tomb

the crypto undertaker
git clone git://parazyd.org/tomb.git
Log | Files | Refs | README | LICENSE

ChangeLog.md (8937B)


      1 # Tomb ChangeLog
      2 
      3 ## 2.4
      4 ### April 2017
      5 
      6 This release introduces a major new feature with support for
      7 asymmetric encryption of Tomb keys using public/private GPG key
      8 pairs. It is now possible to protect a Tomb key using a GPG key (which
      9 can also be password-less for automations) as well encrypt a Tomb key
     10 for multiple recipients (list of GPG ids). Other improvements include:
     11 a fix to the 'slam' command with better detection of running programs
     12 using 'lsof' (new optional dependency); a fix to 'forge' key creation
     13 to really use 512 bits long keys to really trigger usage of AES256;
     14 correct support for opening tombs in read-only mode; update of the
     15 Tomber python wrapper in extras. Documentation has been updated.
     16 
     17 ## 2.3
     18 ### January 2017
     19 
     20 Fix to bug occurring when using ZSh version 5.3 or higher. Fix to
     21 inclusion of final newline in keys generated with 2.2, only affecting
     22 third-party software. Removed chmod/chown of tombs when open. Enhanced
     23 continuous integration script with regression tests with usage of old
     24 stable versions of Tomb and shellcheck linting.  Improved parser and
     25 post-hooks to avoid usage of external binaries (grep and cat) also
     26 improving security when decrypting keys. Fix for clean execution via
     27 sudo nopasswd. Updated extras/gtomb to latest stable version.  Various
     28 documentation updatesabout kdf, using images as keys, deniability and
     29 gpg-agent usage. New experimental port to Android platforms in extras.
     30 
     31 ## 2.2
     32 ### December 2015
     33 
     34 New Qt5 desktop tray in extras/qt-tray.
     35 New Zenity based Gtk interface in extras/gtomb (experimental).
     36 Better resizing procedure recovers from failure without starting over
     37 with a new dig.  Fixes for correct handling of bind-hooks mountpoints
     38 containing whitespaces, implying a refactoring of how the mtab is
     39 parsed, along with workaround for Debian bugs. Updated all strings to
     40 report MiB sizes. Fix to correctly show last time opened. Fix to EUID
     41 detection and to installed manpage permissions.
     42 
     43 ## 2.1.1
     44 ### August 2015
     45 
     46 Added translations to Italian and Swedish.
     47 Minor documentation updates.
     48 
     49 
     50 ## 2.1
     51 ### July 2015
     52 
     53 All users updating should close their tombs first, then update and
     54 reopen them with this new version. However, lacking to do so will not
     55 cause any data loss, just an unclean umount of tombs.
     56 
     57 This new stable release including several bugfixes to smooth the user
     58 experience in various situations. Documentation is reviewed and
     59 extended and translations are updated.
     60 
     61 More in detail, fixes to: mountpoint removal, language localization,
     62 gtk-2 pinentry themeing, udisk2 compatibility (/run/media/$USER
     63 mountpoint support), handling of key failures, kdf documentation,
     64 swish-e file contents search and encrypted swap detection.
     65 
     66 Deniability is improved by allowing any filename to be used for tombs
     67 (also without .tomb extension). Code has been overall cleaned up.
     68 
     69 
     70 ## 2.0.1
     71 ### December 2014
     72 
     73 Fix for usage with GnuPG 1.4.11, a problem affecting long term
     74 GNU/Linux distribution releases like Ubuntu 12.04 and Mint 13.
     75 Minor messaging fixes.
     76 
     77 ## 2.0
     78 ### November 2014
     79 
     80 Tomb goes international: now translated to Russian, French, Spanish
     81 and German.
     82 
     83 The usability has improved: steganographed images can now be used
     84 directly as keys using `-k`. Tomb now works also across ssh
     85 connections: it is possible to pipe cleartext secrets from stdin using
     86 `-k cleartext` but that requires the --unsafe flag.
     87 
     88 The security is also improved by avoiding most uses of temporary
     89 files. The privilege escalation model has been simplified and sudo is
     90 called only when needed. All code has been refactored for readability
     91 and integration with zsh features. Signal handlers are now in place,
     92 global arrays are used to keep track of temp files. Namespace has been
     93 revisioned and corrected, described in [HACKING](docs/HACKING.txt).
     94 
     95 ## 1.5.3
     96 ### June 2014
     97 
     98 Various usability fixes and documentation updates. Password changing
     99 and key changing procedures have been refactored and dev-mode
    100 operation from scripts has been tested against a few new wrappers
    101 being developed. A strings file is made available for translators.
    102 
    103 ## 1.5.2
    104 ### February 2014
    105 
    106 Removed automatic guessing of key file besides tomb to encourage
    107 users to keep tomb and key separated, but also to simplify the
    108 code in key retrieval and avoid a bug occurring in the previous
    109 version.
    110 
    111 ## 1.5.1
    112 ### February 2014
    113 
    114 Fix to stdin piping of keys, which were not correctly processed
    115 nor were deleted from volatile memory (tmpfs).
    116 
    117 Version is now updated accordingly.
    118 
    119 ## 1.5
    120 ### January 2014
    121 
    122 Minor bugfixes to documentation, error handling, support for
    123 multiple and encrypted swap partitions and qr code engraving.
    124 
    125 This release also includes some minor code refactoring of
    126 load_key() and loop mount checks. Also the tray app is updated
    127 to gtk-3 and works simply with a tomb name as argument.
    128 
    129 Documentation was updated accordingly.
    130 
    131 ## 1.4
    132 ### June 2013
    133 
    134 This release fixes an important bug affecting Tomb 1.3.* which
    135 breaks backward compatibility with older tombs and invalidates
    136 keys created using 1.3 or 1.3.1. For more information about it
    137 read the file KNOWN_BUGS.
    138 
    139 New features are also included:
    140 indexing and search of file contents, engraving of keys into paper
    141 printable QRCodes for backup purposes and improvements in key
    142 encryption. A setkey command is added to change the key file that
    143 is locking a Tomb.
    144 
    145 This release restores backward compatibility
    146 with tombs created before the 1.3 release series.
    147 
    148 ## 1.3.1 (DEPRECATED, see [KNOWN_BUGS](KNOWN_BUGS.md))
    149 ### June 2013
    150 
    151 Major bugfixes following the recent refactoring.
    152 
    153 This release fixes various advanced commands as search/index, KDF key
    154 protection against dictionary attacks and steganographic hiding of
    155 keys. It provides compatibility across GnuPG 1.4.11 and .12 which
    156 broke the decoding of keys. Usage of commandline option is made
    157 consistent and full paths are honored.
    158 
    159 A new test suite is included and documentation is updated accordingly.
    160 
    161 ## 1.3 (DEPRECATED, see [KNOWN_BUGS](KNOWN_BUGS.md))
    162 ### May 2013
    163 
    164 A refactoring of Tomb's main script internals was made, including
    165 a new messaging system, machine parsable output, cleaner code and
    166 updated compatibility to Debian 7. A new search feature lets users
    167 index and run fast filename searches in their open tombs. Creation
    168 of tombs is broken out in three steps (dig, forge and lock).
    169 
    170 Source distribution includes experimental add-ons for a python
    171 GUI, KDF key encryption and a key "undertaker". Documentation was
    172 updated.
    173 
    174 
    175 ## 1.2
    176 ### Nov 2011
    177 
    178 Includes an Important fix to password parsing for spaces and
    179 extended chars, plus a new 'passwd' command to change a key's
    180 password. Tomb now checks for swap to avoid its usage (see SWAP
    181 section in manpage) and warns the user when the tomb is almost
    182 full.
    183 
    184 ## 1.1
    185 ### May 2011
    186 
    187 Fixes to mime types, icons and desktop integration.
    188 
    189 A new 'list' command provides an overview on all tombs currently open.
    190 
    191 Now a tomb cannot be mounted multiple times, the message console has
    192 colors and better messages.
    193 
    194 Different mount options (like read-only) can also be specified by hand on the commandline.
    195 
    196 ## 1.0
    197 ### March 2011
    198 
    199 Clean and stable. Now passwords are handled exclusively using
    200 pinentry. Also support for steganography of keys (bury and exhume)
    201 was added to the commandline.
    202 
    203 Commandline and desktop operations are well separated so that tomb can be used via remote terminal.
    204 
    205 A new command 'slam' immediately closes a tomb killing all processes that keep it busy.
    206 
    207 ## 0.9.2
    208 ### February 2011
    209 
    210 The tomb-open wizard now correctly guides you through the creation
    211 of new tombs and helps when saving the keys on external USB
    212 storage devices. The status tray now reliably closes its tomb.
    213 
    214 ## 0.9.1
    215 ### February 2011
    216 
    217 Sourcecode cleanup, debugging and testing.
    218 
    219 Integrated some feedback after filing Debian's ITP and RFS.
    220 
    221 ## 0.9
    222 ### January 2011
    223 
    224 Tomb is now a desktop application following freedesktop standards:
    225 it provides a status tray and integrates with file managers.
    226 
    227 The main program has been thoroughly tested and many bugs were fixed.
    228 
    229 ## August 2010
    230 
    231 The first usable version of Tomb goes public among hacker friends
    232 
    233 ## During the year 2009
    234 
    235 Tomb has been extensively tested, perfectioned and documented
    236 after being used by its author.
    237 
    238 ## Sometime in 2007
    239 
    240 [MKNest](http://code.dyne.org/dynebolic/tree/dyneII/startup/bin/mknest)
    241 was refactored to work on the Debian distribution and since
    242 then renamed to Tomb. [dyne:bolic](http://www.dynebolic.org) specific dependencies where
    243 removed, keeping Zsh as the shell script it is written with.
    244 
    245 ## Back in 2005
    246 
    247 The "nesting" feature of [dyne:bolic](http://www.dynebolic.org)
    248 GNU/Linux lets users encrypt their home in a file, using a shell script and a graphical
    249 interface called Taschino.
    250 
    251 Taschino included a shell script wrapping cryptsetup to encrypt
    252 loopback mounted partitions with the algo AES-256 (cbc-essiv
    253 mode): this script was called 'mkNest' and its the ancestor of
    254 Tomb.