Your message dated Sat, 9 Jul 2016 17:18:52 +0200
with message-id <[email protected]>
and subject line Bug#807329: fixed in duply 1.11.3-1
has caused the Debian Bug report #807329,
regarding Since 1.11 encrypted backup without password is impossible
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
807329: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807329
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: duply
Version: 1.11-1
Severity: normal

I have a setting like this

# -*- shell-script-mode -*-

# gpg encryption settings, simple settings:
#  GPG_KEY='disabled' - disables encryption alltogether
#  GPG_KEY='<key1>[,<key2>]'; GPG_PW='pass' - encrypt with keys, sign 
#    with key1 if secret key available and use GPG_PW for sign & decrypt
#  GPG_PW='passphrase' - symmetric encryption using passphrase only
#GPG_KEY='_KEY_ID_'
#GPG_PW='_GPG_PASSWORD_'
# gpg encryption settings in detail (extended settings)
#  the above settings translate to the following more specific settings
#  GPG_KEYS_ENC='<keyid1>,[<keyid2>,...]' - list of pubkeys to encrypt to
#  GPG_KEY_SIGN='<keyid1>|disabled' - a secret key for signing
#  GPG_PW='<passphrase>' - needed for signing, decryption and symmetric
#   encryption. If you want to deliver different passphrases for e.g. 
#   several keys or symmetric encryption plus key signing you can use
#   gpg-agent. Add '--use-agent' to the duplicity parameters below.
#   also see "A NOTE ON SYMMETRIC ENCRYPTION AND SIGNING" in duplicity manpage
# notes on en/decryption
#  private key and passphrase will only be needed for decryption or signing.
#  decryption happens on restore and incrementals (compare archdir contents).
#  for security reasons it makes sense to separate the signing key from the
#  encryption keys. https://answers.launchpad.net/duplicity/+question/107216
#GPG_KEYS_ENC='<pubkey1>,<pubkey2>,...'
#GPG_KEY_SIGN='<prvkey>'
GPG_KEYS_ENC=6CB95BE4
GPG_KEY_SIGN='disabled'
# set if signing key passphrase differs from encryption (key) passphrase
# NOTE: available since duplicity 0.6.14, translates to SIGN_PASSPHRASE
#GPG_PW_SIGN='<signpass>'

# gpg options passed from duplicity to gpg process (default='')
# e.g. "--trust-model pgp|classic|direct|always" 
#   or "--compress-algo=bzip2 --bzip2-compress-level=9"
#   or "--personal-cipher-preferences AES256,AES192,AES..."
#GPG_OPTS=''

# disable preliminary tests with the following setting
GPG_TEST='disabled'


which is meant to encrypt backups without password, and ask for
password for decrypting.

However since upgrade to 1.11, no operation is possible because of
this lack of password. I do want to encrypt backup, and I do not want
to write the decryption password anywhere. Is there a new way to
achieve this ?

(even the status command fails because of no password).



-- System Information:
Debian Release: 8.2
  APT prefers proposed-updates
  APT policy: (700, 'proposed-updates'), (600, 'stable'), (500, 
'stable-updates'), (400, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.2.0-0.bpo.1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages duply depends on:
ii  duplicity  0.7.05-2
ii  gnupg      1.4.18-7

duply recommends no packages.

Versions of packages duply suggests:
ii  openssh-client  1:6.7p1-5

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: duply
Source-Version: 1.11.3-1

