Package: duplicity
Version: 0.6.24-1
Following warning is raised on stderr:
/usr/lib/python2.7/dist-packages/Crypto/Cipher/blockalgo.py:141: FutureWarning:
CTR mode needs counter parameter, not IV
self._cipher = factory.new(key, *args, **kwargs)
Happens since the upgrade of current python-crypto package:
----
$ zcat /usr/share/doc/python-crypto/changelog.Debian.gz | head -n 8
python-crypto (2.6.1-5+deb8u1) jessie; urgency=high
* debian/patches/CVE-2013-7459.patch: Raise a warning when IV is used with
ECB or CTR and ignored the IV in that case. Thanks to Salvatore Bonaccorso
for the initial patch. (CVE-2013-7459) (Closes:
#849495)
-- Sebastian Ramacher <[email protected]> Tue, 03 Jan 2017 13:56:09 +0100
----
Running duplicity from a cron job now is no longer feasible, as warning
on stderr results in false alerts - at least for everyone monitoring
jobs by watching the stderr output.