Package: duplicity
Version: 0.6.18-1
Severity: normal

The documentation for --sign-key in the duplicity manpage says:

--sign-key key
       This option can be used when backing up, restoring or verifying.
       When backing up, all backup files will be signed with keyid key.
       When  restoring,  duplicity  will  signal an error if any remote
       file is not signed with the given keyid.  key  should  be  an  8
       character  hex  string, like AA0E73D2.

8-character key IDs ("short key IDs") do not precisely identify a GPG
key, and a modest amount of compute time allows generating a key with a
conflicting 8-character key ID.  Please only recommend the use of full
40-character key fingerprints to identify GPG keys.

See http://www.asheesh.org/note/debian/short-key-ids-are-bad-news.html
for more information on the security problems with short key IDs.

- Josh Triplett

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages duplicity depends on:
ii  libc6                  2.13-32
ii  librsync1              0.9.7-9
ii  python                 2.7.2-10
ii  python-gnupginterface  0.3.2-9.1
ii  python2.7              2.7.3~rc2-2.1

Versions of packages duplicity recommends:
ii  python-paramiko  1.7.7.1-2
ii  rsync            3.0.9-1

Versions of packages duplicity suggests:
pn  lftp               <none>
pn  ncftp              <none>
pn  python-boto        <none>
pn  python-cloudfiles  <none>
pn  python-gdata       <none>
pn  python-pexpect     2.4-1
pn  tahoe-lafs         <none>

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to