I was expecting to be able to just install and generate tomb vaults but they’re not working here. Actually the password generation phase.
sudo tomb forge personal.tomb.key
tomb . An active swap partition is detected...
tomb (*) The undertaker found that all swap partitions are encrypted. Good.
tomb . Commanded to forge key personal.tomb.key with cipher algorithm AES256
tomb [W] This operation takes time. Keep using this computer on other tasks.
tomb [W] Once done you will be asked to choose a password for your tomb.
tomb [W] To make it faster you can move the mouse around.
tomb [W] If you are on a server, you can use an Entropy Generation Daemon.
512+0 records in
512+0 records out
512 bytes copied, 0,00117133 s, 437 kB/s
tomb (*) Choose the password of your key: personal.tomb.key
tomb . (You can also change it later using 'tomb passwd'.)
tomb [E] Cannot find any pinentry-curses and no DISPLAY detected.
tomb [E] User aborted.
after installing pinentry-curses manually
sudo tomb forge personal.tomb.key pinentry-curses
tomb . An active swap partition is detected...
tomb (*) The undertaker found that all swap partitions are encrypted. Good.
tomb . Commanded to forge key personal.tomb.key with cipher algorithm AES256
tomb [W] This operation takes time. Keep using this computer on other tasks.
tomb [W] Once done you will be asked to choose a password for your tomb.
tomb [W] To make it faster you can move the mouse around.
tomb [W] If you are on a server, you can use an Entropy Generation Daemon.
512+0 records in
512+0 records out
512 bytes copied, 0,00100077 s, 512 kB/s
tomb (*) Choose the password of your key: personal.tomb.key
tomb . (You can also change it later using 'tomb passwd'.)
tomb [W] Pinentry error: Permission
tomb [E] User aborted.
tomb -v
Tomb 2.9.0 - a strong and gentle undertaker for your secrets
Copyright (C) 2007-2021 Dyne.org Foundation, License GNU GPL v3+
This is free software: you are free to change and redistribute it
For the latest sourcecode go to <http://dyne.org/software/tomb>
This source code is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
When in need please refer to <http://dyne.org/support>.
System utils:
main:318: command not found: zsh
Sudo version 1.9.12p1
cryptsetup 2.5.0 flags: UDEV BLKID KEYRING KERNEL_CAPI
pinentry-curses (pinentry) 1.2.0-unknown
findmnt from util-linux 2.38.1
gpg (GnuPG) 2.3.7 - key forging algorithms (GnuPG symmetric ciphers):
IDEA 3DES CAST5 BLOWFISH AES AES192 AES256 TWOFISH CAMELLIA128 CAMELLIA192 CAMELLIA256
Optional utils:
/nix/store/ahb1jl345mpn3v8my8aj77df294q59ij-gettext-0.21/bin/gettext
dcfldd not found
/run/current-system/sw/bin/shred
steghide not found
/nix/store/y3vci6gggcl2z46dkgajvixxpfvvybky-e2fsprogs-1.46.5-bin/bin/resize2fs
tomb-kdb-pbkdf2 not found
qrencode not found
swish-e not found
unoconv not found
lsof not found