You can subscribe to this list here.
2007 |
Jan
(85) |
Feb
(64) |
Mar
(33) |
Apr
(53) |
May
(6) |
Jun
(5) |
Jul
(1) |
Aug
|
Sep
(5) |
Oct
(19) |
Nov
(2) |
Dec
(2) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2008 |
Jan
|
Feb
(51) |
Mar
(27) |
Apr
(27) |
May
(3) |
Jun
(7) |
Jul
(9) |
Aug
(15) |
Sep
(16) |
Oct
(26) |
Nov
(5) |
Dec
(25) |
2009 |
Jan
(9) |
Feb
(20) |
Mar
(31) |
Apr
(11) |
May
(19) |
Jun
(3) |
Jul
(5) |
Aug
(14) |
Sep
(17) |
Oct
|
Nov
|
Dec
|
2010 |
Jan
(3) |
Feb
(8) |
Mar
|
Apr
(4) |
May
|
Jun
(3) |
Jul
|
Aug
|
Sep
|
Oct
(3) |
Nov
(2) |
Dec
(2) |
2011 |
Jan
(1) |
Feb
(8) |
Mar
(21) |
Apr
(1) |
May
(1) |
Jun
(6) |
Jul
|
Aug
(3) |
Sep
(2) |
Oct
(15) |
Nov
(8) |
Dec
(29) |
2012 |
Jan
(51) |
Feb
(22) |
Mar
(32) |
Apr
(30) |
May
(14) |
Jun
(1) |
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(8) |
2013 |
Jan
(13) |
Feb
(13) |
Mar
(14) |
Apr
(1) |
May
(6) |
Jun
(1) |
Jul
(2) |
Aug
|
Sep
(3) |
Oct
(6) |
Nov
|
Dec
(3) |
2014 |
Jan
|
Feb
(2) |
Mar
(3) |
Apr
(29) |
May
(16) |
Jun
|
Jul
(2) |
Aug
|
Sep
|
Oct
(9) |
Nov
|
Dec
|
2015 |
Jan
|
Feb
(4) |
Mar
(2) |
Apr
|
May
(4) |
Jun
|
Jul
|
Aug
(2) |
Sep
|
Oct
|
Nov
|
Dec
|
2016 |
Jan
|
Feb
|
Mar
|
Apr
(2) |
May
|
Jun
(5) |
Jul
(6) |
Aug
(5) |
Sep
|
Oct
|
Nov
|
Dec
|
2018 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
2019 |
Jan
|
Feb
(1) |
Mar
(1) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2020 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(1) |
Dec
|
From: Frank C. <fr...@cr...> - 2020-11-16 10:51:23
|
This is release 1.5.1 of SafeKeep, a centralized and easy to use backup application that combines the best features of a mirror and an incremental backup. This version is based on Python 3. Many thanks to those who sent in bug reports and fixes, especially Henrik Riomar, that made this release possible, and to Dimi Paun for his work with SafeKeep. Sources and binaries are available from the following locations: - RedHat EL/CentOS 7-8 Fedora 30-34: http://prdownloads.sourceforge.net/safekeep/safekeep-common-1.5.1-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-client-1.5.1-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-server-1.5.1-1.noarch.rpm - Ubuntu Trusty Tahr (14.04 LTS) to Groovy Gorilla (20.10): http://prdownloads.sourceforge.net/safekeep/safekeep-common_1.5.1_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-client_1.5.1_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-server_1.5.1_all.deb - Source: http://prdownloads.sourceforge.net/safekeep/safekeep-1.5.1.tar.gz http://prdownloads.sourceforge.net/safekeep/safekeep-1.5.1-1.src.rpm The GPG Signing Key can be found in the following location: https://raw.githubusercontent.com/dimipaun/safekeep/master/RPM-GPG-KEY-SafeKeep with fingerprint: pub 1024D/4E1CD0E5 2012-02-17 Key fingerprint = B051 E099 25D1 CE50 54DF 227D 96FC 24AC 4E1C D0E5 uid SafeKeep (Signing Key) <saf...@li...> sub 1024g/6AA3270F 2012-02-17 NOTE: The minimum version of Python supported is Python 3.4. If you require support of a Python 2, then you should select a release 1.4.5 of Safekeep. To find out more about the project visit on our website: http://safekeep.sourceforge.net -- Frank Crawford <fr...@cr...> for Dimi Paun <di...@la...> Lattica, Inc. |
From: Frank C. <fr...@cr...> - 2019-03-02 10:51:39
|
