I think this has gotten even worse in duplicity. I believe this used to
only affect full backups. But now it seems to affect incremental backups
too.
I've attached a simple reproduction script. It basically just does:
PASSPHRASE=one duplicity full /tmp/testdir file://$DIR
PASSPHRASE=two
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: duplicity (Ubuntu Yakkety)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: duplicity (Ubuntu Trusty)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: duplicity (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: duplicity (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Title:
** Also affects: duplicity (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Title:
duplicity allows bad passphrase on full backup if archive
This bug was fixed in the package deja-dup - 34.2-0ubuntu1.1
---
deja-dup (34.2-0ubuntu1.1) xenial; urgency=medium
* debian/patches/clear-cache-before-full-backup.patch:
- Fixes a bug that allowed an incorrect password when making a
new full backup (LP: #918489)
--
This bug was fixed in the package deja-dup - 30.0-0ubuntu4.1
---
deja-dup (30.0-0ubuntu4.1) trusty; urgency=medium
* debian/patches/clear-cache-before-full-backup.patch:
- Fixes a bug that allowed an incorrect password when making a
new full backup (LP: #918489)
--
This bug was fixed in the package deja-dup - 34.2-0ubuntu3.1
---
deja-dup (34.2-0ubuntu3.1) yakkety; urgency=medium
* debian/patches/clear-cache-before-full-backup.patch:
- Fixes a bug that allowed an incorrect password when making a
new full backup (LP: #918489)
--
** Tags removed: verification-needed
** Tags added: verification-done-yakkety
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Title:
duplicity allows bad passphrase on full backup if archive
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Title:
duplicity allows bad passphrase on full backup if archive cache exists
To manage notifications
I tested on trusty and that one worked well. Additionally, I tested the
thought I had that my deja-dup patch might cause a regression when
resuming a full backup. I noted this concern in the bug description
after I wrote the patch.
But thankfully, it does not. Resuming full backups work as
Hello Allison, or anyone else affected,
Accepted deja-dup into yakkety-proposed. The package will build now and
be available at https://launchpad.net/ubuntu/+source/deja-
dup/34.2-0ubuntu3.1 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package. See
I uploaded an update to trusty and yakkety.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Title:
duplicity allows bad passphrase on full backup if archive cache exists
To manage
** Tags removed: verification-needed
** Tags added: verification-needed-xenial
** Description changed:
when doing a backup for the first time, dejadup verifies your passphrase
by having you enter it twice.
on future incremental backups it doesn't need to do this because
entering the
** Also affects: deja-dup (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: deja-dup (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This seems important enough to fix in Yakkety. Could you do that
Michael?
** Also affects: deja-dup (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Changed in: deja-dup (Ubuntu Yakkety)
Status: New => Triaged
--
You received this bug notification because you are a
Hello Allison, or anyone else affected,
Accepted deja-dup into xenial-proposed. The package will build now and
be available at https://launchpad.net/ubuntu/+source/deja-
dup/34.2-0ubuntu1.1 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package. See
** Description changed:
when doing a backup for the first time, dejadup verifies your passphrase
by having you enter it twice.
on future incremental backups it doesn't need to do this because
entering the wrong password will result in the backup failing.
with the periodic 'full'
This bug was fixed in the package deja-dup - 34.3-0ubuntu1
---
deja-dup (34.3-0ubuntu1) zesty; urgency=medium
* New bug-fix upstream release:
- Fixes a bug that allowed an incorrect password when making a
new full backup (LP: #918489)
-- Michael Terry
** Branch linked: lp:~ubuntu-desktop/deja-dup/ubuntu
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/918489
Title:
duplicity allows bad passphrase on full backup if archive cache exists
To manage
** Changed in: deja-dup
Status: Fix Committed => Fix Released
** Also affects: deja-dup (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
22 matches
Mail list logo