FusionDirectory deployments up-to-date. A subscription
Recommended publications
  • Tomenet-Guide.Pdf
    .==========================================================================+−−. | TomeNET Guide | +==========================================================================+− | Latest update: 17. September 2021 − written by C. Blue ([email protected]) | | for TomeNET version v4.7.4b − official websites are: : | https://www.tomenet.eu/ (official main site, formerly www.tomenet.net) | https://muuttuja.org/tomenet/ (Mikael’s TomeNET site) | Runes & Runemastery sections by Kurzel ([email protected]) | | You should always keep this guide up to date: Either go to www.tomenet.eu | to obtain the latest copy or simply run the TomeNET−Updater.exe in your | TomeNET installation folder (desktop shortcut should also be available) | to update it. | | If your text editor cannot display the guide properly (needs fixed−width | font like for example Courier), simply open it in any web browser instead. +−−− | Welcome to this guide! | Although I’m trying, I give no guarantee that this guide | a) contains really every detail/issue about TomeNET and | b) is all the time 100% accurate on every occasion. | Don’t blame me if something differs or is missing; it shouldn’t though. | | If you have any suggestions about the guide or the game, please use the | /rfe command in the game or write to the official forum on www.tomenet.eu. : \ Contents −−−−−−−− (0) Quickstart (If you don’t like to read much :) (0.1) Start & play, character validation, character timeout (0.1a) Colours and colour blindness (0.1b) Photosensitivity / Epilepsy issues (0.2) Command reference
    [Show full text]
  • Reconectando a Sociabilidade On-Line E Off-Line: Trajetórias, Poder E Formação De Grupos Em Canais Geográficos No Internet Relay Chat
    Ana Maria Alves Carneiro da Silva Reconectando a sociabilidade on-line e off-line: trajetórias, poder e formação de grupos em canais geográficos no Internet Relay Chat Dissertação de Mestrado apresentada ao Departamento de Sociologia do Instituto de Filosofia e Ciências Humanas da Universidade Estadual de Campinas sob a orientação do Prof. Dr. Thomas Patrick Dwyer Campinas – Novembro 2000 I FICHA CATALOGRÁFICA ELABORADA PELA BIBLIOTECA DO IFCH – UNICAMP Silva, Ana Maria Alves Carneiro da Si 38 r Reconectando a sociabilidade on-line e off-line: trajetórias, formação de grupos e poder em canais geográficos no Internet Relay Chat (IRC) / Ana Maria Alves Carneiro da Silva. -- Campinas, SP : [s.n.], 2000. Orientador: Thomas Patrick Dwyer. Dissertação (mestrado) – Universidade Estadual de Campinas, Instituto de Filosofia e Ciências Humanas. 1. Tecnologia – Aspectos sociais – Brasil. 2. Sociologia. 3. Poder (Ciências Sociais). 4. Sociabilidade. 5. Internet (Redes de Computação) – Brasil. I. Dwyer, Thomas Patrick. II. Universidade Estadual de Campinas. Instituto de Filosofia e Ciências Humanas. III. Título. II Ana Maria Alves Carneiro da Silva Reconectando a sociabilidade on-line e off-line: trajetórias, poder e formação de grupos em canais geográficos no Internet Relay Chat Dissertação de Mestrado apresentada ao Departamento de Sociologia do Instituto de Filosofia e Ciências Humanas da Universidade Estadual de Campinas sob a orientação do Prof. Dr. Thomas Patrick Dwyer. Este exemplar corresponde à redação final da tese defendida e aprovada pela Comissão Julgadora em / /2000. Banca Prof. Dr. Thomas Patrick Dwyer (Orientador) Prof. Dr. Theophilos Rifiotis Prof. Dr. Fernando Lourenço III Resumo Reconectando a sociabilidade on-line e off-line: trajetórias, formação de grupos e poder em canais geográficos no Internet Relay Chat (IRC) O objetivo desta pesquisa foi analisar a sociabilidade e os exercícios de poder no ciberespaço, aprofundando a discussão da bibliografia especializada.
    [Show full text]
  • Descargar Comunicación Y Pedagogía 246-247
    www.primerasnoticiastv.comp Estad atent@s a esta nueva plataforma de tv on line de la Asociación de Prensa Juvenil. Un espacio de comunicación audiovisual interactiva que trata de informar, formar y entretener, potenciando el periodismo juvenil ciudadano y la participación además de informarte de las novedades de la Asociación de Prensa Juvenil. Por supuesto, estáis invitad@s a colaborar enviando vuestros vídeos y noticias. Para contactar con el equipo de Primeras Noticias tv puedes utilizar el formulario que te facilita el propio programa. Un programa de Subvencionado por C&P DIRECTOR Alejandro Aliaga Alcolea Y duran, duran... CENTRO DE COMUNICACIÓN l Software Libre llegó para quedarse. Por mucho que nos quieran convencer los Y PEDAGOGÍA defensores del software privativo, a la pruebas nos remitimos. Nadie puede negar, Director tras años de implementación en gran parte de las Comunidades Autónomas espa- José D. Aliaga Serrano E ñolas, que el Software Libre está por debajo de los programas de pago en cuanto a presta- ciones, si no todo lo contrario: el empuje dado por la comunidad de Internet les pone, mu- CONSEJO chas veces, por delante. Eso sin hablar de su gratuidad... Además, el Software Libre puede DE REDACCIÓN alargar la vida de nuestros ordenadores. No sólo no cuesta ni un euro, sino que tampoco J. Ignacio Aguaded Gómez hemos de invertir en hardware... Universidad de Huelva Carmen Alba El único problema es que no todo el profesorado está al tanto de esto último. Por ello, Universidad Complutense desde Comunicación y Pedagogía se ha enfocado su especial anual dedicado al Software de Madrid Libre a la reutilización de viejos PCs.
    [Show full text]
  • Hexchat Documentation Release 2.14.3
    HexChat Documentation Release 2.14.3 TingPing May 24, 2021 Contents 1 Getting Started 1 1.1 Quick Start................................................1 1.2 Frequently Asked Questions.......................................6 1.3 Changelog................................................ 13 2 Settings 37 2.1 Config Files............................................... 37 2.2 Network List............................................... 37 2.3 Channel Options............................................. 38 2.4 Preferences................................................ 38 2.5 Set Command.............................................. 39 2.6 List of Settings.............................................. 40 3 Commands 47 3.1 User Commands............................................. 47 3.2 List of Commands............................................ 47 4 Appearance 49 4.1 Theme Files............................................... 49 4.2 Theming................................................. 49 4.3 Buttons, Menus, and Popups....................................... 51 5 Addons 53 5.1 Exec................................................... 53 5.2 FISHLiM................................................. 53 5.3 Update Checker............................................. 54 5.4 Sysinfo.................................................. 54 5.5 Checksum................................................ 54 5.6 Winamp................................................. 54 6 Tips & Tricks 55 6.1 Spell Check................................................ 55 6.2
    [Show full text]
  • Latest Version: 2021-09-23 Version 1.3.0
    Srain Documentation Release 1.3.0 Shengyu Zhang Sep 21, 2021 Contents 1 All pages 3 1.1 Srain...................................................3 1.2 Quick Start................................................4 1.3 Installation................................................9 1.4 Commands Manual............................................ 14 1.5 Configuration Manual.......................................... 22 1.6 Development Specification........................................ 29 1.7 Miscellaneous.............................................. 30 1.8 Frequently Asked Questions....................................... 30 1.9 Change Log............................................... 34 1.10 Support Tables.............................................. 44 2 Indices and Tables 47 i ii Srain Documentation, Release 1.3.0 Welcome to Srain documentation! Latest version: 2021-09-23 Version 1.3.0. The source code of this documentation is hosted on GitHub. If you found any mistake, feel free to file issue or pull request. Contents 1 Srain Documentation, Release 1.3.0 2 Contents CHAPTER 1 All pages 1.1 Srain Modern IRC client written in GTK. Home| Documentation| Source code 3 Srain Documentation, Release 1.3.0 1.1.1 Packaging Status 1.1.2 Features • Fully open source • RFC {1459,2812} compatible • Partial IRCv3 support • Multi-platform support (Linux, Windows, macOS and BSD) • Act like modern IM client – Graphical user interface – Convenient connection panel – Interactive channel search – Forward message in one click – URL preview – Desktop notificaion – Special optimization for bridge/relay bot • Act like geek IRC client – Anything can be done via commands – Fine-grained configuration with hot update support – Regex based message render and filter mechanisms – IPC based plugin system (TODO) 1.1.3 Need Help? Frequently Asked Questions may be helpful. Feel free to contact us if you have any question about Srain. • IRC Channel: #srain @ Libera Chat • Github: file an issue Here 1.1.4 License GNU General Public License Version 3 1.2 Quick Start 4 Chapter 1.
