-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 19 Sep 2007 22:36:04 +1000 Source: duplicity Binary: duplicity Architecture: source i386 Version: 0.4.3-2 Distribution: unstable Urgency: low Maintainer: Alexander Zangerl <az@debian.org> Changed-By: Alexander Zangerl <az@debian.org> Description: duplicity - encrypted bandwidth-efficient backup Closes: 442834 442840 Changes: duplicity (0.4.3-2) unstable; urgency=low . * now suggests ncftp (closes: #442834) and mentions that in NEWS.Debian i have decided that Recommends: is too strong here, as ftp is a lousy protocol which should be avoided as much as possible. * applied upstream fix for leaking ftp passphrases via the commandline (closes: #442840). the fix works only with ncftp version 3.2.1 and newer, which means etch is out. * applied upstream patch for upstream-#21123, which fixes another ftp backend problem. * finally fixed the superfluous passphrase dialogs * tidied build process for easier integration into ubuntu, removing some unnecessary python version dependencies * applied upstream patch for upstream-#6211, restoring strict host key checks for the ssh backend. Files: 7e1ad5f99de3369400431e50ca10311b 663 utils optional duplicity_0.4.3-2.dsc 34a6811369247fd9a22060d658d4da57 10868 utils optional duplicity_0.4.3-2.diff.gz 359eb545fec4f46c7a5855ded2782050 111726 utils optional duplicity_0.4.3-2_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG8RiIpy/2bEK9ZF0RAloGAJ9TIAusAX0V87UV2itKSqAvGgOl0QCfSKb1 UUh+lay1lmgTdSvCziF7qwk= =f/qs -----END PGP SIGNATURE----- Accepted: duplicity_0.4.3-2.diff.gz to pool/main/d/duplicity/duplicity_0.4.3-2.diff.gz duplicity_0.4.3-2.dsc to pool/main/d/duplicity/duplicity_0.4.3-2.dsc duplicity_0.4.3-2_i386.deb to pool/main/d/duplicity/duplicity_0.4.3-2_i386.deb