2013-06-20 10:46:20 +00:00
.TH tomb 1 "June 20, 2013" "tomb"
2011-01-26 15:00:40 +00:00
.SH NAME
Tomb \- the Crypto Undertaker
.SH SYNOPSIS
2011-01-26 15:16:50 +00:00
.B
2011-02-12 16:54:53 +00:00
.IP "tomb [options] command [arguments]"
2011-01-26 15:00:40 +00:00
.SH DESCRIPTION
2011-02-06 16:04:52 +00:00
Tomb is an application to manage the creation and access of encrypted
2011-03-03 16:04:52 +00:00
storage files: it can be operated from commandline and it can
integrate with a user's graphical desktop.
2011-01-26 15:00:40 +00:00
2011-03-03 16:04:52 +00:00
Tomb generates encrypted storage files to be opened and closed using
their associated keys, which are also protected with a password chosen
by the user. To create, open and close tombs a user will need super
user rights to execute the tomb commandline utility.
2011-01-26 15:00:40 +00:00
2011-02-06 16:04:52 +00:00
A tomb is like a locked folder that can be safely transported and
hidden in a filesystem; it encourages users to keep their keys
separate from tombs, for instance keeping a tomb file on your computer
harddisk and its key file on a USB stick.
2011-01-26 15:00:40 +00:00
2011-01-26 15:16:50 +00:00
.SH COMMANDS
2011-02-12 16:54:53 +00:00
2011-01-26 15:00:40 +00:00
.B
2013-03-25 11:02:56 +00:00
.IP "dig"
Generates a file that can be used as a tomb and will occupy as much
space as its desired initial size, the unlocked \fI .tomb\fR file can
2014-01-12 22:39:59 +00:00
then be locked using a \fI key\fR . It takes a mandatory \fI -s\fR option which is
the size in megabytes (MiB). Tombs are digged using
2013-06-20 10:46:20 +00:00
low-quality random data (/dev/urandom).
2013-03-25 11:02:56 +00:00
.B
.IP "forge"
Creates a new \fI key\fR and prompts the user for a \fI password\fR to
protect its usage. This operation requires high quality random data
2013-06-20 10:46:20 +00:00
(/dev/random) which can take quite some time to be gathered on a
2013-03-25 11:02:56 +00:00
server: it works better on a desktop where the mouse can be moved
2013-06-20 10:46:20 +00:00
around for entropy. The default cipher to protect the key is AES256, a
custom one can be specified using the \fI -o\fR option, for a list of
supported ciphers use \fI -v\fR . For additional protection against
dictionary attacks on keys, the (experimental) \fI --kdf\fR option can
be used when forging a key, making sure that the \fI tomb-kdb-pbkdf2\fR
binaries in \fI extras/kdf\fR were compiled and installed on the
system.
2013-03-25 11:02:56 +00:00
.B
.IP "lock"
Initializes and locks an empty tomb (made with \fI dig\fR ) using a key
(made with \fI forge\fR ), making it ready for usage. After this
operation, the tomb can only be open in possession of the key and
2013-06-12 12:10:27 +00:00
knowing its password. As in any other command requiring a key, the
2014-01-12 22:32:23 +00:00
option \fI -k\fR should be used to specify a key file. The \fI -o\fR
option can be used to specify the cipher specification: default is
"aes-xts-plain64:sha256", old versions of Tomb used "aes-cbc-essiv:sha256".
This operation requires root privileges to loopback mount, format the tomb (using
2013-06-12 12:10:27 +00:00
LUKS and Ext4), then set the key in its first LUKS slot.
2011-02-12 16:54:53 +00:00
2011-01-26 15:16:50 +00:00
.B
.IP "open"
2013-06-12 12:10:27 +00:00
Opens an existing \fI .tomb\fR (first argument) using a key (\fI -k\fR ),
if a second argument is given it will indicate the \fI mountpoint\fR
where the tomb should be made accessible, else the tomb is mounted in
a directory inside /media. The option \fI -o\fR can be used to pass
mount(8) options (default: rw,noatime,nodev).
2011-02-12 16:54:53 +00:00
2011-05-09 08:32:08 +00:00
.B
.IP "list"
List all the tombs found open, including information about the time
2013-03-30 16:29:51 +00:00
they were opened and the hooks that they mounted. If the first
argument is present, then shows only the tomb named that way or
2014-06-09 10:22:33 +00:00
returns an error if its not found. If the option
\fI --get-mountpoint\fR is used then print a simple list of currently
open tomb mountpoint paths.
2011-05-09 08:32:08 +00:00
2013-03-30 16:29:51 +00:00
.B
.IP "index"
2013-06-12 11:43:20 +00:00
Creates or updates the search indexes of all tombs currently
2013-04-23 13:45:31 +00:00
open: enables use of the \fI search\fR command using simple word
2013-06-12 11:43:20 +00:00
patterns on file names. Indexes are created using mlocate updatedb(8) and
stored in a file inside the tomb's root. To avoid indexing
2013-04-23 13:45:31 +00:00
a specific tomb simply touch a \fI .noindex\fR file in its root.
2013-03-30 16:29:51 +00:00
.B
.IP "search"
Searches through all tombs currently open for filenames matching one
or more text patterns given as arguments. Search returns a list of
2013-04-23 13:45:31 +00:00
files found in all open tombs on which the \fI index\fR command was run
2013-06-12 12:10:27 +00:00
at least once.
2013-03-30 16:29:51 +00:00
2011-01-26 15:16:50 +00:00
.B
.IP "close"
2013-03-25 11:02:56 +00:00
Closes a currently open tomb. If more tombs are open, the first
argument should be used to specify the name of the tomb to be closed,
or \fI all\fR to close all currently open tombs. This command fails if
the tomb is in use by running processes (to force close, see
\fI slam\fR below).
.B
.IP "slam"
Closes a tomb like the command \fI close\fR does, but it doesn't fails
even if the tomb is in use by other application processes: it looks
for them and violently kills \- 9 each of them. This command may
provoke unsaved data loss, but assists users to face surprise
situations.
2011-04-27 21:19:06 +00:00
2011-11-03 14:13:49 +00:00
.B
.IP "passwd"
2013-06-20 10:46:20 +00:00
Changes the password protecting a key file specified using
2013-06-12 12:10:27 +00:00
\fI -k\fR . The user will need to know the key's current password, then
2013-03-25 11:02:56 +00:00
its content will be decoded and reencoded using the new one. This
2013-06-12 12:10:27 +00:00
action can't be forced if the current password is not known. If the
key file is broken (missing headers) this function also attempts its
recovery.
2013-03-25 11:02:56 +00:00
2013-06-20 10:46:20 +00:00
.B
.IP "setkey"
Changes the key file that locks a tomb, substituting the old one with
a new one. Both the old and the new key files are needed for this
operation and their passwords must be known. The new key must be
specified using the \fI -k\fR option, the first argument should be the old
key and the second and last argument the tomb file.
2011-11-03 14:13:49 +00:00
2012-01-17 11:36:41 +00:00
.B
.IP "resize"
2013-03-25 11:02:56 +00:00
Increase the size of a tomb file to the amount specified by the
2014-01-12 22:39:59 +00:00
\fI -s\fR option, which is the new size in megabytes (MiB). Full access to the tomb using
2013-06-12 12:10:27 +00:00
a key (\fI -k\fR ) and its password is requires. Tombs can only grow and
can never be made smaller. This command makes use of the cryptsetup
resize feature and the resize2fs command: its much more practical than
creating a new tomb and moving everything into it.
