On Mon, 11 Nov 2019 00:57:03 -0500, Michael Terry writes:
>But then duplicity fixed the issue with gpg encryption keys and Debian never
>dropped its patch.

i disagree with that assessment: the way i read validate_encryption_settings
in dup_main, resuming a backup with gpg encryption only (and no signing) will
fail without the 01-reverify patch, because restore_get_enc_fileobj will
fail without passphrase for decryption.

>test the gpg encryption key issue (this one needs you to specify both
>KEY and PASSPHRASE environment variables -- your gpg key id and
>passphrase respectively).

your scenario doesn't cover the case i'm trying to keep working, ie. an
gpg-encrypted but not signed backup where duplicity just has a key to
encrypt to and does not know any passphrases by design. given that that
setup is one of the few relatively safe ones i certainly don't want to
break that.

when i find some time i will try to reassess the need for 01-reverify
further but right now i don't see how validate_encryption_settings is
supposed to succeed for gpg-encrypted-but-not-signed backups. 

regards
az


-- 
Alexander Zangerl + GPG Key 2FCCF66BB963BD5F + http://snafu.priv.at/
Unix and C are the ultimate computer viruses. -- Richard Gabriel

Attachment: signature.asc
Description: Digital Signature

Reply via email to