GNU bug report logs -
#32303
[PATCH] gnu: Patch duplicity with --ignore-mdc-error.
Previous Next
Reported by: Christopher Baines <mail <at> cbaines.net>
Date: Sun, 29 Jul 2018 15:43:01 UTC
Severity: normal
Tags: patch
Done: Christopher Baines <mail <at> cbaines.net>
Bug is archived. No further changes may be made.
To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 32303 in the body.
You can then email your comments to 32303 AT debbugs.gnu.org in the normal way.
Toggle the display of automated, internal messages from the tracker.
Report forwarded
to
guix-patches <at> gnu.org
:
bug#32303
; Package
guix-patches
.
(Sun, 29 Jul 2018 15:43:01 GMT)
Full text and
rfc822 format available.
Acknowledgement sent
to
Christopher Baines <mail <at> cbaines.net>
:
New bug report received and forwarded. Copy sent to
guix-patches <at> gnu.org
.
(Sun, 29 Jul 2018 15:43:02 GMT)
Full text and
rfc822 format available.
Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):
Modify the package to patch gnu.py with an unreleased upstream change to fix
duplicity working with recent releases of GnuPG. This change make the package
build again.
* gnu/packages/backup.scm (duplicity)[arguments]: Patch gnu.py within the
patch-source phase.
---
gnu/packages/backup.scm | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/gnu/packages/backup.scm b/gnu/packages/backup.scm
index 9884f58fc..0733d9c34 100644
--- a/gnu/packages/backup.scm
+++ b/gnu/packages/backup.scm
@@ -105,6 +105,15 @@
(substitute* "duplicity/gpginterface.py"
(("self.call = 'gpg'")
(string-append "self.call = '" (assoc-ref inputs "gnupg") "/bin/gpg'")))
+
+ ;; This matches up with an unreleased upstream fix, it should be
+ ;; removed when the package is updated
+ ;; https://bazaar.launchpad.net/~duplicity-team/duplicity/0.8-series/revision/1308
+ (substitute* "duplicity/gpg.py"
+ (("--no-secmem-warning'\\)")
+ "--no-secmem-warning')
+ gnupg.options.extra_args.append('--ignore-mdc-error')"))
+
(substitute* '("testing/functional/__init__.py"
"testing/overrides/bin/lftp")
(("/bin/sh") (which "sh")))
--
2.18.0
Reply sent
to
Christopher Baines <mail <at> cbaines.net>
:
You have taken responsibility.
(Sat, 04 Aug 2018 07:50:01 GMT)
Full text and
rfc822 format available.
Notification sent
to
Christopher Baines <mail <at> cbaines.net>
:
bug acknowledged by developer.
(Sat, 04 Aug 2018 07:50:02 GMT)
Full text and
rfc822 format available.
Message #10 received at 32303-done <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
Christopher Baines <mail <at> cbaines.net> writes:
> Modify the package to patch gnu.py with an unreleased upstream change to fix
> duplicity working with recent releases of GnuPG. This change make the package
> build again.
>
> * gnu/packages/backup.scm (duplicity)[arguments]: Patch gnu.py within the
> patch-source phase.
> ---
> gnu/packages/backup.scm | 9 +++++++++
> 1 file changed, 9 insertions(+)
Pushed now :)
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to
guix-patches <at> gnu.org
:
bug#32303
; Package
guix-patches
.
(Tue, 07 Aug 2018 16:57:02 GMT)
Full text and
rfc822 format available.
Message #13 received at 32303 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
On Sun, Jul 29, 2018 at 04:41:52PM +0100, Christopher Baines wrote:
> Modify the package to patch gnu.py with an unreleased upstream change to fix
> duplicity working with recent releases of GnuPG. This change make the package
> build again.
>
> + gnupg.options.extra_args.append('--ignore-mdc-error')"))
Thanks for taking care of this package.
I'm concerned about the impact of this change, and Duplicity in general.
By ignoring the result of the MDC (modification detection code) check, I
*think* Duplicity loses the ability to authenticate its archives. If so,
the Duplicity package description should be changed to reflect this. I
would at least remove the text about safety against modification.
