Package: dar
Version: 2.3.3-1
Severity: normal

A new upstream version of dar (2.3.4) has been released two weeks ago,
which fixes the weakened blowfish encryption code as discovered and
resolved by Dwayne C. Litzenberger.

However, there is a minor difference to the patch which is included
in the current Debian version (2.3.3-1). Instead of assigning the
fixed blowfish encryption mode a new cipher name (blowfish2), the
archive header version has been incremented, thus preserving
backwards compatibility.

With dar 2.3.4, archives created with a previous version will be
decrypted with the weakened blowfish cipher, while newly created
archives are decrypted in fixed blowfish mode cipher mode.

Unfortunately, this renders all encrypted archives created with
the current Debian version unreadable[1]. Thus, the package should
be updated to the latest upstream version as soon as possible.

(To paraphrase: There's a new upstream version available... ;-).)

Regards,
Peter


[1] Just for reference, the script I employed to fix my dar archives.

#!/usr/bin/python
#
# Fix dar archive header version
#
# Copyright (C) 2007  Peter Colberg <[EMAIL PROTECTED]>
# Licensed under the terms of the GNU General Public License.
#
# This script overwrites the dar archive header
# version for archives encrypted with the blowfish2
# cipher in Debian's dar version 2.3.3-1, thus
# making them readable by dar 2.3.4.
#

import sys, os

for fn in sys.argv[1:]:
    f = os.open(fn, os.O_WRONLY)
    os.lseek(f, 0x10, 0)
    os.write(f, '06')
    os.close(f)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to