Accepted duplicity 0.4.3-2 (source i386)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 19 Sep 2007 22:36:04 +1000
Source: duplicity
Binary: duplicity
Architecture: source i386
Version: 0.4.3-2
Distribution: unstable
Urgency: low
Maintainer: Alexander Zangerl <az@debian.org>
Changed-By: Alexander Zangerl <az@debian.org>
Description:
duplicity - encrypted bandwidth-efficient backup
Closes: 442834 442840
Changes:
duplicity (0.4.3-2) unstable; urgency=low
.
* now suggests ncftp (closes: #442834) and mentions that in NEWS.Debian
i have decided that Recommends: is too strong here, as ftp is a lousy
protocol which should be avoided as much as possible.
* applied upstream fix for leaking ftp passphrases via the commandline
(closes: #442840). the fix works only with ncftp version 3.2.1
and newer, which means etch is out.
* applied upstream patch for upstream-#21123, which fixes another
ftp backend problem.
* finally fixed the superfluous passphrase dialogs
* tidied build process for easier integration into ubuntu, removing
some unnecessary python version dependencies
* applied upstream patch for upstream-#6211, restoring strict host key
checks for the ssh backend.
Files:
7e1ad5f99de3369400431e50ca10311b 663 utils optional duplicity_0.4.3-2.dsc
34a6811369247fd9a22060d658d4da57 10868 utils optional duplicity_0.4.3-2.diff.gz
359eb545fec4f46c7a5855ded2782050 111726 utils optional duplicity_0.4.3-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFG8RiIpy/2bEK9ZF0RAloGAJ9TIAusAX0V87UV2itKSqAvGgOl0QCfSKb1
UUh+lay1lmgTdSvCziF7qwk=
=f/qs
-----END PGP SIGNATURE-----
Accepted:
duplicity_0.4.3-2.diff.gz
to pool/main/d/duplicity/duplicity_0.4.3-2.diff.gz
duplicity_0.4.3-2.dsc
to pool/main/d/duplicity/duplicity_0.4.3-2.dsc
duplicity_0.4.3-2_i386.deb
to pool/main/d/duplicity/duplicity_0.4.3-2_i386.deb
Reply to: