Package: duplicity Version: 0.6.24-1 Following warning is raised on stderr:
/usr/lib/python2.7/dist-packages/Crypto/Cipher/blockalgo.py:141: FutureWarning: CTR mode needs counter parameter, not IV self._cipher = factory.new(key, *args, **kwargs) Happens since the upgrade of current python-crypto package: ---- $ zcat /usr/share/doc/python-crypto/changelog.Debian.gz | head -n 8 python-crypto (2.6.1-5+deb8u1) jessie; urgency=high * debian/patches/CVE-2013-7459.patch: Raise a warning when IV is used with ECB or CTR and ignored the IV in that case. Thanks to Salvatore Bonaccorso for the initial patch. (CVE-2013-7459) (Closes: #849495) -- Sebastian Ramacher <sramac...@debian.org> Tue, 03 Jan 2017 13:56:09 +0100 ---- Running duplicity from a cron job now is no longer feasible, as warning on stderr results in false alerts - at least for everyone monitoring jobs by watching the stderr output.