2012-01-17 11:36:41 +00:00
2013-06-20 10:46:20 +00:00
.B
.IP "engrave"
This command transforms a tomb key into an image that can be printed
on paper and phisically stored as backup, i.e. hidden in a book. It
Renders a QRCode of the tomb key, still protected by its password: a
PNG image (extension \fI .qr.png\fR ) will be created in the current
directory and can be later printed (fits an A4 or Letter format). To
recover an engraved key one can use any QRCode reader on a smartphone:
save it into a file and then use that file as a key (\fI -k\fR ).
2011-02-12 16:54:53 +00:00
.B
.IP "bury"
2013-06-12 12:10:27 +00:00
Hides a tomb key (\fI -k\fR ) inside a \fI jpeg image\fR (first argument)
using \fI steganography\fR : the image will change in a way that cannot
be noticed by human eye and hardly detected by data analysis. This
option is useful to backup tomb keys in unsuspected places; it depends
from the availability of \fI steghide\fR .
2011-02-12 16:54:53 +00:00
.B
.IP "exhume"
2013-03-25 11:02:56 +00:00
This command recovers from jpeg images the keys that were previously
hidden into them using \fI bury\fR . Exhume requires a key filename
2013-06-12 12:10:27 +00:00
(\fI -k\fR ) and a \fI jpeg image\fR file (first argument) known to be
containing a key. If the right key password is given, the key will be
exhumed. If the password is not known, it is very hard to verify if a
key is buried in any image or not.
2011-01-26 15:00:40 +00:00
2011-01-26 15:16:50 +00:00
.SH OPTIONS
.B
2011-01-26 15:00:40 +00:00
.B
.IP "-s \fI<MBytes>\fR"
2013-03-25 11:02:56 +00:00
When digging or resizing a tomb, this option must be used to specify
2013-05-27 19:22:24 +00:00
the \fI size\fR of the new file to be created. Units are megabytes (MiB).
2011-01-26 15:00:40 +00:00
.B
.IP "-k \fI<keyfile>\fR"
2013-03-25 11:02:56 +00:00
When opening a tomb, this option can specify the location of the key
file to use. Keys are created with the same name of the tomb file
adding a '.key' suffix, but can be later renamed and transported on
other media. If \fI <keyfile>\fR is "-" (dash), it will read it from
stdin.
2012-08-04 16:34:10 +00:00
.B
2014-06-09 10:22:33 +00:00
.IP "--kdf \fI<iterations>\fR"
2013-06-20 10:46:20 +00:00
Activate the KDF feature against dictionary attacks when creating a
2014-06-09 10:22:33 +00:00
key: forces a delay of \fI <iterations>\fR (integer multiplied by 10k)
every time this key is used.
2011-01-26 15:00:40 +00:00
.B
2011-02-20 13:59:30 +00:00
.IP "-n"
Skip processing of post-hooks and bind-hooks if found inside the tomb.
See the \fI HOOKS\fR section in this manual for more information.
2011-05-24 10:04:18 +00:00
.B
.IP "-o"
Manually specify mount options to be used when opening a tomb instead
2014-06-09 10:22:33 +00:00
of the default \fI rw,noatime,nodev\fR , i.e. to mount a tomb read-only
(ro) to prevent any modification of its data. Can also be used to
change the symmetric encryption algorithm for keys during \fI forge\fR
operations (default \fI AES256\fR ) or the LUKS encryption method during
\fI lock\fR operations (default \fI aes-xts-plain64:sha256\fR ).
2011-08-31 15:07:18 +00:00
.B
2012-01-17 18:01:20 +00:00
.IP "-f"
Force flag, currently used to override swap checks, might be
overriding more wimpy behaviours in future, but make sure you know
2014-06-09 10:22:33 +00:00
what you are doing if you force an operation.
2011-02-20 13:59:30 +00:00
.B
2011-01-26 15:00:40 +00:00
.IP "-h"
2014-06-09 10:22:33 +00:00
Display a help text and quit.