Also and FYI, Duplicity uses the MD4 message digest truncated to 64 bits
(via librsync) to identify chunks for deduplication. [0] MD4 collisions
are trivial to generate.
It's not totally reasonable to remove packages like backup programs
since, in the future, people will want to read the archives they have
created. But perhaps we should steer users away from Duplicity in the
package description.
[0] See:
<https://bugs.launchpad.net/duplicity/+bug/1342721>
... also briefly discussed in our bug tracker:
<https://bugs.gnu.org/30448>
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to
guix-patches <at> gnu.org
:
bug#32303
; Package
guix-patches
.
(Sun, 19 Aug 2018 19:47:02 GMT)
Full text and
rfc822 format available.
Message #16 received at 32303 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
Leo Famulari <leo <at> famulari.name> writes:
> On Sun, Jul 29, 2018 at 04:41:52PM +0100, Christopher Baines wrote:
>> Modify the package to patch gnu.py with an unreleased upstream change to fix
>> duplicity working with recent releases of GnuPG. This change make the package
>> build again.
>>
>> + gnupg.options.extra_args.append('--ignore-mdc-error')"))
>
> Thanks for taking care of this package.
>
> I'm concerned about the impact of this change, and Duplicity in general.
>
> By ignoring the result of the MDC (modification detection code) check, I
> *think* Duplicity loses the ability to authenticate its archives. If so,
> the Duplicity package description should be changed to reflect this. I
> would at least remove the text about safety against modification.
>
> Also and FYI, Duplicity uses the MD4 message digest truncated to 64 bits
> (via librsync) to identify chunks for deduplication. [0] MD4 collisions
> are trivial to generate.
Hmm, this does look like more of an issue that I anticipated. I was
thinking that this was maybe to do with the tests alone, but checking
the upstream change again, it looks like it effects general operation.
> It's not totally reasonable to remove packages like backup programs
> since, in the future, people will want to read the archives they have
> created. But perhaps we should steer users away from Duplicity in the
> package description.
Yeah, removing the statement about "modification" in the description
sounds like a good step. I don't know enough to add something more
informative to the description though.
One extra thing to note is that I use duplicity (well, not much) through
Deja Dup, so if there is issues with duplicity to describe in the
package description, it might be good to add something similar to the
few packages that use duplicity.
Thanks for looking in to this Leo :)
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to
guix-patches <at> gnu.org
:
bug#32303
; Package
guix-patches
.
(Wed, 22 Aug 2018 21:06:01 GMT)
Full text and
rfc822 format available.
Message #19 received at 32303 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
On Sun, Aug 19, 2018 at 08:46:43PM +0100, Christopher Baines wrote:
> Thanks for looking in to this Leo :)
A few days ago, I sent an email to <duplicity-talk <at> nongnu.org>
requesting clarification on how this affects Duplicity. I think my
message is still waiting for moderation but hopefully it goes through.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to
guix-patches <at> gnu.org
:
bug#32303
; Package
guix-patches
.
(Thu, 06 Sep 2018 17:27:01 GMT)
Full text and
rfc822 format available.
Message #22 received at 32303 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
On Wed, Aug 22, 2018 at 05:05:23PM -0400, Leo Famulari wrote:
> A few days ago, I sent an email to <duplicity-talk <at> nongnu.org>
> requesting clarification on how this affects Duplicity. I think my
> message is still waiting for moderation but hopefully it goes through.
The Duplicity project clarified the effect of this change on the
integrity of the backup archives:
"Duplicity does a hash of the entire file so the MDC is duplication of
effort. [...] You are still protected by the hash stored in the
manifest." [0]
Based on that, I think the disabling of GnuPG's integrity check is not
that important in this case.
[0]
https://lists.nongnu.org/archive/html/duplicity-talk/2018-09/msg00005.html
[signature.asc (application/pgp-signature, inline)]
bug archived.
Request was from
Debbugs Internal Request <help-debbugs <at> gnu.org>
to
internal_control <at> debbugs.gnu.org
.
(Fri, 05 Oct 2018 11:24:04 GMT)
Full text and
rfc822 format available.
This bug report was last modified 6 years and 261 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.