Where does duplicity store the key that it creates?How can I use Duplicity with a symmetric key?How can I use Duplicity with a symmetric key?Duplicity restore reports “Invalid SSH password” when I'm using a private key for connectionHow does Duplicity check for modifications (mtime or checksum)?How can I speed up my Duplicity backup?Bad signatures or NOKEY errors on RPMs I just signedrestore backup files in another server using duplicityWhy does duplicity need a passphrase for OpenPGP encryption?How to restore a Duplicity backup to a new host?Where is the networker public key?Back up using Duplicity through SCP with key-based authentication

Is this food a bread or a loaf?

How would photo IDs work for shapeshifters?

Can I legally use front facing blue light in the UK?

Why airport relocation isn't done gradually?

Is domain driven design an anti-SQL pattern?

Eliminate empty elements from a list with a specific pattern

I’m planning on buying a laser printer but concerned about the life cycle of toner in the machine

What do the Banks children have against barley water?

Travelling to Edinburgh from India

I see my dog run

Are white and non-white police officers equally likely to kill black suspects?

Is there a familial term for apples and pears?

Why is making salt water prohibited on Shabbat?

Symmetry in quantum mechanics

How is it possible for user's password to be changed after storage was encrypted? (on OS X, Android)

Finding files for which a command fails

Copycat chess is back

Where to refill my bottle in India?

Einstein metrics on spheres

How to create a consistent feel for character names in a fantasy setting?

How to deal with fear of taking dependencies

Is Fable (1996) connected in any way to the Fable franchise from Lionhead Studios?

How can I fix this gap between bookcases I made?

extract characters between two commas?



Where does duplicity store the key that it creates?


How can I use Duplicity with a symmetric key?How can I use Duplicity with a symmetric key?Duplicity restore reports “Invalid SSH password” when I'm using a private key for connectionHow does Duplicity check for modifications (mtime or checksum)?How can I speed up my Duplicity backup?Bad signatures or NOKEY errors on RPMs I just signedrestore backup files in another server using duplicityWhy does duplicity need a passphrase for OpenPGP encryption?How to restore a Duplicity backup to a new host?Where is the networker public key?Back up using Duplicity through SCP with key-based authentication






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








1















I started a backup via duplicity without giving it any options. I haven't created any GPG keys myself, so when I ran duplicity, it asked me for a passphrase, then created a key, and successfully backed-up (to BackBlaze B2) with encryption and compression.



Good, but I don't know where the key is stored. Thus if my drive dies then I won't be able to restore the backup. gpg -k gives no output. Where's the key hiding?










share|improve this question







New contributor




0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.


























    1















    I started a backup via duplicity without giving it any options. I haven't created any GPG keys myself, so when I ran duplicity, it asked me for a passphrase, then created a key, and successfully backed-up (to BackBlaze B2) with encryption and compression.



    Good, but I don't know where the key is stored. Thus if my drive dies then I won't be able to restore the backup. gpg -k gives no output. Where's the key hiding?










    share|improve this question







    New contributor




    0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.






















      1












      1








      1








      I started a backup via duplicity without giving it any options. I haven't created any GPG keys myself, so when I ran duplicity, it asked me for a passphrase, then created a key, and successfully backed-up (to BackBlaze B2) with encryption and compression.



      Good, but I don't know where the key is stored. Thus if my drive dies then I won't be able to restore the backup. gpg -k gives no output. Where's the key hiding?










      share|improve this question







      New contributor




      0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.












      I started a backup via duplicity without giving it any options. I haven't created any GPG keys myself, so when I ran duplicity, it asked me for a passphrase, then created a key, and successfully backed-up (to BackBlaze B2) with encryption and compression.



      Good, but I don't know where the key is stored. Thus if my drive dies then I won't be able to restore the backup. gpg -k gives no output. Where's the key hiding?







      gpg duplicity






      share|improve this question







      New contributor




      0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked Apr 4 at 22:27









      0xnick1chandoke0xnick1chandoke

      82




      82




      New contributor




      0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      0xnick1chandoke is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.




















          1 Answer
          1






          active

          oldest

          votes


















          0














          If your (secret) key does exist then it is in the secret keyring of the user used to create the key. That user's keyrings are in a directory named '.gnupg' which is in that user's home directory.



          So the secret key would be here for the user that created it:



          ~/.gnupg/secring.gpg


          However, based on what you wrote, chances are duplicity just used a symmetric key which only consists of the passphrase you entered.



          Reference : https://linux.die.net/man/1/gpg






          share|improve this answer

























          • Haha! I was thinking that GPG was symmetric. (I'm really unfamiliar with crypto ^^;) OK, so in other words, duplicity probably encrypted via a deterministic cipher whose sole argument/secret was the passphrase that I gave, and it doesn't use keys nor entropy at all?

            – 0xnick1chandoke
            Apr 5 at 19:44











          • Forgot to mention: my ~/.gnupg directory does not contain a secring.gpg file.

            – 0xnick1chandoke
            Apr 5 at 19:51











          • This may shed some light concerning using Duplicity with a symmetric key: serverfault.com/questions/173767/…

            – Jack.L
            2 days ago












          • thanks. That article confirms my hypothesis: "[if you're not using --encrypt-key, then] you're using symmetric encryption and the secret key consists of your passphrase exclusively."

            – 0xnick1chandoke
            2 days ago











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );






          0xnick1chandoke is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f961598%2fwhere-does-duplicity-store-the-key-that-it-creates%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          0














          If your (secret) key does exist then it is in the secret keyring of the user used to create the key. That user's keyrings are in a directory named '.gnupg' which is in that user's home directory.



          So the secret key would be here for the user that created it:



          ~/.gnupg/secring.gpg


          However, based on what you wrote, chances are duplicity just used a symmetric key which only consists of the passphrase you entered.



          Reference : https://linux.die.net/man/1/gpg






          share|improve this answer

























          • Haha! I was thinking that GPG was symmetric. (I'm really unfamiliar with crypto ^^;) OK, so in other words, duplicity probably encrypted via a deterministic cipher whose sole argument/secret was the passphrase that I gave, and it doesn't use keys nor entropy at all?

            – 0xnick1chandoke
            Apr 5 at 19:44











          • Forgot to mention: my ~/.gnupg directory does not contain a secring.gpg file.

            – 0xnick1chandoke
            Apr 5 at 19:51











          • This may shed some light concerning using Duplicity with a symmetric key: serverfault.com/questions/173767/…

            – Jack.L
            2 days ago












          • thanks. That article confirms my hypothesis: "[if you're not using --encrypt-key, then] you're using symmetric encryption and the secret key consists of your passphrase exclusively."

            – 0xnick1chandoke
            2 days ago















          0














          If your (secret) key does exist then it is in the secret keyring of the user used to create the key. That user's keyrings are in a directory named '.gnupg' which is in that user's home directory.



          So the secret key would be here for the user that created it:



          ~/.gnupg/secring.gpg


          However, based on what you wrote, chances are duplicity just used a symmetric key which only consists of the passphrase you entered.



          Reference : https://linux.die.net/man/1/gpg






          share|improve this answer

























          • Haha! I was thinking that GPG was symmetric. (I'm really unfamiliar with crypto ^^;) OK, so in other words, duplicity probably encrypted via a deterministic cipher whose sole argument/secret was the passphrase that I gave, and it doesn't use keys nor entropy at all?

            – 0xnick1chandoke
            Apr 5 at 19:44











          • Forgot to mention: my ~/.gnupg directory does not contain a secring.gpg file.

            – 0xnick1chandoke
            Apr 5 at 19:51











          • This may shed some light concerning using Duplicity with a symmetric key: serverfault.com/questions/173767/…

            – Jack.L
            2 days ago












          • thanks. That article confirms my hypothesis: "[if you're not using --encrypt-key, then] you're using symmetric encryption and the secret key consists of your passphrase exclusively."

            – 0xnick1chandoke
            2 days ago













          0












          0








          0







          If your (secret) key does exist then it is in the secret keyring of the user used to create the key. That user's keyrings are in a directory named '.gnupg' which is in that user's home directory.



          So the secret key would be here for the user that created it:



          ~/.gnupg/secring.gpg


          However, based on what you wrote, chances are duplicity just used a symmetric key which only consists of the passphrase you entered.