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]
  • New Perspectives About the Tor Ecosystem: Integrating Structure with Information
    NEW PERSPECTIVES ABOUT THE TOR ECOSYSTEM: INTEGRATING STRUCTURE WITH INFORMATION A Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy by MAHDIEH ZABIHIMAYVAN B.S., Ferdowsi University, 2012 M.S., International University of Imam Reza, 2014 2020 Wright State University Wright State University GRADUATE SCHOOL April 22, 2020 I HEREBY RECOMMEND THAT THE DISSERTATION PREPARED UNDER MY SUPERVISION BY MAHDIEH ZABIHIMAYVAN ENTITLED NEW PERSPECTIVES ABOUT THE TOR ECOSYSTEM: INTEGRATING STRUCTURE WITH INFORMATION BE ACCEPTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Doctor of Philosophy. Derek Doran, Ph.D. Dissertation Director Yong Pei, Ph.D. Director, Computer Science and Engineering Ph.D. Program Barry Milligan, Ph.D. Interim Dean of the Graduate School Committee on Final Examination Derek Doran, Ph.D. Michael Raymer, Ph.D. Krishnaprasad Thirunarayan, Ph.D. Amir Zadeh, Ph.D. ABSTRACT Zabihimayvan, Mahdieh. Ph.D., Department of Computer Science and Engineering, Wright State University, 2020. New Perspectives About The Tor Ecosystem: Integrating Structure With Infor- mation Tor is the most popular dark network in the world. Its noble uses, including as a plat- form for free speech and information dissemination under the guise of true anonymity, make it an important socio-technical system in society. Although activities in socio-technical systems are driven by both structure and information, past studies on evaluating Tor inves- tigate its structure or information exclusively and narrowly, which inherently limits our understanding of Tor. This dissertation bridges this gap by contributing insights into the logical structure of Tor, the types of information hosted on this network, and the interplay between its structure and information.
    [Show full text]
  • Fusiondirectory User Manual Documentation Release 1.4
    FusionDirectory User Manual Documentation Release 1.4 Benoit Mortier Paola Penati Sep 09, 2021 Contents 1 FusionDirectory 3 1.1 What is FusionDirectory ?........................................5 1.2 Prerequisites...............................................6 1.3 Certified distributions..........................................8 1.4 Buy a subscription............................................8 1.5 Activate a subscription..........................................8 1.6 Install FusionDirectory..........................................9 1.7 Update FusionDirectory......................................... 23 1.8 Core................................................... 112 1.9 Configuration............................................... 135 1.10 ACLs................................................... 149 1.11 Plugins.................................................. 170 1.12 Templates................................................. 345 1.13 Triggers.................................................. 356 1.14 Faq.................................................... 360 1.15 Bug report................................................ 361 1.16 Release Policy.............................................. 363 1.17 License.................................................. 365 2 Schema2ldif 367 2.1 What is schema2ldif ?.......................................... 367 2.2 Prerequisites............................................... 367 2.3 Install Schema2ldif............................................ 367 2.4 ldap-schema-manager.........................................
    [Show full text]
  • Dgplug Summer Training Documentation Release 0.1 Kushal
    dgplug Summer Training Documentation Release 0.1 Kushal Das Jul 19, 2021 Contents 1 FAQ 3 1.1 What are the topics covered?.......................................4 1.2 How do I subscribe to the mailing list?.................................4 1.3 What are the requisites for the training?.................................4 1.4 How do I get the logs?..........................................4 1.5 How long does a session run?......................................4 1.6 How long is the summer training?....................................4 1.7 Will the session details be sent to the mailing list?...........................4 1.8 In case I miss a class, how do I catch up?................................4 1.9 Do we need to learn something beforehand for this training?......................4 1.10 How many sessions happen in a day?..................................5 1.11 Will the time be the same for all the sessions?..............................5 1.12 If I have to leave class early, should I announce it mid class?......................5 1.13 Is there any calendar available for the sessions?.............................5 1.14 How should I behave in the channel and during sessions?........................5 1.15 How can I make the most of this training?................................5 2 Before you start 7 2.1 How to ask for help?...........................................7 2.2 There is no magic mirror!........................................7 2.3 Learn touch typing............................................8 2.4 History of Free and Open Source Software...............................8 2.5 Download Tor browser..........................................8 3 Watch The Internet’s Own Boy9 4 Watch Coded Bias 11 5 Communication guidelines 13 5.1 Be nice to everyone........................................... 13 5.2 Do not assume pronouns of people..................................
