GPG 2.1 passphrase entry change
Brought to you by:
edso
The method fo unattended passphrase entry has changed with GPG 2.1+, using a new option is required (as well as setting an option in ~/.gpg-agent.conf) to achieve the same functionality.
Please see the upstream issue: https://bugs.g10code.com/gnupg/issue1772
Suggested patch for now to raise awareness:
--- duply-1.9.1-orig 2014-11-28 08:33:07.843465503 -0600
+++ duply-1.9.1-gpg21 2014-11-28 08:36:02.579515130 -0600
@@ -677,6 +677,7 @@
# or "--compress-algo=bzip2 --bzip2-compress-level=9"
# or "--personal-cipher-preferences AES256,AES192,AES..."
# or "--homedir ~/.duply" - keep keyring and gpg settings duply specific
+# or "--pinentry-mode loopback" - for GPG 2.1+
#GPG_OPTS=''
# disable preliminary tests with the following setting
I'm personally still testing and working on this so don't have 100% confirmed what will/won't work with regards to duply/duplicity.
On 28.11.2014 15:41, troy engel wrote:
how about waiting how this is going to play out? seems like they have some nifty backward incompatibility coming their way.
..ede
Related
Bugs:
#76It's as you see fit - Arch has already upgraded GPG so we're already in this situation, users are having to adjust to this new style so that unattended GPG usage works (duply, signing emails, etc.).
-te
you early birds ;)
please come back when you have a solution that works reliably. also wrt. duplicity alone so i can provide a patch set for it as well.
regards.. ede/duply.net
On 29.11.2014 14:03, troy engel wrote:
Related
Bugs:
#76It works, my duply backups have run for a day now OK just using the existing GPG_OPTS="" and a minor config change. Detailed here:
https://wiki.archlinux.org/index.php/Gnupg#Unattended_passphrase
-te
this only regards gpg-agent, right? did you try setting the password in duply conf or PASSPHRASE duplicity env var?
..ede
On 29.11.2014 14:42, troy engel wrote:
Related
Bugs:
#76With 2.1 the agent is required now, there's no way to get a passphrase into gpg without gpg-agent/pinentry (that's the big change, agree with it or not). It's all just basic config in my duply instance conf file with the passphrase set:
$ egrep -v "^(#|$)" .duply/XXXXX/conf
GPG_KEY='XXXXXXXX'
GPG_PW='XXXXXXXX'
GPG_OPTS='--pinentry-mode loopback'
TARGET='gs://YYYY'
TARGET_USER='ZZZZZZZZ'
TARGET_PASS='ZZZZZZZZ'
SOURCE='/home/AAAA'
FILENAME='.duplicity-ignore'
DUPL_PARAMS="$DUPL_PARAMS --exclude-if-present '$FILENAME'"
MAX_AGE=2M
MAX_FULL_BACKUPS=2
That, with this:
$ egrep -v "^(#|$)" .gnupg/gpg-agent.conf
allow-loopback-pinentry
...is what works, From the duply end of things, the only change needed is the one I suggested in the patch for GPG_OPTS, that's it.
-te
works for me as well (FreeBSD).
the fixes will be released with duplicity 1.9.2 . thx for you patience.. ede