Charles Fry wrote (24 Nov 2005 20:19:26 +0100) : > It would be most helpful if ninjahelper included support for > duplicity.
This is fixed upstream, since SVN revision around 250 :) > It would be very simple to automatically create a GPG key with a > long random password, for use by duplicity. Sure. But... take a simple example: - you use backupninja duplicity handler to backup your /etc - this long random passphrase is stored as clear-text in this /etc directory, and nowhere else - you suffer a hard-disk crash and lose this /etc => you have no way to recover your lost data, being unable to remember the random passphrase. Of course, any user can be more clever, and backup the passphrase somewhere. Of course, we could add this feature with a big fat warning. But IMHO, to make "very simple" something like this would also make "very simple" the (stupid) scenario I just described, and I won't take responsibility for this. I don't want to make data loss easy by making bad backup practices easy. That's why I won't write this code. And now... as a debian-BTS beginner, I don't know how to tag this bug, since half the bug should be "fixed-upstream", and the other half should be "wont-fix". He he. Maybe clone would do the job. Ciao, -- intrigeri <[EMAIL PROTECTED]>
pgpOTRNIkOywZ.pgp
Description: PGP signature