This is release 1.5.0 of SafeKeep, a centralized and easy to use backup application that combines the best features of a mirror and an incremental backup. This is a rebase of the source to Python 3, with the same functionality as 1.4.5. Many thanks to all those who sent in bug reports and fixes that made this release possible, and to Dimi Paun for his continual work with SafeKeep. Sources and binaries are available from the following locations: - RedHat EL/CentOS 8 Fedora 30: http://prdownloads.sourceforge.net/safekeep/safekeep-common-1.5.0-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-client-1.5.0-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-server-1.5.0-1.noarch.rpm - Ubuntu Trusty Tahr (14.04 LTS) to Cosmic Cuttlefish (18.10): http://prdownloads.sourceforge.net/safekeep/safekeep-common_1.5.0_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-client_1.5.0_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-server_1.5.0_all.deb - Source: http://prdownloads.sourceforge.net/safekeep/safekeep-1.5.0.tar.gz http://prdownloads.sourceforge.net/safekeep/safekeep-1.5.0-1.src.rpm The GPG Signing Key can be found in the following location: https://raw.githubusercontent.com/dimipaun/safekeep/master/RPM-GPG-KEY-SafeKeep with fingerprint: pub 1024D/4E1CD0E5 2012-02-17 Key fingerprint = B051 E099 25D1 CE50 54DF 227D 96FC 24AC 4E1C D0E5 uid SafeKeep (Signing Key) < saf...@li...> sub 1024g/6AA3270F 2012-02-17 NOTE: The minimum version of Python supported is Python 3.4. If you require support of a Python 2, then you should select a release 1.4.5 of Safekeep. To find out more about the project visit on our website: http://safekeep.sourceforge.net -- Frank Crawford <fr...@cr...> for Dimi Paun <di...@la...> Lattica, Inc. |
From: Frank C. <fr...@cr...> - 2019-02-10 06:39:05
|
I know this has been a long time between releases, this is a cleanup of existing issues before the new release to support Python 3. Frank Crawford --- This is release 1.4.5 of SafeKeep, a centralized and easy to use backup application that combines the best features of a mirror and an incremental backup. This is bug-fix update, primarily as a final Python 2 version. What's in this release: - Make ssh StrictHostKeyChecking configurable in safekeep.conf with 'ask' as default if not configured. - Add make-target debsrc again - Fix compatibility issue with Python 2.4 Many thanks to all those who sent in bug reports and fixes that made this release possible, and to Dimi Paun for his continual work with SafeKeep. Sources and binaries are available from the following locations: - RedHat EL/CentOS 5,6,7 Fedora 12-29: http://prdownloads.sourceforge.net/safekeep/safekeep-common-1.4.5-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-client-1.4.5-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-server-1.4.5-1.noarch.rpm - Ubuntu Trusty Tahr (14.04 LTS) to Cosmic Cuttlefish (18.10): http://prdownloads.sourceforge.net/safekeep/safekeep-common_1.4.5_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-client_1.4.5_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-server_1.4.5_all.deb - Source: http://prdownloads.sourceforge.net/safekeep/safekeep-1.4.5.tar.gz http://prdownloads.sourceforge.net/safekeep/safekeep-1.4.5-1.src.rpm The GPG Signing Key can be found in the following location: https://raw.githubusercontent.com/dimipaun/safekeep/master/RPM-GPG-KEY-SafeKeep with fingerprint: pub 1024D/4E1CD0E5 2012-02-17 Key fingerprint = B051 E099 25D1 CE50 54DF 227D 96FC 24AC 4E1C D0E5 uid SafeKeep (Signing Key) < saf...@li...> sub 1024g/6AA3270F 2012-02-17 NOTE: The minimum version of Python supported is Python 2.3. If you require support of an older version of Python, then you should select an earlier release of Safekeep. To find out more about the project visit on our website: http://safekeep.sourceforge.net -- Frank Crawford <fr...@cr...> for Dimi Paun <di...@la...> Lattica, Inc. |
From: Frank C. <fr...@cr...> - 2018-12-25 11:09:10
|