    [Show full text]
  • Redes Libres - Sergio A
    Redes Libres - Sergio A. Alonso - Técnicas para armado de redes LAN utilizando Software Libre - 1/261 V0.86 beta for ever – 4 de marzo de 2011 Sergio A. Alonso Técnicas para armado de redes LAN, utilizando Software Libre sobre ambientes mixtos Redes Libres - Sergio A. Alonso - Técnicas para armado de redes LAN utilizando Software Libre - 2/261 Redes Libres Técnicas para armado de redes LAN utilizando Software Libre sobre ambientes mixtos Foto portada: http://www.emperor-penguin.com/empswim.html Licencia y derechos de uso del presente documento al final del documento ¡¡¡Ud podría estar leyendo una copia anterior de este documento!!! Chequee la versión en la carátula del libro, contra la última disponible en http://www.bunker.org.ar/incubadora/redes.pdf Permanentemente se escriben actualizaciones y correcciones en el sitio oficial. [ Copyleft 2011 Sergio A. Alonso ] [ E-mail / MSN: sergio (at) eim.esc.edu.ar ] [ Jabber: karancho (at) lugmen.org.ar ] [ www.eim.esc.edu.ar - Dto. Sistemas ] [ www.bunker.org.ar - Webmaster ] [ Hi, I am the root. If you see me laughing, ] [ you'd better have a backup ready. ] Redes Libres - Sergio A. Alonso - Técnicas para armado de redes LAN utilizando Software Libre - 3/261 Tabla de Contenidos Índice de contenido 1.Introducción...........................................................................................................................10 2.Breve Manual de Supervivencia para la Materia................................................................11 2.1.Licencia, Versiones y Contacto..................................................................................................11
    [Show full text]
  • Srain Documentation Release 1.3.0
    Srain Documentation Release 1.3.0 Shengyu Zhang Sep 21, 2021 Contents 1 All pages 3 1.1 Srain...................................................3 1.2 Quick Start................................................4 1.3 Installation................................................9 1.4 Commands Manual............................................ 14 1.5 Configuration Manual.......................................... 22 1.6 Development Specification........................................ 29 1.7 Miscellaneous.............................................. 30 1.8 Frequently Asked Questions....................................... 30 1.9 Change Log............................................... 34 1.10 Support Tables.............................................. 44 2 Indices and Tables 47 i ii Srain Documentation, Release 1.3.0 Welcome to Srain documentation! Latest version: 2021-09-23 Version 1.3.0. The source code of this documentation is hosted on GitHub. If you found any mistake, feel free to file issue or pull request. Contents 1 Srain Documentation, Release 1.3.0 2 Contents CHAPTER 1 All pages 1.1 Srain Modern IRC client written in GTK. Home| Documentation| Source code 3 Srain Documentation, Release 1.3.0 1.1.1 Packaging Status 1.1.2 Features • Fully open source • RFC {1459,2812} compatible • Partial IRCv3 support • Multi-platform support (Linux, Windows, macOS and BSD) • Act like modern IM client – Graphical user interface – Convenient connection panel – Interactive channel search – Forward message in one click – URL preview – Desktop notificaion – Special optimization for bridge/relay bot • Act like geek IRC client – Anything can be done via commands – Fine-grained configuration with hot update support – Regex based message render and filter mechanisms – IPC based plugin system (TODO) 1.1.3 Need Help? Frequently Asked Questions may be helpful. Feel free to contact us if you have any question about Srain. • IRC Channel: #srain @ Libera Chat • Github: file an issue Here 1.1.4 License GNU General Public License Version 3 1.2 Quick Start 4 Chapter 1.
    [Show full text]
  • A First Look at References from the Dark to Surface Web World
    A First Look at References from the Dark to Surface Web World MAHDIEH ZABIHIMAYVAN and DEREK DORAN, Wright State University Tor is one of the most well-known networks that protects the identity of both content providers and their clients against any tracking or tracing on the Internet. So far, most research aention has been focused on investigating the security and privacy concerns of Tor and characterizing the topic or hyperlink structure of its hidden services. However, there is still lack of knowledge about the information leakage aributed to the linking from Tor hidden services to the surface Web. is work addresses this gap by presenting a broad evaluation of the network of referencing from Tor to surface Web and investigates to what extent Tor hidden services are vulnerable against this type of information leakage. e analyses also consider how linking to surface websites can change the overall hyperlink structure of Tor hidden services. ey also provide reports regarding the type of information and services provided by Tor domains. Results recover the dark-to-surface network as a single massive connected component where over 90% of Tor hidden services have at least one link to the surface world despite their interest in being isolated from surface Web tracking. We identify that Tor directories have closest proximity to all other Web resources and signicantly contribute to both communication and information dissemination through the network which emphasizes on the main application of Tor as information provider to the public. Our study is the product of crawling near 2 million pages from 23,145 onion seed addresses, over a three-month period.
    [Show full text]