Package: duplicity
Version: 0.6.24-1

Following warning is raised on stderr:

/usr/lib/python2.7/dist-packages/Crypto/Cipher/blockalgo.py:141: FutureWarning: 
CTR mode needs counter parameter, not IV
  self._cipher = factory.new(key, *args, **kwargs)

Happens since the upgrade of current python-crypto package:

----
$ zcat /usr/share/doc/python-crypto/changelog.Debian.gz | head -n 8
python-crypto (2.6.1-5+deb8u1) jessie; urgency=high

  * debian/patches/CVE-2013-7459.patch: Raise a warning when IV is used with
    ECB or CTR and ignored the IV in that case. Thanks to Salvatore Bonaccorso
    for the initial patch. (CVE-2013-7459) (Closes:
    #849495)

 -- Sebastian Ramacher <sramac...@debian.org>  Tue, 03 Jan 2017 13:56:09 +0100
----

Running duplicity from a cron job now is no longer feasible, as warning
on stderr results in false alerts - at least for everyone monitoring
jobs by watching the stderr output.

Reply via email to