Commit Graph

737 Commits

Author SHA1 Message Date
Jaromil
7e9419542a Merge pull request #169 from JoelMon/update-man-pdf
Updated tomb_manpage.pdf to Nov 26, 2014.
2014-11-26 21:16:25 +00:00
Joel Montes de Oca
4ac31dad44 Updated tomb_manpage.pdf to Nov 26, 2014.
omb_manpage.pdf had not been updated for two years. This update brings
the document up to date with the latest update done to the tomb.1 man
page on November 26, 2014.
2014-11-26 16:09:40 -05:00
gdrooid
6ab73af2b1 [l10n] Updated French translations. 2014-11-26 20:54:17 +01:00
Jaromil
0d690bf142 documentation and makefile scripts updates for release 2014-11-26 20:28:28 +01:00
Jaromil
710558381f Merge pull request #168 from gdrooid/lang
[i18n] Don't localize legal output.
2014-11-26 18:38:21 +00:00
gdrooid
de65325fc3 [i18n] Don't localize legal output. 2014-11-26 19:35:47 +01:00
gdrooid
5d32bf8fa1 [l10n] Updated Spanish translations. 2014-11-26 17:54:33 +01:00
Jaromil
bbe9a49ec3 Direct handling of pinentry execution
We skip distro wrappers here since they interfere with stdin/out
As usual: better to have less intermediaries.
2014-11-26 17:45:31 +01:00
gdrooid
1ef2576b16 [l10n] Updated German, Russian and Spanish translations. 2014-11-26 17:42:08 +01:00
Jaromil
7a8a8666ba addressing comments on last commit with a few fixes 2014-11-26 17:25:47 +01:00
gdrooid
47652747c3 [l10n] Update pot file. 2014-11-25 22:51:33 +01:00
Jaromil
f218c644ab KDF key handling cleanup 2014-11-25 03:25:27 +01:00
Jaromil
5dbcabdf26 Removed old privilege escalation model
This commit refactors the handling of password input by eliminating
all intermediary programs and relying only on ZSh, hence improving
overall security against rootkits and such.

Also the way sudo is used is now greatly simplified and there is no
privilege escalation at boot: sudo is executed inside Tomb by being
prefixed in front of those programs needing it.

All tests passed.
2014-11-25 02:37:05 +01:00
Jaromil
e6075d08ce really fail to not overwrite keys when forging 2014-11-24 20:06:45 +01:00
gdrooid
fb686db8eb Finished fixing #164 2014-11-24 17:02:30 +01:00
gdrooid
9eaaa68452 [l10n] Update po files with the latest untranslated strings.
So that they coincide with the ones on POEditor for those who want to
use a different tool.
2014-11-24 16:55:22 +01:00
gdrooid
7c797f86a2 [i18n] Update .pot file. 2014-11-23 22:55:03 +01:00
gdrooid
2a675d0e69 [i18m] Fix generation of translatable strings to also include _success. 2014-11-23 22:49:06 +01:00
gdrooid
a46da1cc23 Fix #164 2014-11-23 22:47:03 +01:00
Jaromil
a6a784f1ef swish-e indexing change and whoami cleanup
swish-e now creates a .swishrc config file inside the tomb so that
users can tweak its configuration by hand.
whoami() is also cleaned up, pending a fix for slackware usage.
2014-11-23 21:53:44 +01:00
Jaromil
2480c89210 small security measure against exporting all vars 2014-11-23 18:26:06 +01:00
Jaromil
99581a5faa whitespace cleanup and correct indentation to 4 spaces (no tabs) 2014-11-23 18:25:42 +01:00
Jaromil
aba0fa5191 Avoid using a tempfile on every key decryption
A tempfile was often used by Tomb in order to parse the stderr output of
gpg and detect if the password is correct or not. The tempfile was not
holding any secret information (see #162) yet this is an improvement for
Tomb's deniability since there is now much less going on in the temp
firectory.
2014-11-23 16:58:43 +01:00
Jaromil
2c4fb4852e better changelog info 2014-11-23 16:27:09 +01:00
Jaromil
c0bd822312 fix for #165 2014-11-23 16:27:09 +01:00
Jaromil
ba39aef673 considerations on password bruteforce vulnerability on steghide 2014-11-23 15:31:14 +01:00
Jaromil
0e141abf57 manpage updates 2014-11-23 14:55:03 +01:00
Jaromil
a10d6af804 Removed handling of temporary directory
Added the --tmp flag for manual selection of the temporary directory, whose security should really be up to sysadmins when configuring operating systems. Default is ZSh TMPPREFIX usually set to /tmp/zsh which, if not existing, will be created as world writable with a sticky bit.

This commit also includes a cleanup of commandline options and a fix to swap check.
2014-11-23 14:49:41 +01:00
gdrooid
e95b32e3a3 [i18n] Updated Russian translation. 2014-11-23 09:43:23 +01:00
gdrooid
1481d1f4df [i18n] Updated Spanish translations. 2014-11-22 21:15:34 +01:00
Jaromil
a4f597d86c documentation and runtests fixes 2014-11-22 01:50:08 +01:00
Jaromil
6bb1385c69 Security fix to setkey
Now there is no more writing of cleartext secrets in any tempfile,
the last case was in setkey and is now eliminated. Tempfile creation
is cleaner. Related to issue #162
2014-11-22 01:40:26 +01:00
Jaromil
52e80b6042 correct docs on opening tombs without Tomb 2014-11-22 00:32:25 +01:00
Jaromil
f2efa69001 Read setting of pinentry-program in gpg-agent.conf
also fixes the check if the tomb is already open
2014-11-22 00:23:57 +01:00
Jaromil
0d485bf51d Documentation for -k cleartext and --unsafe 2014-11-21 22:50:45 +01:00
Jaromil
4d82b20199 small fix to whitespace and leftover newline tests 2014-11-21 22:32:38 +01:00
Jaromil
e48c7c4a85 Added new --unsafe mode: -k cleartext
Using the 'cleartext' name for a key will read it from stdin and
expect it to be unencrypted. This is an unsafe mode of operation,
but useful i.e. to open remote tombs by piping the key over ssh,
or using a different software than Tomb to de/crypt keys.

This commit also renames the flag --unsecure-dev-mode into --unsafe
and includes a minor fix to the last opened date shown on open.

Addressing issue #161
2014-11-21 22:25:43 +01:00
Jaromil
b7f4e3a7fd Use print for non-escaped piping of secret
after fixing issue #154 with echo here we revert to using print with
options -R -n which sort the same effect. Print is preferred since it
executes the built-in command without any possible ambiguity. We don't
want to expose secrets to an external executable in case of a simple
attack that would change the env PATH to use a rootkitted echo.
2014-11-20 15:53:45 +01:00
Jaromil
489b3582cb Disable escapes when piping secrets
Switched to use echo with -E flag to disable escapes in keys: escape
strings were discarded cryptsetup tomb operations when they were present
in the decoded key random passphrase. Issue #154

The solution adopted here includes wrapping all cryptsetup operations to
unify the behaviour adopted.

Worth noting that this problem possibly breaks all tombs and keys
created using the unstable Tomb from git development in the past 2
months. Regression tests with previous stable releases are OK.
2014-11-20 09:59:11 +01:00
Jaromil
9180b214af fix renaming in kdf 2014-11-17 17:32:59 +01:00
gdrooid
6ce45a6f84 [i18n] Update translation files. 2014-11-16 17:30:59 +01:00
Jaromil
09b9bcb469 actual tomber sourcecode inclusion 2014-11-16 16:45:28 +01:00
Jaromil
02e72893c2 more documentation including a way to open tombs without Tomb 2014-11-16 16:16:25 +01:00
Jaromil
a568cdf546 imported python tomber into extras
more documentation updates
2014-11-16 15:21:11 +01:00
Jaromil
ced2e5fcb8 fixes to Makefiles informed by issue #154 2014-11-16 14:04:05 +01:00
Jaromil
bbb290c81a documentation updates 2014-11-16 13:55:51 +01:00
Jaromil
a0db66b18e added also explicit stdout redirection to command -v 2014-11-16 13:11:42 +01:00
Jaromil
9f39d671a0 reverted to use command -v instead of hash
according to analysis made with @gdrooid
2014-11-16 12:38:31 +01:00
Jaromil
da46cbcd31 using zsh hash function instead of command -v to check for bins in path, using plain 2>/dev/null redirection everywhere 2014-11-16 11:37:30 +01:00
Jaromil
982c7591f2 avoid gettext being a requirement and list optional tools found in version output 2014-11-16 11:34:35 +01:00