← Back to team overview

duplicity-team team mailing list archive

Re: [Question #284756]: Duplicity 0.7.06 segfaults reliably mid-backup on OS X

 

Question #284756 on Duplicity changed:
https://answers.launchpad.net/duplicity/+question/284756

Jonathan Elchison posted a new comment:
thanks for the quick responses!

i will attempt to organize my replies logically, in separate comments.

first, concerning the unsafe gpg:  gpg marks unsafe whenever it's not
running as the owner of the gpg config file it's using.  this is rare,
except when using sudo.  when backing up files outside of the current
user (as in my case),sudo is what causes the unsafe marker to appear.

this has been this way as long as i can remember, and i don't think it's
related to my python segfault at hand.

here's the relevant output:

*** no sudo (not marked unsafe) ***

$ gpg --version
gpg (GnuPG) 1.4.19
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
        CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

*** with sudo (marked unsafe) ***

$ sudo gpg --version
Password:
gpg: WARNING: unsafe ownership on configuration file `/Users/xxxxx/.gnupg/gpg.conf'
gpg (GnuPG) 1.4.19
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
        CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

more comments to follow on your other suggestions...

-- 
You received this question notification because your team duplicity-team
is an answer contact for Duplicity.