[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-11-17 Thread den
I would like to use gkeyring. At the moment I do this... export PASSPHRASE=`gkeyring.py --id 53 -o secret` -- You received this bug notification because you are a member of duplicity-team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/504423 Title: duplicity shows

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-11-17 Thread edso
Den: if your up to it this can definitely built into duplicity. so don't hesitate. Eugene: correct. file based auth is the option targeted. unfortunately nobody tackled it so far. wrt. your empty FTP_PASSWORD issue.. just checked the corresponding source and it should only come up with a

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-11-17 Thread edso
if your willing to test it: - locate duplicity/backends/ftpsbackend.py of your duplcity installation - open with editor - locate line ca. 83 os.write(self.tempfile, user %s %s\n % (self.parsed_url.username, self.password)) - edit and add one line in front of it and indent the original line by 4

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-06-08 Thread Eugene Crosser
It is generally considered more secure to keep passwords in the files, and never put them in the command line or environment variables because they are publicly exposed in many flavors of UNIX. .netrc seems to be the most appropriate way. -- You received this bug notification because you are a

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-06-08 Thread Eugene Crosser
Right now, duplicity (0.6.19) insists on asking the password if it was not specified in the URL or FTP_PASSWORD environment variable, even if lftp (which I use) is happy with the data present in .netrc. -- You received this bug notification because you are a member of duplicity-team, which is

Re: [Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-06-08 Thread edso
On 08.06.2012 13:33, Eugene Crosser wrote: Right now, duplicity (0.6.19) insists on asking the password if it was not specified in the URL or FTP_PASSWORD environment variable, even if lftp (which I use) is happy with the data present in .netrc. can't you just simply set an empty password?

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-06-08 Thread Eugene Crosser
No, if it's empty duplicity will prompt for it. Which is exactly the problem that needs fixing. -- You received this bug notification because you are a member of duplicity-team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/504423 Title: duplicity shows sensitive data

Re: [Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-06-08 Thread edso
On 08.06.2012 14:45, Eugene Crosser wrote: No, if it's empty duplicity will prompt for it. Which is exactly the problem that needs fixing. actually this would need a different bug report as it is not covered by duplicity shows sensitive data in process listing also i am not sure this is

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2012-06-08 Thread Eugene Crosser
I would argue that exposing the password in an environment variable is almost as bad as in the command line (it's safe on most platforms is not good enough). I cannot suggest a solution that would work well for all backends... It might be useful to have a separate method to provide the password

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2011-10-03 Thread Raphaƫl Droz
It seems to be the occasion to support the ~/.netrc file like do most of ftp credentials consumers (ftp, lftp, wget, fetchmail, msmtp, ...) -- You received this bug notification because you are a member of duplicity-team, which is subscribed to the bug report.

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2011-08-17 Thread Kenneth Loafman
** Changed in: duplicity Status: In Progress = Confirmed ** Changed in: duplicity Assignee: Kenneth Loafman (kenneth-loafman) = (unassigned) ** Changed in: duplicity Milestone: 0.6.15 = None -- You received this bug notification because you are a member of duplicity-team, which

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2011-06-13 Thread Kenneth Loafman
** Changed in: duplicity Milestone: 0.6.14 = 0.6.15 -- You received this bug notification because you are a member of duplicity-team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/504423 Title: duplicity shows sensitive data in process listing Status in Duplicity

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2011-03-06 Thread Kenneth Loafman
** Changed in: duplicity Importance: Medium = Low ** Changed in: duplicity Status: New = In Progress ** Changed in: duplicity Milestone: 0.7.00 = 0.6.13 ** Changed in: duplicity Assignee: (unassigned) = Kenneth Loafman (kenneth-loafman) -- You received this bug notification

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2011-01-08 Thread Daniel Hahler
** Description changed: If credentials are given in the command line url parameter these show up in 'ps' e.g. /usr/bin/duplicity --verbosity 4 --encrypt-key FD3846C2 --sign-key FD3846C2 --gpg-options= --exclude-globbing-filelist /root/.duply/bkp/exclude /backup/

[Duplicity-team] [Bug 504423] Re: duplicity shows sensitive data in process listing

2010-09-06 Thread Kenneth Loafman
** Changed in: duplicity Importance: Undecided = Medium ** Changed in: duplicity Milestone: None = 0.6.10 -- duplicity shows sensitive data in process listing https://bugs.launchpad.net/bugs/504423 You received this bug notification because you are a member of duplicity-team, which is a