          Reference : https://linux.die.net/man/1/gpg






          share|improve this answer















          If your (secret) key does exist then it is in the secret keyring of the user used to create the key. That user's keyrings are in a directory named '.gnupg' which is in that user's home directory.



          So the secret key would be here for the user that created it:



          ~/.gnupg/secring.gpg


          However, based on what you wrote, chances are duplicity just used a symmetric key which only consists of the passphrase you entered.



          Reference : https://linux.die.net/man/1/gpg







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited Apr 5 at 9:42

























          answered Apr 5 at 8:31









          Jack.LJack.L

          184




          184












          • Haha! I was thinking that GPG was symmetric. (I'm really unfamiliar with crypto ^^;) OK, so in other words, duplicity probably encrypted via a deterministic cipher whose sole argument/secret was the passphrase that I gave, and it doesn't use keys nor entropy at all?

            – 0xnick1chandoke
            Apr 5 at 19:44











          • Forgot to mention: my ~/.gnupg directory does not contain a secring.gpg file.

            – 0xnick1chandoke
            Apr 5 at 19:51











          • This may shed some light concerning using Duplicity with a symmetric key: serverfault.com/questions/173767/…

            – Jack.L
            2 days ago












          • thanks. That article confirms my hypothesis: "[if you're not using --encrypt-key, then] you're using symmetric encryption and the secret key consists of your passphrase exclusively."

            – 0xnick1chandoke
            2 days ago

















          • Haha! I was thinking that GPG was symmetric. (I'm really unfamiliar with crypto ^^;) OK, so in other words, duplicity probably encrypted via a deterministic cipher whose sole argument/secret was the passphrase that I gave, and it doesn't use keys nor entropy at all?

            – 0xnick1chandoke
            Apr 5 at 19:44











          • Forgot to mention: my ~/.gnupg directory does not contain a secring.gpg file.

            – 0xnick1chandoke
            Apr 5 at 19:51











          • This may shed some light concerning using Duplicity with a symmetric key: serverfault.com/questions/173767/…

            – Jack.L
            2 days ago












          • thanks. That article confirms my hypothesis: "[if you're not using --encrypt-key, then] you're using symmetric encryption and the secret key consists of your passphrase exclusively."

            – 0xnick1chandoke
            2 days ago
















          Haha! I was thinking that GPG was symmetric. (I'm really unfamiliar with crypto ^^;) OK, so in other words, duplicity probably encrypted via a deterministic cipher whose sole argument/secret was the passphrase that I gave, and it doesn't use keys nor entropy at all?

          – 0xnick1chandoke
          Apr 5 at 19:44





          Haha! I was thinking that GPG was symmetric. (I'm really unfamiliar with crypto ^^;) OK, so in other words, duplicity probably encrypted via a deterministic cipher whose sole argument/secret was the passphrase that I gave, and it doesn't use keys nor entropy at all?

          – 0xnick1chandoke
          Apr 5 at 19:44













          Forgot to mention: my ~/.gnupg directory does not contain a secring.gpg file.

          – 0xnick1chandoke
          Apr 5 at 19:51





          Forgot to mention: my ~/.gnupg directory does not contain a secring.gpg file.

          – 0xnick1chandoke
          Apr 5 at 19:51













          This may shed some light concerning using Duplicity with a symmetric key: serverfault.com/questions/173767/…

          – Jack.L
          2 days ago






          This may shed some light concerning using Duplicity with a symmetric key: serverfault.com/questions/173767/…

          – Jack.L
          2 days ago














          thanks. That article confirms my hypothesis: "[if you're not using --encrypt-key, then] you're using symmetric encryption and the secret key consists of your passphrase exclusively."

          – 0xnick1chandoke
          2 days ago





          thanks. That article confirms my hypothesis: "[if you're not using --encrypt-key, then] you're using symmetric encryption and the secret key consists of your passphrase exclusively."

          – 0xnick1chandoke
          2 days ago










          0xnick1chandoke is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          0xnick1chandoke is a new contributor. Be nice, and check out our Code of Conduct.












          0xnick1chandoke is a new contributor. Be nice, and check out our Code of Conduct.











          0xnick1chandoke is a new contributor. Be nice, and check out our Code of Conduct.














          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f961598%2fwhere-does-duplicity-store-the-key-that-it-creates%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020