2011-01-26 15:00:40 +00:00
.B
.IP "-v"
2014-06-09 10:22:33 +00:00
Display version and quit.
2011-02-03 21:20:30 +00:00
.B
.IP "-q"
Run more quietly
2011-10-31 22:34:21 +00:00
.B
2011-02-06 16:04:52 +00:00
.IP "-D"
2011-02-10 14:32:23 +00:00
Print more information while running, for debugging purposes
2014-06-09 10:22:33 +00:00
.SH DEV MODE
2011-10-31 22:34:21 +00:00
.B
.IP "--no-color"
2014-06-09 10:22:33 +00:00
Suppress colors in console output (needed for string parsing by
wrappers).
.B
.IP "--unsecure-dev-mode"
Enable using dev-mode arguments, i.e. to pass passwords from
commandline options. This is mostly used needed for execution by
wrappers and testing suite.
.B
.IP "--use-urandom"
Use an inferior quality random source to improve the speed of key
generation at the cost of security (neede for the testing suite).
.B
.IP "--sudo-pwd <string>"
Use string as password when needed for privilege escalation via sudo.
.B
.IP "--tomb-pwd <string>"
Use string as password when needed on tomb.
.B
.IP "--tomb-old-pwd <string>"
Use string as old password when needed in tomb commands requiring
multiple keys, like \fI passwd\fR or \fI setkey\fR .
.B
.IP "-U --uid"
Switch to this user ID when dropping privileges.
.B
.IP "-G --gid"
Switch to this group ID when dropping privileges.
.B
.IP "-T --tty"
Switch to this TTY terminal when dropping privileges.
2011-08-31 15:07:18 +00:00
2011-02-24 11:26:48 +00:00
.SH HOOKS
Hooks are special files that can be placed inside the tomb and trigger
actions when it is opened and closed; there are two kinds of such
files: \fI bind-hooks\fR and \fI post-hooks\fR can be placed in the
base root of the tomb.
.B
.IP "bind-hooks"
This hook file consists of a simple two column list of files or
directories inside the tomb to be made directly accessible inside the
2011-02-24 23:10:09 +00:00
current user's home directory. Tomb will use the "mount \- o bind"
2011-02-24 11:26:48 +00:00
command to bind locations inside the tomb to locations found in $HOME
so in the first column are indicated paths relative to the tomb and in
the second column are indicated paths relative to $HOME contents, for
example:
2013-03-25 11:02:56 +00:00
.EX
2011-02-24 11:26:48 +00:00
mail mail
.gnupg .gnupg
.fmrc .fetchmailrc
.mozilla .mozilla
2013-03-25 11:02:56 +00:00
.EE
2011-02-24 11:26:48 +00:00
.B
.IP "post-hooks"
This hook file gets executed as user by tomb right after opening it;
2013-09-19 13:37:21 +00:00
it should be a regular shell script, starting with a shell bang. Tomb
executes this hook as user (dropping root priviledges) and giving it
two arguments: "$1" is "open" or "close" depending from the tomb
command given, "$2" is the full path to the mountpoint where the tomb
is open.
2011-02-24 11:26:48 +00:00
2011-02-03 21:20:30 +00:00
.SH PRIVILEGE ESCALATION
The tomb commandline tool needs to acquire super user rights to
2011-02-24 11:26:48 +00:00
execute most of its operations: to do so it uses sudo(8), while
2013-05-25 14:29:19 +00:00
pinentry(1) is adopted to collect passwords from the user. Tomb
executes as super user only when required.
