|
From: | Kenneth Loafman |
Subject: | Re: [Duplicity-talk] Sign-key verification with long fingerprints |
Date: | Thu, 17 Nov 2016 16:32:50 -0600 |
This is indeed a bug, i've run into this before. It seems that it saves whatever you pass in to the duplicity script, but it doesn't do what gpg does and try and expand that to a unique identifier. the work around is to ensure that you pass the long ID to the backup command and not the shortened one~MarkOn Nov 17, 2016, at 12:20, Kenneth Loafman via Duplicity-talk <address@hidden> wrote:Try the verify with 349A3434 as the sign key. It should work....Ken______________________________On Thu, Nov 17, 2016 at 12:25 PM, Richard McGraw via Duplicity-talk <address@hidden> wrote:Hello,
I tried to verify a backup signed with --sign-key <40-digit-hex-string>
duplicity responds with:
Volume was signed by key 349A3434, not
123434343434343C3434343434343734349A3434
Does it imply that signature verification was skipped ? If yes, it
looks like a bug.
--
Richard
_______________________________________________
Duplicity-talk mailing list
address@hidden
https://lists.nongnu.org/mailman/listinfo/duplicity-talk
_________________
Duplicity-talk mailing list
address@hidden
https://lists.nongnu.org/mailman/listinfo/duplicity- talk
[Prev in Thread] | Current Thread | [Next in Thread] |