mirror of
https://github.com/Llewellynvdm/Tomb.git
synced 2024-11-05 04:47:56 +00:00
documentation updates for release
also updated authors information
This commit is contained in:
parent
040b3fe3bb
commit
30c862e36f
7
AUTHORS
7
AUTHORS
@ -1,9 +1,10 @@
|
|||||||
|
|
||||||
Tomb is designed and written by Denis Roio aka Jaromil.
|
Tomb is designed and written by Denis Roio aka Jaromil.
|
||||||
|
|
||||||
|
Tomb includes code by Anathema and Boyska.
|
||||||
|
|
||||||
Tomb's artwork is contributed by Jordi aka Mon Mort
|
Tomb's artwork is contributed by Jordi aka Mon Mort
|
||||||
|
|
||||||
Testing and fixes are contributed by Dreamer, Hellekin O. Wolf,
|
Testing and reviews are contributed by Hellekin O. Wolf, Dreamer,
|
||||||
Shining, Mancausoft, Asbesto, Anathema, Boyska and Nignux.
|
Shining, Mancausoft, Asbesto Molesto.
|
||||||
|
|
||||||
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
||||||
|
3
README
3
README
@ -53,7 +53,8 @@ encrypt the Home directory of users.
|
|||||||
As such, it uses well tested and reviewed routines and its shell code
|
As such, it uses well tested and reviewed routines and its shell code
|
||||||
is pretty readable. The name transition from 'mknest' to 'tomb' is
|
is pretty readable. The name transition from 'mknest' to 'tomb' is
|
||||||
marked by the adaptation of mknest to work on the Debian operating
|
marked by the adaptation of mknest to work on the Debian operating
|
||||||
system, used by its author in the past 3 years.
|
system and it has been used in production environments for the past 4
|
||||||
|
years.
|
||||||
|
|
||||||
** How can you help
|
** How can you help
|
||||||
|
|
||||||
|
15
TODO.org
15
TODO.org
@ -3,6 +3,10 @@ TODO and Roadmap for Tomb
|
|||||||
|
|
||||||
you are welcome to send patches to jaromil@dyne.org
|
you are welcome to send patches to jaromil@dyne.org
|
||||||
|
|
||||||
|
Issue tracking is now handled via GitHub, see http://github.com/dyne/Tomb
|
||||||
|
|
||||||
|
Old roadmap notes:
|
||||||
|
|
||||||
* DONE Release 1.0 :100%:
|
* DONE Release 1.0 :100%:
|
||||||
|
|
||||||
** TODO [#C] make one single status handle more tombs
|
** TODO [#C] make one single status handle more tombs
|
||||||
@ -48,20 +52,15 @@ you are welcome to send patches to jaromil@dyne.org
|
|||||||
|
|
||||||
** DONE [#A] desktop integration the freedesktop way :jaromil:
|
** DONE [#A] desktop integration the freedesktop way :jaromil:
|
||||||
** DONE [#B] debian packaging with desktop integration :jaromil:
|
** DONE [#B] debian packaging with desktop integration :jaromil:
|
||||||
|
** DONE [#A] Avoid overwriting key on exhume on same filename
|
||||||
|
** DONE [#A] Should refuse opening a tomb that is already open :jaromil:
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
* TODO Release 2.0 :00%:
|
* TODO Release 2.0 :00%:
|
||||||
|
|
||||||
Must be 100% backward compatible with tombs created with 1.0
|
Must be 100% backward compatible with tombs created with 1.0
|
||||||
|
|
||||||
** Bugs to fix
|
|
||||||
|
|
||||||
*** TODO [#B] Avoid overwriting key on exhume on same filename
|
|
||||||
|
|
||||||
|
|
||||||
*** DONE [#A] Should refuse opening a tomb that is already open :jaromil:
|
|
||||||
|
|
||||||
|
|
||||||
** New features
|
** New features
|
||||||
|
|
||||||
*** [#A] system to split keys in parts (ssss)
|
*** [#A] system to split keys in parts (ssss)
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
.TH tomb 1 "May 15, 2011" "tomb"
|
.TH tomb 1 "Sept 26, 2011" "tomb"
|
||||||
|
|
||||||
.SH NAME
|
.SH NAME
|
||||||
Tomb \- the Crypto Undertaker
|
Tomb \- the Crypto Undertaker
|
||||||
@ -91,7 +91,7 @@ given. This is used to recoved buried keys from unsuspected places.
|
|||||||
.B
|
.B
|
||||||
.B
|
.B
|
||||||
.IP "-s \fI<MBytes>\fR"
|
.IP "-s \fI<MBytes>\fR"
|
||||||
When creating a tomb, this option must be used to specify the size of
|
When creating a tomb, this option MUST be used to specify the size of
|
||||||
the new \fIfile\fR to be created, in megabytes.
|
the new \fIfile\fR to be created, in megabytes.
|
||||||
.B
|
.B
|
||||||
.IP "-k \fI<keyfile>\fR"
|
.IP "-k \fI<keyfile>\fR"
|
||||||
@ -100,6 +100,15 @@ of the key to use. Keys are created with the same name of the tomb
|
|||||||
file adding a '.gpg' suffix, but can be later renamed and transported
|
file adding a '.gpg' suffix, but can be later renamed and transported
|
||||||
on other media. When a key is not found, the program asks to insert a
|
on other media. When a key is not found, the program asks to insert a
|
||||||
USB storage device and it will look for the key file inside it.
|
USB storage device and it will look for the key file inside it.
|
||||||
|
If \fI<keyfile>\fR is "-" (dash), it will read stdin
|
||||||
|
.IP
|
||||||
|
When creating a tomb, this option can be used to specify the name (and
|
||||||
|
location) of the key you are creating. For example, you could use
|
||||||
|
.EX
|
||||||
|
tomb create -s 100 tombname -k /media/usb/tombname
|
||||||
|
.EE
|
||||||
|
to put the key on a usb pendrive
|
||||||
|
|
||||||
.B
|
.B
|
||||||
.IP "-n"
|
.IP "-n"
|
||||||
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
||||||
@ -111,6 +120,11 @@ of the default \fIrw,noatime,nodev\fR. This option can be used to
|
|||||||
mount a tomb read-only (ro) to prevent any modification of its data,
|
mount a tomb read-only (ro) to prevent any modification of its data,
|
||||||
or to experiment with other settings (if you really know what you are
|
or to experiment with other settings (if you really know what you are
|
||||||
doing) see the mount(8) man page.
|
doing) see the mount(8) man page.
|
||||||
|
.B
|
||||||
|
.IP "--ignore-swap"
|
||||||
|
By default, Tomb will abort any create and open operation if swap is used (see
|
||||||
|
SWAP section for details). This flag will disable this behaviour. NOTE: it is
|
||||||
|
not secure to do so, unless you know that your swap is encrypted
|
||||||
|
|
||||||
.B
|
.B
|
||||||
.IP "-h"
|
.IP "-h"
|
||||||
@ -124,6 +138,7 @@ Run more quietly
|
|||||||
.IP "-D"
|
.IP "-D"
|
||||||
Print more information while running, for debugging purposes
|
Print more information while running, for debugging purposes
|
||||||
|
|
||||||
|
|
||||||
.SH HOOKS
|
.SH HOOKS
|
||||||
|
|
||||||
Hooks are special files that can be placed inside the tomb and trigger
|
Hooks are special files that can be placed inside the tomb and trigger
|
||||||
@ -161,21 +176,49 @@ pinentry(1) is adopted to collect passwords from the user.
|
|||||||
Tomb executes as super user only those commands requiring it, while it
|
Tomb executes as super user only those commands requiring it, while it
|
||||||
executes desktop applications as processes owned by the user.
|
executes desktop applications as processes owned by the user.
|
||||||
|
|
||||||
|
.SH SWAP
|
||||||
|
|
||||||
|
During "create" and "open" operation, swap will complain and \fIabort\fR if
|
||||||
|
your system has swap activated. This can be annoying, and you can disable this
|
||||||
|
behaviour using \fI--ignore-swap\fR. Before doing that, however, you may be
|
||||||
|
interested in knowing the risks of doing so:
|
||||||
|
.IP \(bu
|
||||||
|
During both creation and opening it could write your secret key on the disk
|
||||||
|
.IP \(bu
|
||||||
|
After having opened the tomb, an application you're using could swap file
|
||||||
|
contents. So you'll put file contents in clear on your disk
|
||||||
|
.P
|
||||||
|
|
||||||
|
If you don't need swap, execute \fI swapoff -a\fR. If you really need it, you
|
||||||
|
could encrypt it. Tomb doesn't detect if your swap is encrypted, and will
|
||||||
|
complain anyway. In that case, using --ignore-swap is safe. Otherwise, use
|
||||||
|
--ignore-swap at your own risk
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
.SH BUGS
|
.SH BUGS
|
||||||
Please report bugs on the tracker at http://bugs.dyne.org
|
Please report bugs on the tracker at
|
||||||
|
.UR http://bugs.dyne.org
|
||||||
|
.UE
|
||||||
|
|
||||||
Get in touch with developers via mail using this web page
|
Get in touch with developers via mail using this
|
||||||
http://dyne.org/contact or via chat on http://irc.dyne.org
|
.UR http://dyne.org/contact
|
||||||
|
web page
|
||||||
|
.UE
|
||||||
|
or via chat on
|
||||||
|
.UR http://irc.dyne.org
|
||||||
|
.UE
|
||||||
|
|
||||||
.SH AUTHORS
|
.SH AUTHORS
|
||||||
|
|
||||||
Tomb is designed and written by Denis Roio aka Jaromil.
|
Tomb is designed and written by Denis Roio aka Jaromil.
|
||||||
|
|
||||||
|
Tomb includes code by Anathema and Boyska.
|
||||||
|
|
||||||
Tomb's artwork is contributed by Jordi aka Mon Mort
|
Tomb's artwork is contributed by Jordi aka Mon Mort
|
||||||
|
|
||||||
Testing and fixes are contributed by Dreamer, Hellekin O. Wolf,
|
Testing and reviews are contributed by Hellekin O. Wolf, Dreamer,
|
||||||
Shining, Asbesto Molesto, Anathema, Boyska and Nignux.
|
Shining, Mancausoft, Asbesto Molesto.
|
||||||
|
|
||||||
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
||||||
|
|
||||||
@ -183,6 +226,8 @@ Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
|||||||
|
|
||||||
This manual is Copyleft (c) 2011 Denis Roio <\fIjaromil@dyne.org\fR>
|
This manual is Copyleft (c) 2011 Denis Roio <\fIjaromil@dyne.org\fR>
|
||||||
|
|
||||||
|
It includes contributions by Boyska
|
||||||
|
|
||||||
Permission is granted to copy, distribute and/or modify this manual
|
Permission is granted to copy, distribute and/or modify this manual
|
||||||
under the terms of the GNU Free Documentation License, Version 1.1 or
|
under the terms of the GNU Free Documentation License, Version 1.1 or
|
||||||
any later version published by the Free Software Foundation.
|
any later version published by the Free Software Foundation.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
.TH tomb 1 "May 15, 2011" "tomb"
|
.TH tomb 1 "Sept 26, 2011" "tomb"
|
||||||
|
|
||||||
.SH NAME
|
.SH NAME
|
||||||
Tomb \- the Crypto Undertaker
|
Tomb \- the Crypto Undertaker
|
||||||
@ -91,7 +91,7 @@ given. This is used to recoved buried keys from unsuspected places.
|
|||||||
.B
|
.B
|
||||||
.B
|
.B
|
||||||
.IP "-s \fI<MBytes>\fR"
|
.IP "-s \fI<MBytes>\fR"
|
||||||
When creating a tomb, this option must be used to specify the size of
|
When creating a tomb, this option MUST be used to specify the size of
|
||||||
the new \fIfile\fR to be created, in megabytes.
|
the new \fIfile\fR to be created, in megabytes.
|
||||||
.B
|
.B
|
||||||
.IP "-k \fI<keyfile>\fR"
|
.IP "-k \fI<keyfile>\fR"
|
||||||
@ -100,6 +100,15 @@ of the key to use. Keys are created with the same name of the tomb
|
|||||||
file adding a '.gpg' suffix, but can be later renamed and transported
|
file adding a '.gpg' suffix, but can be later renamed and transported
|
||||||
on other media. When a key is not found, the program asks to insert a
|
on other media. When a key is not found, the program asks to insert a
|
||||||
USB storage device and it will look for the key file inside it.
|
USB storage device and it will look for the key file inside it.
|
||||||
|
If \fI<keyfile>\fR is "-" (dash), it will read stdin
|
||||||
|
.IP
|
||||||
|
When creating a tomb, this option can be used to specify the name (and
|
||||||
|
location) of the key you are creating. For example, you could use
|
||||||
|
.EX
|
||||||
|
tomb create -s 100 tombname -k /media/usb/tombname
|
||||||
|
.EE
|
||||||
|
to put the key on a usb pendrive
|
||||||
|
|
||||||
.B
|
.B
|
||||||
.IP "-n"
|
.IP "-n"
|
||||||
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
||||||
@ -111,6 +120,11 @@ of the default \fIrw,noatime,nodev\fR. This option can be used to
|
|||||||
mount a tomb read-only (ro) to prevent any modification of its data,
|
mount a tomb read-only (ro) to prevent any modification of its data,
|
||||||
or to experiment with other settings (if you really know what you are
|
or to experiment with other settings (if you really know what you are
|
||||||
doing) see the mount(8) man page.
|
doing) see the mount(8) man page.
