[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted duplicity 0.4.3-2 (source i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 19 Sep 2007 22:36:04 +1000
Source: duplicity
Binary: duplicity
Architecture: source i386
Version: 0.4.3-2
Distribution: unstable
Urgency: low
Maintainer: Alexander Zangerl <az@debian.org>
Changed-By: Alexander Zangerl <az@debian.org>
Description: 
 duplicity  - encrypted bandwidth-efficient backup
Closes: 442834 442840
Changes: 
 duplicity (0.4.3-2) unstable; urgency=low
 .
   * now suggests ncftp (closes: #442834) and mentions that in NEWS.Debian
     i have decided that Recommends: is too strong here, as ftp is a lousy
     protocol which should be avoided as much as possible.
   * applied upstream fix for leaking ftp passphrases via the commandline
     (closes: #442840). the fix works only with ncftp version 3.2.1
     and newer, which means etch is out.
   * applied upstream patch for upstream-#21123, which fixes another
     ftp backend problem.
   * finally fixed the superfluous passphrase dialogs
   * tidied build process for easier integration into ubuntu, removing
     some unnecessary python version dependencies
   * applied upstream patch for upstream-#6211, restoring strict host key
     checks for the ssh backend.
Files: 
 7e1ad5f99de3369400431e50ca10311b 663 utils optional duplicity_0.4.3-2.dsc
 34a6811369247fd9a22060d658d4da57 10868 utils optional duplicity_0.4.3-2.diff.gz
 359eb545fec4f46c7a5855ded2782050 111726 utils optional duplicity_0.4.3-2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG8RiIpy/2bEK9ZF0RAloGAJ9TIAusAX0V87UV2itKSqAvGgOl0QCfSKb1
UUh+lay1lmgTdSvCziF7qwk=
=f/qs
-----END PGP SIGNATURE-----


Accepted:
duplicity_0.4.3-2.diff.gz
  to pool/main/d/duplicity/duplicity_0.4.3-2.diff.gz
duplicity_0.4.3-2.dsc
  to pool/main/d/duplicity/duplicity_0.4.3-2.dsc
duplicity_0.4.3-2_i386.deb
  to pool/main/d/duplicity/duplicity_0.4.3-2_i386.deb



Reply to: