[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2021-12-08 Thread Launchpad Bug Tracker
This bug was fixed in the package deja-dup - 37.1-2fakesync1ubuntu0.2 --- deja-dup (37.1-2fakesync1ubuntu0.2) bionic; urgency=medium * debian/patches/invalid_password_handling.patch: - handle correctly when an invalid password is entered (lp: #918489) -- Sebastien

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2021-12-01 Thread Michael Terry
I tested this and it worked! - Made an initial backup, not saving password. - Backed up again, changing the password. With the old version, I got an error at "verify the backup" step. But the backup files did end up being written with the wrong password. With the new version, it did not accept

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2021-12-01 Thread Robie Basak
From a quick glance at the code, Xenial doesn't look fixed to me. Bionic has the issue and so the SRU for Bionic is correct. Focal has the issue fixed. Since Xenial is past the end of standard support I expect it won't be fixed for this issue anyway, but I'm just noting that the bug status may be

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2021-11-30 Thread Sebastien Bacher
** Changed in: deja-dup (Ubuntu Bionic) Status: Triaged => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/918489 Title: duplicity allows a new, different passphrase if an

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2021-11-12 Thread Sebastien Bacher
Upstream closed the duplicity task without details so let's assume it's fixed in the current version and Ubuntu serie ** Changed in: duplicity (Ubuntu Yakkety) Status: Confirmed => Won't Fix ** Changed in: duplicity (Ubuntu) Status: Triaged => Fix Released ** Changed in: deja-dup

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2021-10-30 Thread Michael Terry
It escaped my attention at the time, but Ubuntu 18.04 released with both a version of duplicity that shows the new incremental-backups-also-have- this-issue behavior (see my comment 22) and a release of deja-dup that wasn't yet fixed to avoid it. Which means that deja-dup in Ubuntu 18.04 is still

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2021-04-01 Thread Kenneth Loafman
** Changed in: duplicity Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/918489 Title: duplicity allows a new, different passphrase if an archive cache

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2019-04-10 Thread Jens
IMHO: A backup software that has a "problem when restoring" is completely worthless, not "another issue". If you are doing an encrypted backup and somebody gets access to your passphrase, the safe thing to do is create a completely new backup with a new passphrase, and wipe (and destroy) all

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2019-04-09 Thread Yajo
Although comment 22 is IMHO a duplicity bug, the fact that you can do a full backup with a new passphrase is, for me, a feature. If somebody had access to your passphrase, the safe thing to do is to rotate it, do a full backup, and stick with the new one from there onwards. There's a problem

[Bug 918489] Re: duplicity allows a new, different passphrase if an archive cache exists

2019-04-07 Thread Vej
** Changed in: duplicity Status: New => Confirmed ** Changed in: duplicity (Ubuntu) Importance: Undecided => High ** Changed in: duplicity (Ubuntu) Status: Confirmed => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed