2011-01-26 15:00:40 +00:00
|
|
|
.TH tomb 1 "January 25, 2011" "tomb"
|
|
|
|
|
|
|
|
.SH NAME
|
|
|
|
Tomb \- the Crypto Undertaker
|
|
|
|
|
|
|
|
.SH SYNOPSIS
|
2011-01-26 15:16:50 +00:00
|
|
|
.B
|
|
|
|
.IP "tomb [options] command [file] [mountpoint]"
|
|
|
|
.B
|
|
|
|
.IP "tomb-open [file]"
|
|
|
|
.B
|
|
|
|
.IP "tomb-status mountpoint"
|
|
|
|
.B
|
|
|
|
.IP "tomb-askpass [file]"
|
2011-01-26 15:00:40 +00:00
|
|
|
|
|
|
|
.SH DESCRIPTION
|
|
|
|
|
|
|
|
Tomb is a simple commandline tool for encrypted storage and it comes
|
|
|
|
complete with programs to facilitate its operation by desktop users.
|
|
|
|
|
|
|
|
Tomb generates encrypted storage files to be opened and closed using
|
2011-01-26 15:16:50 +00:00
|
|
|
their associated keyfiles, which are also protected with a password
|
2011-01-28 11:26:35 +00:00
|
|
|
chosen by the user.
|
2011-01-26 15:00:40 +00:00
|
|
|
|
2011-01-26 15:16:50 +00:00
|
|
|
A tomb is like a locked folder that can be safely transported and
|
|
|
|
hidden in a filesystem; its keys can be kept separate, for instance
|
|
|
|
keeping the tomb file on your computer harddisk and the key files on a
|
|
|
|
USB stick.
|
2011-01-26 15:00:40 +00:00
|
|
|
|
2011-01-26 15:16:50 +00:00
|
|
|
When specified, \fIfile\fR is the name of the tomb to be created or
|
|
|
|
opened, while \fImountpoint\fR is an existing directory where its
|
|
|
|
contents should be made accessible.
|
2011-01-26 15:00:40 +00:00
|
|
|
|
2011-01-26 15:16:50 +00:00
|
|
|
For simplified use, the command \fItomb-open\fR can be used to start a
|
|
|
|
wizard that guides users in the creation of a new tomb or, if the
|
|
|
|
\fIfile\fR argument is specified, to open a tomb and make it
|
|
|
|
accessible in a default location under the /media folder.
|
|
|
|
|
|
|
|
The other commands \fItomb-status\fR and \fItomb-askpass\fR are mostly
|
|
|
|
for internal use (they are called by tomb with the right arguments)
|
|
|
|
and serve the purpose of communicating with the user via the graphical
|
|
|
|
interface.
|
|
|
|
|
|
|
|
The auxiliary programs \fI
|
|
|
|
|
|
|
|
|
|
|
|
.SH COMMANDS
|
2011-01-26 15:00:40 +00:00
|
|
|
.B
|
2011-01-26 15:16:50 +00:00
|
|
|
.IP "create"
|
|
|
|
Create a new encrypted storage \fIfile\fR and its keys
|
|
|
|
.B
|
|
|
|
.IP "open"
|
|
|
|
Opens an existing tomb \fIfile\fR. The \fImountpoint\fR where the tomb
|
|
|
|
will be made accessible can be specified, if not the default is to
|
|
|
|
create a directory named like the tomb inside /media.
|
|
|
|
.B
|
|
|
|
.IP "close"
|
|
|
|
Closes a currently open tomb. When \fIfile\fR is specified, it should
|
|
|
|
point to the /dev/mapper name used to mount the tomb; if \fIfile\fR is
|
|
|
|
not specified and only one tomb is open, then it will be closed; if
|
|
|
|
multiple tombs are open, the command will list them on the terminal.
|
2011-01-26 15:00:40 +00:00
|
|
|
|
2011-01-26 15:16:50 +00:00
|
|
|
.SH OPTIONS
|
|
|
|
.B
|
2011-01-26 15:00:40 +00:00
|
|
|
.B
|
|
|
|
.IP "-s \fI<MBytes>\fR"
|
|
|
|
When creating a tomb, this option must be used to specify the size of
|
|
|
|
the new \fIfile\fR to be created, in megabytes.
|
|
|
|
.B
|
|
|
|
.IP "-k \fI<keyfile>\fR"
|
|
|
|
When opening a tomb, this option can be used to specify the location
|
|
|
|
of the key to use. Keys are created with the same name of the tomb
|
|
|
|
file adding a '.gpg' suffix, but can be later renamed and transported
|
|
|
|
on other media. When a key is not found, the program asks to insert a
|
|
|
|
USB storage device and it will look for the key file inside it.
|
|
|
|
.B
|
|
|
|
.IP "-S"
|
|
|
|
The tomb commandline tool needs to acquire super user rights (to
|
|
|
|
become root) for most of its operations. When used, this option will
|
|
|
|
tell the tomb program to use 'sudo' or 'gksu' to ask the user for the
|
|
|
|
password or use the one already in cache.
|
|
|
|
.B
|
|
|
|
.IP "-h"
|
|
|
|
Display a help text and quit
|
|
|
|
.B
|
|
|
|
.IP "-v"
|
|
|
|
Display version and quit
|
|
|
|
|
|
|
|
|
|
|
|
.SH BUGS
|
2011-01-26 15:16:50 +00:00
|
|
|
Please report bugs on the tracker at http://bugs.dyne.org
|
2011-01-26 15:00:40 +00:00
|
|
|
|
|
|
|
Get in touch with developers via mail using this web page
|
|
|
|
http://dyne.org/contact or via chat on http://irc.dyne.org
|
|
|
|
|
|
|
|
.SH AUTHORS
|
|
|
|
|
|
|
|
.SH COPYING
|
|
|
|
|
|
|
|
This manual is Copyleft (c) 2011 Denis Roio <\fIjaromil@dyne.org\fR>
|
|
|
|
|
|
|
|
Permission is granted to copy, distribute and/or modify this manual
|
|
|
|
under the terms of the GNU Free Documentation License, Version 1.1 or
|
|
|
|
any later version published by the Free Software Foundation.
|
|
|
|
Permission is granted to make and distribute verbatim copies of this
|
|
|
|
manual page provided the above copyright notice and this permission
|
|
|
|
notice are preserved on all copies.
|
|
|
|
|
|
|
|
.SH AVAILABILITY
|
|
|
|
|
|
|
|
The most recent version of Tomb sourcecode and up to date
|
|
|
|
documentation should be available for download from
|
|
|
|
\fIhttp://tomb.dyne.org\fR.
|
|
|
|
|
|
|
|
.SH SEE ALSO
|
|
|
|
|
|
|
|
.B
|
|
|
|
.IP cryptsetup(8)
|
|
|
|
|
|
|
|
GnuPG website on http://www.gnupg.org
|
|
|
|
|
|
|
|
DM-Crypt website on http://www.saout.de/misc/dm-crypt
|
|
|
|
|
|
|
|
LUKS website, http://code.google.com/p/cryptsetup
|