2011-02-03 21:20:30 +00:00
2013-05-25 14:29:19 +00:00
To be made available on multi user systems, the superuser execution of
the tomb script can be authorized for users without jeopardizing the
whole system's security: just add such a line to \fI /etc/sudoers\fR :
.EX
username ALL=NOPASSWD: /usr/local/bin/tomb
.EE
2011-01-26 15:00:40 +00:00
2014-10-23 23:35:29 +00:00
Password input is handled by the pinentry program: it can be text
based or graphical and is usually configured with a symlink. When
using Tomb in X11 it is better to use a graphical pinentry-gtk2 or
pinentry-qt because it helps preventing keylogging by other X
clients. When using it from a remote ssh connection it might be
necessary to force use of pinentry-curses for instance by unsetting
the DISPLAY environment var.
2011-08-31 15:07:18 +00:00
.SH SWAP
2013-05-25 14:29:19 +00:00
On execution of certain commands Tomb will complain about swap memory
on disk when that is presend and \fI abort if your system has swap
activated\fR . You can disable this behaviour using the
\fI --force\fR . Before doing that, however, you may be interested in
knowing the risks of doing so:
2011-08-31 15:07:18 +00:00
.IP \(bu
2012-01-17 13:00:20 +00:00
During such operations a lack of available memory could cause the swap
to write your secret key on the disk.
2011-08-31 15:07:18 +00:00
.IP \(bu
2012-01-17 13:00:20 +00:00
Even while using an opened tomb, another application could occupy too
much memory so that the swap needs to be used, this way it is possible
that some contents of files contained into the tomb are physically
written on your disk, not encrypted.
2011-08-31 15:07:18 +00:00
.P
2012-01-17 13:00:20 +00:00
If you don't need swap, execute \fI swapoff -a\fR . If you really need
2013-05-25 14:29:19 +00:00
it, you could make an encrypted swap partition. Tomb doesn't detect if
your swap is encrypted, and will complain anyway.
2011-08-31 15:07:18 +00:00
2013-03-25 11:02:56 +00:00
.SH EXAMPLES
2013-05-25 14:29:19 +00:00
.IP \(bu
Create a 128MB large "secret" tomb and its keys, then open it:
2013-03-25 11:02:56 +00:00
.EX
2013-05-20 11:17:48 +00:00
tomb dig -s 128 secret.tomb
2013-06-12 12:28:40 +00:00
2013-05-20 11:17:48 +00:00
tomb forge secret.tomb.key
2013-06-12 12:28:40 +00:00
2013-06-12 12:10:27 +00:00
tomb lock secret.tomb -k secret.tomb.key
2013-06-12 12:28:40 +00:00
2013-05-20 11:17:48 +00:00
tomb open secret.tomb -k secret.tomb.key
2013-03-25 11:02:56 +00:00
.EE
2013-05-25 14:29:19 +00:00
2013-06-12 12:10:27 +00:00
.IP \(bu
Open a Tomb using the key from a remote SSH shell, without saving any
local copy of it:
.EX
ssh user@my.shell.net 'cat .secrets/tomb.key' | tomb open secret.tomb -k -
.EE
2013-05-25 14:29:19 +00:00
.IP \(bu
Create a bind hook that places your GnuPG folder inside the tomb, but
makes it reachable from the standard $HOME/.gnupg location every time
the tomb will be opened:
.EX
2013-06-12 12:28:40 +00:00
tomb open GPG.tomb -k GPG.tomb.key
2013-05-25 14:29:19 +00:00
echo ".gnupg .gnupg" > /media/GPG.tomb/bind-hooks
mv ~/.gnupg /media/GPG.tomb/.gnupg && mkdir ~/.gnupg
2013-06-12 12:28:40 +00:00
tomb close GPG && tomb open GPG.tomb -k GPG.tomb.key
2013-05-25 14:29:19 +00:00
.EE
.IP \(bu
2013-09-19 13:37:21 +00:00
Script a tomb to launch the Firefox browser every time is opened,
keeping all its profile data inside it:
2013-05-25 14:29:19 +00:00
.EX
2013-06-12 12:28:40 +00:00
tomb open FOX.tomb -k FOX.tomb.key
2013-09-19 13:37:21 +00:00
cat <<EOF > /media/FOX.tomb/post-hooks
#!/bin/sh
if [ "$1" = "open" ]; then
firefox -no-remote -profile "$2"/firefox-pro &
fi
EOF
2013-05-25 14:29:19 +00:00
chmod +x /media/FOX.tomb/post-hooks
2013-09-19 13:37:21 +00:00
.EE
2013-06-12 12:28:40 +00:00
2013-09-19 13:37:21 +00:00
.IP \(bu
Script a tomb to archive Pictures using Shotwell, launching it on open:
2013-06-12 12:28:40 +00:00
2013-09-19 13:37:21 +00:00
.EX
tomb open Pictures.tomb -k Pictures.tomb.key
cat <<EOF > /media/Pictures.tomb/bind-hooks
Pictures Pictures
EOF
cat <<EOF > /media/Pictures.tomb/post-hooks
#!/bin/sh
if [ "$1" = "open" ]; then
which shotwell > /dev/null
if [ "$?" = "0" ]; then
shotwell -d "$2"/Pictures/.shotwell &
fi
2013-05-25 14:29:19 +00:00
fi
EOF
2013-09-19 13:37:21 +00:00
chmod +x /media/Pictures.tomb/post-hooks
2013-05-25 14:29:19 +00:00
.EE
2011-01-26 15:00:40 +00:00
.SH BUGS
2011-08-31 15:15:23 +00:00
Please report bugs on the tracker at
2013-05-25 14:29:19 +00:00
.UR https://bugs.dyne.org
2011-08-31 15:15:23 +00:00
.UE
2013-06-12 12:28:40 +00:00
Get in touch with developers via mail by subscribing the "crypto" mailinglist on \fI http://lists.dyne.org\fR or via the #dyne chat channel on \fI https://irc.dyne.org\fR .
2011-01-26 15:00:40 +00:00
.SH AUTHORS
2013-05-25 14:29:19 +00:00
Tomb is designed, written and maintained by Denis Roio aka Jaromil.
2011-02-03 21:20:30 +00:00
2013-05-25 14:29:19 +00:00
Tomb includes code by Anathema, Boyska and Hellekin O. Wolf.
2011-09-27 10:16:19 +00:00
2011-02-03 21:20:30 +00:00
Tomb's artwork is contributed by Jordi aka Mon Mort
2013-05-25 14:29:19 +00:00
Testing and reviews are contributed by Dreamer, Shining, Mancausoft,
Asbesto Molesto and Nignux.
2011-02-03 21:20:30 +00:00
2013-05-25 14:29:19 +00:00
Cryptsetup was developed by Christophe Saout and Clemens Fruhwirth
2011-02-03 21:20:30 +00:00
2011-01-26 15:00:40 +00:00
.SH COPYING
2013-05-25 14:29:19 +00:00
This manual is Copyright (c) 2011-2013 by Denis Roio <\fI jaromil@dyne.org\fR >
2011-01-26 15:00:40 +00:00
2013-05-25 14:29:19 +00:00
This manual includes contributions by Boyska.
2011-09-27 10:16:19 +00:00
2011-01-26 15:00:40 +00:00
Permission is granted to copy, distribute and/or modify this manual
under the terms of the GNU Free Documentation License, Version 1.1 or
any later version published by the Free Software Foundation.
Permission is granted to make and distribute verbatim copies of this
manual page provided the above copyright notice and this permission
notice are preserved on all copies.
.SH AVAILABILITY
2011-02-06 16:04:52 +00:00
The most recent version of Tomb sourcecode and up to date
documentation is available for download from its website on
2011-01-26 15:00:40 +00:00
\fI http://tomb.dyne.org\fR .
.SH SEE ALSO
.B
.IP cryptsetup(8)
GnuPG website on http://www.gnupg.org
DM-Crypt website on http://www.saout.de/misc/dm-crypt
LUKS website, http://code.google.com/p/cryptsetup