|
||||||
|
.B
|
||||||
|
.IP "--ignore-swap"
|
||||||
|
By default, Tomb will abort any create and open operation if swap is used (see
|
||||||
|
SWAP section for details). This flag will disable this behaviour. NOTE: it is
|
||||||
|
not secure to do so, unless you know that your swap is encrypted
|
||||||
|
|
||||||
.B
|
.B
|
||||||
.IP "-h"
|
.IP "-h"
|
||||||
@ -124,6 +138,7 @@ Run more quietly
|
|||||||
.IP "-D"
|
.IP "-D"
|
||||||
Print more information while running, for debugging purposes
|
Print more information while running, for debugging purposes
|
||||||
|
|
||||||
|
|
||||||
.SH HOOKS
|
.SH HOOKS
|
||||||
|
|
||||||
Hooks are special files that can be placed inside the tomb and trigger
|
Hooks are special files that can be placed inside the tomb and trigger
|
||||||
@ -161,21 +176,49 @@ pinentry(1) is adopted to collect passwords from the user.
|
|||||||
Tomb executes as super user only those commands requiring it, while it
|
Tomb executes as super user only those commands requiring it, while it
|
||||||
executes desktop applications as processes owned by the user.
|
executes desktop applications as processes owned by the user.
|
||||||
|
|
||||||
|
.SH SWAP
|
||||||
|
|
||||||
|
During "create" and "open" operation, swap will complain and \fIabort\fR if
|
||||||
|
your system has swap activated. This can be annoying, and you can disable this
|
||||||
|
behaviour using \fI--ignore-swap\fR. Before doing that, however, you may be
|
||||||
|
interested in knowing the risks of doing so:
|
||||||
|
.IP \(bu
|
||||||
|
During both creation and opening it could write your secret key on the disk
|
||||||
|
.IP \(bu
|
||||||
|
After having opened the tomb, an application you're using could swap file
|
||||||
|
contents. So you'll put file contents in clear on your disk
|
||||||
|
.P
|
||||||
|
|
||||||
|
If you don't need swap, execute \fI swapoff -a\fR. If you really need it, you
|
||||||
|
could encrypt it. Tomb doesn't detect if your swap is encrypted, and will
|
||||||
|
complain anyway. In that case, using --ignore-swap is safe. Otherwise, use
|
||||||
|
--ignore-swap at your own risk
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
.SH BUGS
|
.SH BUGS
|
||||||
Please report bugs on the tracker at http://bugs.dyne.org
|
Please report bugs on the tracker at
|
||||||
|
.UR http://bugs.dyne.org
|
||||||
|
.UE
|
||||||
|
|
||||||
Get in touch with developers via mail using this web page
|
Get in touch with developers via mail using this
|
||||||
http://dyne.org/contact or via chat on http://irc.dyne.org
|
.UR http://dyne.org/contact
|
||||||
|
web page
|
||||||
|
.UE
|
||||||
|
or via chat on
|
||||||
|
.UR http://irc.dyne.org
|
||||||
|
.UE
|
||||||
|
|
||||||
.SH AUTHORS
|
.SH AUTHORS
|
||||||
|
|
||||||
Tomb is designed and written by Denis Roio aka Jaromil.
|
Tomb is designed and written by Denis Roio aka Jaromil.
|
||||||
|
|
||||||
|
Tomb includes code by Anathema and Boyska.
|
||||||
|
|
||||||
Tomb's artwork is contributed by Jordi aka Mon Mort
|
Tomb's artwork is contributed by Jordi aka Mon Mort
|
||||||
|
|
||||||
Testing and fixes are contributed by Dreamer, Hellekin O. Wolf,
|
Testing and reviews are contributed by Hellekin O. Wolf, Dreamer,
|
||||||
Shining, Asbesto Molesto, Anathema, Boyska and Nignux.
|
Shining, Mancausoft, Asbesto Molesto.
|
||||||
|
|
||||||
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
||||||
|
|
||||||
@ -183,6 +226,8 @@ Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
|||||||
|
|
||||||
This manual is Copyleft (c) 2011 Denis Roio <\fIjaromil@dyne.org\fR>
|
This manual is Copyleft (c) 2011 Denis Roio <\fIjaromil@dyne.org\fR>
|
||||||
|
|
||||||
|
It includes contributions by Boyska
|
||||||
|
|
||||||
Permission is granted to copy, distribute and/or modify this manual
|
Permission is granted to copy, distribute and/or modify this manual
|
||||||
under the terms of the GNU Free Documentation License, Version 1.1 or
|
under the terms of the GNU Free Documentation License, Version 1.1 or
|
||||||
any later version published by the Free Software Foundation.
|
any later version published by the Free Software Foundation.
|
||||||
|
10
doc/tomb.1
10
doc/tomb.1
@ -1,4 +1,4 @@
|
|||||||
.TH tomb 1 "May 15, 2011" "tomb"
|
.TH tomb 1 "Sept 26, 2011" "tomb"
|
||||||
|
|
||||||
.SH NAME
|
.SH NAME
|
||||||
Tomb \- the Crypto Undertaker
|
Tomb \- the Crypto Undertaker
|
||||||
@ -217,10 +217,12 @@ or via chat on
|
|||||||
|
|
||||||
Tomb is designed and written by Denis Roio aka Jaromil.
|
Tomb is designed and written by Denis Roio aka Jaromil.
|
||||||
|
|
||||||
|
Tomb includes code by Anathema and Boyska.
|
||||||
|
|
||||||
Tomb's artwork is contributed by Jordi aka Mon Mort
|
Tomb's artwork is contributed by Jordi aka Mon Mort
|
||||||
|
|
||||||
Testing and fixes are contributed by Dreamer, Hellekin O. Wolf,
|
Testing and reviews are contributed by Hellekin O. Wolf, Dreamer,
|
||||||
Shining, Asbesto Molesto, Anathema, Boyska and Nignux.
|
Shining, Mancausoft, Asbesto Molesto.
|
||||||
|
|
||||||
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
||||||
|
|
||||||
@ -228,6 +230,8 @@ Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
|||||||
|
|
||||||
This manual is Copyleft (c) 2011 Denis Roio <\fIjaromil@dyne.org\fR>
|
This manual is Copyleft (c) 2011 Denis Roio <\fIjaromil@dyne.org\fR>
|
||||||
|
|
||||||
|
It includes contributions by Boyska
|
||||||
|
|
||||||
Permission is granted to copy, distribute and/or modify this manual
|
Permission is granted to copy, distribute and/or modify this manual
|
||||||
under the terms of the GNU Free Documentation License, Version 1.1 or
|
under the terms of the GNU Free Documentation License, Version 1.1 or
|
||||||
any later version published by the Free Software Foundation.
|
any later version published by the Free Software Foundation.
|
||||||
|
@ -295,10 +295,10 @@ Tomb is designed and written by [[http://jaromil.dyne.org][Jaromil]].
|
|||||||
|
|
||||||
Tomb's artwork is contributed by [[http://monmort.blogspot.com][Món Mort]].
|
Tomb's artwork is contributed by [[http://monmort.blogspot.com][Món Mort]].
|
||||||
|
|
||||||
Tomb includes code by Hellekin O. Wolf and Anathema.
|
Tomb includes code by Anathema and Boyska.
|
||||||
|
|
||||||
Testing and fixes are contributed by Dreamer, Shining, Mancausoft,
|
Testing and reviews are contributed by Hellekin O. Wolf, Dreamer,
|
||||||
Asbesto and Boyska.
|
Shining, Mancausoft, Asbesto Molesto.
|
||||||
|
|
||||||
Most research we refer to is documented by Clemens Fruhwirth who also
|
Most research we refer to is documented by Clemens Fruhwirth who also
|
||||||
developed Cryptsetup together with Christophe Saout.
|
developed Cryptsetup together with Christophe Saout.
|
||||||
|
@ -4,7 +4,7 @@ Content-type: text/html
|
|||||||
<HTML><HEAD><TITLE>Man page of tomb</TITLE>
|
<HTML><HEAD><TITLE>Man page of tomb</TITLE>
|
||||||
</HEAD><BODY>
|
</HEAD><BODY>
|
||||||
<H1>tomb</H1>
|
<H1>tomb</H1>
|
||||||
Section: User Commands (1)<BR>Updated: February 12, 2011<BR><A HREF="#index">Index</A>
|
Section: User Commands (1)<BR>Updated: Sept 26, 2011<BR><A HREF="#index">Index</A>
|
||||||
<A HREF="/cgi-bin/man/man2html">Return to Main Contents</A><HR>
|
<A HREF="/cgi-bin/man/man2html">Return to Main Contents</A><HR>
|
||||||
|
|
||||||
<P>
|
<P>
|
||||||
@ -72,14 +72,32 @@ a <I>second argument</I> is given it will indicate the <I>mountpoint</I>
|
|||||||
where the tomb should be made accessible, if not then the tomb is
|
where the tomb should be made accessible, if not then the tomb is
|
||||||
mounted in a directory named after the filename and inside /media.
|
mounted in a directory named after the filename and inside /media.
|
||||||
<P>
|
<P>
|
||||||
|
<B><DT>list<DD>
|
||||||
|
</B>
|
||||||
|
|
||||||
|
<P>
|
||||||
|
List all the tombs found open, including information about the time
|
||||||
|
they were opened and the hooks that they mounted. If the <I>first
|
||||||
|
argument</I> is present, then shows only the tomb named that way or
|
||||||
|
returns an error if its not found.
|
||||||
|
<P>
|
||||||
<B><DT>close<DD>
|
<B><DT>close<DD>
|
||||||
</B>
|
</B>
|
||||||
|
|
||||||
Closes a currently open tomb. When <I>an argument</I> is specified, it
|
Closes a currently open tomb. When <I>an argument</I> is specified, it
|
||||||
should point to the tomb mount on /dev/mapper; if not specified and
|
should be the name of a mounted tomb; if not specified and only one
|
||||||
only one tomb is open then it will be closed; if multiple tombs are
|
tomb is open then it will be closed; if multiple tombs are open, the
|
||||||
open, the command will list them on the terminal. The special
|
command will list them on the terminal. The special
|
||||||
<I>argument</I> 'all' will close all currently open tombs.
|
<I>argument</I> 'all' will close all currently open tombs. This command
|
||||||
|
fails if the tomb is in use by running processes, the command
|
||||||
|
<I>slam</I> can be used to force close.
|
||||||
|
<P>
|
||||||
|
<B><DT>slam<DD>
|
||||||
|
</B>
|
||||||
|
|
||||||
|
Closes a tomb like the command <I>close</I> does, but in case it is in
|
||||||
|
use looks for all the processes accessing its files and violently
|
||||||
|
kills them using -9.
|
||||||
<P>
|
<P>
|
||||||
<B><DT>bury<DD>
|
<B><DT>bury<DD>
|
||||||
</B>
|
</B>
|
||||||
@ -108,7 +126,7 @@ given. This is used to recoved buried keys from unsuspected places.
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
When creating a tomb, this option must be used to specify the size of
|
When creating a tomb, this option MUST be used to specify the size of
|
||||||
the new <I>file</I> to be created, in megabytes.
|
the new <I>file</I> to be created, in megabytes.
|
||||||
<B><DT>-k </B><I><keyfile></I><DD>
|
<B><DT>-k </B><I><keyfile></I><DD>
|
||||||
|
|
||||||
@ -118,11 +136,35 @@ of the key to use. Keys are created with the same name of the tomb
|
|||||||
file adding a '.gpg' suffix, but can be later renamed and transported
|
file adding a '.gpg' suffix, but can be later renamed and transported
|
||||||
on other media. When a key is not found, the program asks to insert a
|
on other media. When a key is not found, the program asks to insert a
|
||||||
USB storage device and it will look for the key file inside it.
|
USB storage device and it will look for the key file inside it.
|
||||||
|
If <I><keyfile></I> is "-" (dash), it will read stdin
|
||||||
|
<DT><DD>
|
||||||
|
When creating a tomb, this option can be used to specify the name (and
|
||||||
|
location) of the key you are creating. For example, you could use
|
||||||
|
|
||||||
|
tomb create -s 100 tombname -k /media/usb/tombname
|
||||||
|
|
||||||
|
to put the key on a usb pendrive
|
||||||
|
<P>
|
||||||
<B><DT>-n<DD>
|
<B><DT>-n<DD>
|
||||||
</B>
|
</B>
|
||||||
|
|
||||||
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
Skip processing of post-hooks and bind-hooks if found inside the tomb.
|
||||||
See the <I>HOOKS</I> section in this manual for more information.
|
See the <I>HOOKS</I> section in this manual for more information.
|
||||||
|
<B><DT>-o<DD>
|
||||||
|
</B>
|
||||||
|
|
||||||
|
Manually specify mount options to be used when opening a tomb instead
|
||||||
|
of the default <I>rw,noatime,nodev</I>. This option can be used to
|
||||||
|
mount a tomb read-only (ro) to prevent any modification of its data,
|
||||||
|
or to experiment with other settings (if you really know what you are
|
||||||
|
doing) see the <A HREF="/cgi-bin/man/man2html?8+mount">mount</A>(8) man page.
|
||||||
|
<B><DT>--ignore-swap<DD>
|
||||||
|
</B>
|
||||||
|
|
||||||
|
By default, Tomb will abort any create and open operation if swap is used (see
|
||||||
|
SWAP section for details). This flag will disable this behaviour. NOTE: it is
|
||||||
|
not secure to do so, unless you know that your swap is encrypted
|
||||||
|
<P>
|
||||||
<B><DT>-h<DD>
|
<B><DT>-h<DD>
|
||||||
</B>
|
</B>
|
||||||
|
|
||||||
@ -138,6 +180,7 @@ Run more quietly
|
|||||||
<DT>-D<DD>
|
<DT>-D<DD>
|
||||||
Print more information while running, for debugging purposes
|
Print more information while running, for debugging purposes
|
||||||
<P>
|
<P>
|
||||||
|
<P>
|
||||||
</DL>
|
</DL>
|
||||||
<A NAME="lbAG"> </A>
|
<A NAME="lbAG"> </A>
|
||||||
<H2>HOOKS</H2>
|
<H2>HOOKS</H2>
|
||||||
@ -184,33 +227,69 @@ execute most of its operations: to do so it uses <A HREF="/cgi-bin/man/man2html?
|
|||||||
Tomb executes as super user only those commands requiring it, while it
|
Tomb executes as super user only those commands requiring it, while it
|
||||||
executes desktop applications as processes owned by the user.
|
executes desktop applications as processes owned by the user.
|
||||||
<P>
|
<P>
|
||||||
<P>
|
|
||||||
<A NAME="lbAI"> </A>
|
<A NAME="lbAI"> </A>
|
||||||
<H2>BUGS</H2>
|
<H2>SWAP</H2>
|
||||||
|
|
||||||
Please report bugs on the tracker at <A HREF="http://bugs.dyne.org">http://bugs.dyne.org</A>
|
|
||||||
<P>
|
<P>
|
||||||
Get in touch with developers via mail using this web page
|
During "create" and "open" operation, swap will complain and <I>abort</I> if
|
||||||
<A HREF="http://dyne.org/contact">http://dyne.org/contact</A> or via chat on <A HREF="http://irc.dyne.org">http://irc.dyne.org</A>
|
your system has swap activated. This can be annoying, and you can disable this
|
||||||
|
behaviour using <I>--ignore-swap</I>. Before doing that, however, you may be
|
||||||
|
interested in knowing the risks of doing so:
|
||||||
|
<DL COMPACT>
|
||||||
|
<DT>•<DD>
|
||||||
|
During both creation and opening it could write your secret key on the disk
|
||||||
|
<DT>•<DD>
|
||||||
|
After having opened the tomb, an application you're using could swap file
|
||||||
|
contents. So you'll put file contents in clear on your disk
|
||||||
|
</DL>
|
||||||
|
<P>
|
||||||
|
|
||||||
|
<P>
|
||||||
|
If you don't need swap, execute <I> swapoff -a</I>. If you really need it, you
|
||||||
|
could encrypt it. Tomb doesn't detect if your swap is encrypted, and will
|
||||||
|
complain anyway. In that case, using --ignore-swap is safe. Otherwise, use
|
||||||
|
--ignore-swap at your own risk
|
||||||
|
<P>
|
||||||
|
<P>
|
||||||
<P>
|
<P>
|
||||||
<A NAME="lbAJ"> </A>
|
<A NAME="lbAJ"> </A>
|
||||||
|
<H2>BUGS</H2>
|
||||||
|
|
||||||
|
Please report bugs on the tracker at
|
||||||
|
|
||||||
|
|
||||||
|
<P>
|
||||||
|
Get in touch with developers via mail using this
|
||||||
|
|
||||||
|
web page
|
||||||
|
|
||||||
|
or via chat on
|
||||||
|
|
||||||
|
|
||||||
|
<P>
|
||||||
|
<A NAME="lbAK"> </A>
|
||||||
<H2>AUTHORS</H2>
|
<H2>AUTHORS</H2>
|
||||||
|
|
||||||
<P>
|
<P>
|
||||||
Tomb is designed and written by Denis Roio aka Jaromil.
|
Tomb is designed and written by Denis Roio aka Jaromil.
|
||||||
<P>
|
<P>
|
||||||
|
Tomb includes code by Hellekin O. Wolf, Anathema and Boyska.
|
||||||
|
<P>
|
||||||
Tomb's artwork is contributed by Jordi aka Mon Mort
|
Tomb's artwork is contributed by Jordi aka Mon Mort
|
||||||
<P>
|
<P>
|
||||||
Testing and fixes are contributed by Dreamer and Hellekin O. Wolf
|
Testing and reviews are contributed by Dreamer, Shining, Mancausoft,
|
||||||
|
Asbesto Molesto.
|
||||||
<P>
|
<P>
|
||||||
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
Cryptsetup is developed by Christophe Saout and Clemens Fruhwirth
|
||||||
<P>
|
<P>
|
||||||
<A NAME="lbAK"> </A>
|
<A NAME="lbAL"> </A>
|
||||||
<H2>COPYING</H2>
|
<H2>COPYING</H2>
|
||||||
|
|
||||||
<P>
|
<P>
|
||||||
This manual is Copyleft (c) 2011 Denis Roio <<I><A HREF="mailto:jaromil@dyne.org">jaromil@dyne.org</A></I>>
|
This manual is Copyleft (c) 2011 Denis Roio <<I><A HREF="mailto:jaromil@dyne.org">jaromil@dyne.org</A></I>>
|
||||||
<P>
|
<P>
|
||||||
|
It includes contributions by Boyska
|
||||||
|
<P>
|
||||||
Permission is granted to copy, distribute and/or modify this manual
|
Permission is granted to copy, distribute and/or modify this manual
|
||||||
under the terms of the GNU Free Documentation License, Version 1.1 or
|
under the terms of the GNU Free Documentation License, Version 1.1 or
|
||||||
any later version published by the Free Software Foundation.
|
any later version published by the Free Software Foundation.
|
||||||
@ -218,7 +297,7 @@ Permission is granted to make and distribute verbatim copies of this
|
|||||||
manual page provided the above copyright notice and this permission
|
manual page provided the above copyright notice and this permission
|
||||||
notice are preserved on all copies.
|
notice are preserved on all copies.
|
||||||
<P>
|
<P>
|
||||||
<A NAME="lbAL"> </A>
|
<A NAME="lbAM"> </A>
|
||||||
<H2>AVAILABILITY</H2>
|
<H2>AVAILABILITY</H2>
|
||||||
|
|
||||||
<P>
|
<P>
|
||||||
@ -226,7 +305,7 @@ The most recent version of Tomb sourcecode and up to date
|
|||||||
documentation is available for download from its website on
|
documentation is available for download from its website on
|
||||||
<I><A HREF="http://tomb.dyne.org">http://tomb.dyne.org</A></I>.
|
<I><A HREF="http://tomb.dyne.org">http://tomb.dyne.org</A></I>.
|
||||||
<P>
|
<P>
|
||||||
<A NAME="lbAM"> </A>
|
<A NAME="lbAN"> </A>
|
||||||
<H2>SEE ALSO</H2>
|
<H2>SEE ALSO</H2>
|
||||||
|
|
||||||
<P>
|
<P>
|
||||||
@ -253,16 +332,17 @@ LUKS website, <A HREF="http://code.google.com/p/cryptsetup">http://code.google.c
|
|||||||
<DT><A HREF="#lbAF">OPTIONS</A><DD>
|
<DT><A HREF="#lbAF">OPTIONS</A><DD>
|
||||||
<DT><A HREF="#lbAG">HOOKS</A><DD>
|
<DT><A HREF="#lbAG">HOOKS</A><DD>
|
||||||
<DT><A HREF="#lbAH">PRIVILEGE ESCALATION</A><DD>
|
<DT><A HREF="#lbAH">PRIVILEGE ESCALATION</A><DD>
|
||||||
<DT><A HREF="#lbAI">BUGS</A><DD>
|
<DT><A HREF="#lbAI">SWAP</A><DD>
|
||||||
<DT><A HREF="#lbAJ">AUTHORS</A><DD>
|
<DT><A HREF="#lbAJ">BUGS</A><DD>
|
||||||
<DT><A HREF="#lbAK">COPYING</A><DD>
|
<DT><A HREF="#lbAK">AUTHORS</A><DD>
|
||||||
<DT><A HREF="#lbAL">AVAILABILITY</A><DD>
|
<DT><A HREF="#lbAL">COPYING</A><DD>
|
||||||
<DT><A HREF="#lbAM">SEE ALSO</A><DD>
|
<DT><A HREF="#lbAM">AVAILABILITY</A><DD>
|
||||||
|
<DT><A HREF="#lbAN">SEE ALSO</A><DD>
|
||||||
</DL>
|
</DL>
|
||||||
<HR>
|
<HR>
|
||||||
This document was created by
|
This document was created by
|
||||||
<A HREF="/cgi-bin/man/man2html">man2html</A>,
|
<A HREF="/cgi-bin/man/man2html">man2html</A>,
|
||||||
using the manual pages.<BR>
|
using the manual pages.<BR>
|
||||||
Time: 18:57:34 GMT, March 09, 2011
|
Time: 10:33:09 GMT, September 26, 2011
|
||||||
</BODY>
|
</BODY>
|
||||||
</HTML>
|
</HTML>
|
||||||
|
2
src/tomb
2
src/tomb
@ -21,7 +21,7 @@
|
|||||||
# Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
# Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||||
|
|
||||||
VERSION=1.1
|
VERSION=1.1
|
||||||
DATE=May/2011
|
DATE=Sept/2011
|
||||||
TOMBEXEC=$0
|
TOMBEXEC=$0
|
||||||
TOMBOPENEXEC="tomb-open"
|
TOMBOPENEXEC="tomb-open"
|
||||||
typeset -a OLDARGS
|
typeset -a OLDARGS
|
||||||
|
Loading…
Reference in New Issue
Block a user