duplicity-team team mailing list archive
-
duplicity-team team
-
Mailing list archive
-
Message #01225
[Bug 504423] Re: duplicity shows sensitive data in process listing
I would argue that exposing the password in an environment variable is
almost as bad as in the command line ("it's safe on most platforms" is
not good enough).
I cannot suggest a solution that would work well for all backends... It
might be useful to have a separate method to provide the password by
giving duplicity the filename that contains it. E.g. via a different
environment variable, or via a command-line option ("duplicity
--pwdfile=/etc/backuppwd ..."). However this won't help if the backend
is a separate executable and has to have the password in the command
line or environment variable - it will still be exposed via /proc. For
builtin backends, this looks like a decently good solution.
--
You received this bug notification because you are a member of
duplicity-team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/504423
Title:
duplicity shows sensitive data in process listing
Status in Duplicity - Bandwidth Efficient Encrypted Backup:
Confirmed
Bug description:
If credentials are given in the command line url parameter these show
up in 'ps'
e.g.
/usr/bin/duplicity --verbosity 4 --encrypt-key FD3846C2 --sign-key
FD3846C2 --gpg-options= --exclude-globbing-filelist
/root/.duply/bkp/exclude /backup/
ftp://<user>:<PASSWORT>@<backupserver>/backup
suggestion is to introduce env vars URL_PASSWORD/URL_USERNAME and to
keep FTP_PASSWORD for ftp backend only and backward compatibility. The
fact that FTP_PASSWORD can be used with nearly all backend is afaik
not documented. Even so duply 1.5.1.4+ will use it until this bug is
resolved.
for the future a config file based auth as mentioned in
http://lists.gnu.org/archive/html/duplicity-talk/2010-01/msg00032.html
could make sense.
.. ede
To manage notifications about this bug go to:
https://bugs.launchpad.net/duplicity/+bug/504423/+subscriptions
References