duplicity-talk
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Duplicity-talk] Adding PGP key to a keychain?


From: edgar . soldin
Subject: Re: [Duplicity-talk] Adding PGP key to a keychain?
Date: Sun, 9 Jul 2023 13:31:50 +0200
User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.12.0

On 08.07.2023 00:36, Scott Classen via Duplicity-talk wrote:
Hello,

I recently migrated our duply/duplicity installation to a new machine running 
Rocky Linux 8.8


Now, when I run any duply tasks I get prompted for the GPG key password…. Which works, 
but it only "remembers" the password for a short amount of time. I do not 
remember this from previous installations.

┌────────────────────────────────────────────────────────────────┐

│ Please enter the passphrase to unlock the OpenPGP secret key:  │

│ “xxxxxxxxxxxxx"                                                │

│ 2048-bit RSA key, ID ABCDEF1234567890,                         │

│ created 2015-09-21.                                            │

│                                                                │

│                                                                │

│ Passphrase: __________________________________________________ │

│                                                                │

│         <OK>                                    <Cancel>       │

└────────────────────────────────────────────────────────────────┘



These are the installed versions:

Start duply v2.4.3, time is 2023-07-07 15:32:02.
Using profile '/etc/duply/home_d'.
Using installed duplicity version 1.2.3, python 3.10.12 
(/root/.conda/envs/duply/bin/python) 
'PYTHONPATH=:/root/.conda/envs/duply/lib/python310.zip:/root/.conda/envs/duply/lib/python3.10:/root/.conda/envs/duply/lib/python3.10/lib-dynload:/root/.conda/envs/duply/lib/python3.10/site-packages',
 gpg 2.2.20 (Home: /root/.gnupg), awk 'GNU Awk 4.2.1, API: 2.0 (GNU MPFR 
3.1.6-p2, GNU MP 6.1.2)', grep 'grep (GNU grep) 3.1', bash '4.4.20(1)-release 
(x86_64-redhat-linux-gnu)’.


How can I prevent this? Is there a way to add the password to a key store or 
keychain of some sort?

hey Scott,

we need more information. ordinarily you would provide the secret key 
passphrase in the duply profile conf file. that should suffice.
can you please
1. provide your conf file
2. run duply with `VERBOSITY=9` temporarily set in conf and provide the first 
100 lines of output
obfuscate private information in them beforehand
?

thanks.. ede/duply.net

reply via email to

[Prev in Thread] Current Thread [Next in Thread]