Introduction
This chapter describes how to configure &TCD; to provide some
Internet services through the telephone line. In this chapter,
the computer holding the Internet services is named the
server
and the computer that want to make use
of such services is named the client
. We assume
that both server and client computers have been installed with
&TCD; (release 5.5).
In this configuration, both client and server computers use
modems to transmit data in form of sound through the telephone
lines system. The dial-up connection described in this chapter
could be a choise when the only communication medium you have
access to is the telephone lines system.
This configuration emerged from the need of sharing
information with my friends in a country where Internet access
is limitted to statal organizations and controlled there with
an increasing crazy obsession. However, in this environment,
the telephone lines system provides an alternative platform to
interchange information in a point-to-point fashion. It can be
used to create small social groups and organize ideas safetly
(e.g., by using TLS to encrypt connections). To be more
specific, the goal would be to provide public access to an
Internet Service Provider (ISP) where people can express
themselves freely (e.g., through a mailing list with open
subscriptions).
Even this configuration tries to reduce the lack of
communication, there are limitations around it that we cannot
take away, yet. The following list shows what these
limitations are:
Only one connection (of 15 minutes) is possible at a time.
More than 3 consecutive connections from the same phone number
in a time range of 60 minutes means that that number is
attacking the ISP to provoke a Denying of Service
(DoS)
attach. In such cases the phone number
originating the call will be permantly banished from
realizing further calls to the ISP. Fourtunly, such controls
can be automated so I hope they achieve an acceptable degree
of efficiency.
The ISP is isolated from Internet, so it is not possible to
provide Internet access through the ISP.
The information generated inside the ISP is jailed to it. This
way, it will be available to people registered inside the ISP
only (e.g., through the web internface).
The implementation of services that required persistent
connections (e.g., chats) will not
be considered as a practical offer. Instead, only
asynchronous services (e.g.,
e-mail) will be supported. This
restriction is required to reduce the connection effective
times. For example, consider an environment where you connect
the ISP to send/receive e-mails only and then disconnect. In
fact, to force this behaivour the ISP will be configured to
close connections after 15 minutes passed the connection
establishment.
Your user profile will be removed from ISP when no effective
point-to-point connection is established by you in a period of
7 days since the last effective point-to-point connection you
established to the ISP. When your user profile is removed, you
will need to register yourself again inside the ISP, to access
its services.
I'm very sorry about these limitations, but this is the best I
can offer with one PC, one modem, and one single telephone
line. If you think this configuration can be improved somehow,
please send me an e-mail to al@example.com.
Notice that, for any mail to reach me, you should be
registered inside the ISP first; I don't answer phone calls
personally, the phone is very busy answering point-to-point
connections ;).
In order for you to share information with others, it is
required that both you and the person you want to share
information with, have an e-mail address registered inside
ISP. This registration process is realized through a secured
web interface accessable through an encrypted connection as
the following url illustrates:
The web interface should permit everyone to update or delete
their personal profiles without compromising personal
information. Notice that all actions realized through this web
interface must be simple enough to be achieved in less than 15
minutes (the time the point-to-point connection reamins active
from its first establishment on).
User information is stored inside an LDAP server. The web
application manipulates LDAP records and all related files
inside the operating system that make possible a user to
establish a poit-to-point connection to the ISP, as well as
register, update or delate its profile inside the ISP. Care
should be taken to prevent one user to modify/delete profiles
from other users. The user's profile administration is
individual to each user based on its identity. Notice that,
all related subsystems (e.g., Postix, Cyrus-Imapd and
Saslauthd) must use the user information from LDAP server.
Likewise, the mailbox administration must be automated based
on the users in the LDAP server. The web application must be
able to be aware of all files related inside the
infrastructure in a way that administration tasks can be
automated and presented friendly to end users (this will
required the web application to run some program that needs
root privileges =:-|). The whole proces would be, establish a
point-to-point connection to the ISP, register a new user
through the web application and start using the e-mail client
with your new address. The LDAP server will be available for
everyone to consult from their mail clients. Inside the web
application, verifications must be included to avoid
duplicated values, invalid characters and similar stuff.
In case some kind of force intend to confiscate me the
computer where the ISP is installed in, I am plaing to encrypt
the whole filesystem in a way that it would be very difficult
to get any valid data from it. The encryption feature is
applied before the operating system starts. In this
configuration a password is required to decrypt the operating
system filesystem in order to be able of booting up the
operating system as expected. If the password is not provided,
the only thing you get is a prompt to enter a password :).
Another important matter to be aware of is about the ISP's
policy. In order to keep freedom, it is required to define
the boundaries of that freedom so you can determine and judge
it. Absolute freedom (anarchism) will not be permitted (it
would end up in total destruction) and communism will be
avoided (it would suppress the natural freedom of human
beings). So a middle point will be used. For example, if you
think you have the freedom to abuse the ISP I provide (e.g.,
by spamming it, or by provoking denying of service attaks) you
probably have it, but consider that I am free to banish you
immediatly for trying to destroy my work. On the other hand,
if you show yourself to be an educated person with solid ideas
and reasons to share, you'll be totaly welcome to stay. The
general idea behind this work is improving Cuban communication
to make ourselves better persons, understand our nature and
environment either social, economical or polital.