We believe that the bug you reported is fixed in the latest version of
duply, which is due to be installed in the Debian FTP archive:

duply_1.11.3-1.debian.tar.gz
  to main/d/duply/duply_1.11.3-1.debian.tar.gz
duply_1.11.3-1.dsc
  to main/d/duply/duply_1.11.3-1.dsc
duply_1.11.3-1_all.deb
  to main/d/duply/duply_1.11.3-1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn <[email protected]> (supplier of updated xfe package)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 09 Jul 2016 16:55:05 +0200
Source: duply
Binary: duply
Architecture: source all
Version: 1.11.3-1
Distribution: unstable
Urgency: medium
Maintainer: Joachim Wiedorn <[email protected]>
Changed-By: Joachim Wiedorn <[email protected]>
Description:
 duply      - easy to use frontend to the duplicity backup system
Changes:
 duply (1.11.3-1) unstable; urgency=medium
 .
   * New upstream release with some bugfixes:
     - reverted duply's default PYTHON to 'python'.
     - fix "gpg: unsafe" version print out.
     - fix broken asymmetric encryption when using GPG_KEYS_ENC.
     - more documentation about S3: TARGET_USER/PASS needs env vars
       to template conf file.
     - fix wrong "WARNING: No running gpg-agent ..." when sign key was not set.
   * Update all patches.
   * Bump Standards Version to 3.9.8 (no changes).
Checksums-Sha1:
 50f28a47684ed1e77d224cf972f1bde5e3665f52 1617 duply_1.11.3-1.dsc
 9326e1a20b25f697c565c6c0304f37122762f956 44198 duply_1.11.3.orig.tar.gz
 c8644f6e6aaf66e776a34aff1f4e9362cd5669a2 12252 duply_1.11.3-1.debian.tar.xz
 0e9c11c980d3838828a5bbea905dc88006ca280c 42806 duply_1.11.3-1_all.deb
Checksums-Sha256:
 b7d547b9bff059bdd97ebe7e45113a394cec7df8eb27e8e2cacb8e9c56fcc659 1617 
duply_1.11.3-1.dsc
 585757a02abc91bcc0e37004eef735794d6581d1a30ec68303c6c04833b20940 44198 
duply_1.11.3.orig.tar.gz
 55af5e4c10890c0138befffcff53d142dd98505c1f9dc7d42c873d22e95df870 12252 
duply_1.11.3-1.debian.tar.xz
 9636ce65d05ebc4d2abc15440a41a870b55880e9b4d4ae025368a62ec90d5a24 42806 
duply_1.11.3-1_all.deb
Files:
 c10e3c11a34531b554642f458701c161 1617 utils optional duply_1.11.3-1.dsc
 a241e6c0e7133d8b53e958361ea3cdb8 44198 utils optional duply_1.11.3.orig.tar.gz
 ac03ec9304e5b0b466ffde5c15a8fa89 12252 utils optional 
duply_1.11.3-1.debian.tar.xz
 d08fb03b03cba481ee2fc7f75783dbe6 42806 utils optional duply_1.11.3-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQGcBAEBCgAGBQJXgRJkAAoJEPFW6WalEOS8pGEMAIKK48TjtAcbj915CrYYiJCp
2QexD+X3YbE+20aq7977YNJYpdKTjetLpwtR5Udu3O6RHFPHY1jVaXTwhu227yMP
wGWtOkIbqolF9yA2/cfDtBXzRxaLaMvci6oj1rk1dOPtXbPz3xXcXcXOp1pbFR9g
D4uoqA9Fl1L0m41hpv4gvFP/vPn7AzJxczS5ZgsC5H+COrGBAvYeDo3uKeaEB/ya
2WUgTwSeFz0kfy2txjB7SiRI+wjT64ywpEYX6MkCNv2HuG9emWANOp7xYOVa/ln4
qtzqsZSEJEXh8bFsOf+m5xiTrTHLgC/3ULop2oluQNu+W9s3BzSysGc56PymNr8j
WB2iYN3LUQqICME/wq33nkPNYLcWTYxwNUg34n8Lzo2VRIktnqN9ObuJiB4dJxid
rWPhznRJdnBD7oeswanDiuKHMnUguVRUSq/AG0CYny9iYAkjvYejeNRcLEdsR07d
WN2rGFoNDnyCMMETDgGrOhqL8xtsSAecRMwcRZdBlA==
=bfCR
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to