Folks, I know things have been pretty quite for some time, but here is a Christmas present that may interest some of you, I've started work on moving safekeep to python3. To do this, I've branched the git repository with a new branch call "python3", and updated it with my test version. This was generated by the use of 2to3, and a pit of work to get strings working correctly. So far it has only been lightly tested. I plan to do more testing over the next few weeks, but feel free to try it yourself, and let me know how you go. Note, it is still really an alpha version, but if we get it working properly it will be the basis of all future updates, of which I do have a couple planned. And for those who say, what is the use of safekeep using python3, without rdiff-backup also upgrading, I've also started looking at that, but it is currently even earlier in development. Regards Frank |
From: Frank C. <fr...@cr...> - 2016-08-02 10:37:38
|
Spiro, SafeKeep 1.4.5 and on will maintain support for Python 2.3, for as long as EL5 is supported. However, at some point, there may also be a branch to also support Python 3, if and when rdiff-backup also moves to Python 3. The one thing to note is that we don't rigorously test it on Python 2.3, so issues may occasionally crop up which will need to be addressed. Regards Frank On Tue, 2016-08-02 at 08:53 +1200, Spiro Harvey wrote: > > On 2/08/2016 12:32 a.m., Frank Crawford > wrote: > > > > > > > Folks, > > > > > > > > > > > > Okay, I've pushed a quick one-line fix to GitHub for this and > > pushed an update to EPEL for EL5, which unfortunately will > > > > probably take a fortnight to get out. The new version will be safekeep-1.4.4-2.el5. > > The actual patch is attached. > > > > > Thanks for doing that Frank, really appreciate it. > > > > So going forward, can we expect 1.4.5 to maintain Python 2.3/2.4 > > compatibility or will the requirements shift to minimum Python 2.5? > > > > -- > > > > Kind Regards, > > Spiro Harvey > > Systems Administrator > > > www.DTSanz.com > __________________________________ > > ( > Australian > > Office 1300 054 331/+(61) 7 > > 5522 9726 extn 113 > > ( > New > > Zealand Office 0508 387 669/+(64) 4 > > 918 0160 extn 113 > > ( > Mobile > > +(64) 27 430 1153 > > + spi...@dt... > > Important > Notice: This email, and any material sent with it, contains > information which is confidential and/or privileged. The > information is intended only for the addressee to whom the > > email is directed. If you are not the addressee, you should > not in any way use, distribute, copy or rely on the > > information. If you have received the email in error please > notify the sender immediately and also delete all material > pertaining to the email. DTS gives further notice that It > does not accept responsibility for the content of any email > > transmitted by its staff for any reason other than legitimate > business purposes. > > > > > > > > ------------------------------------------------------------------- ----------- > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Spiro H. <spi...@dt...> - 2016-08-01 21:57:05
|
On 2/08/2016 12:32 a.m., Frank Crawford wrote: > Folks, > > Okay, I've pushed a quick one-line fix to GitHub for this and pushed > an update to EPEL for EL5, which unfortunately will probably take a > fortnight to get out. The new version will be safekeep-1.4.4-2.el5 > <https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-164479d145>. > The actual patch is attached. Thanks for doing that Frank, really appreciate it. So going forward, can we expect 1.4.5 to maintain Python 2.3/2.4 compatibility or will the requirements shift to minimum Python 2.5? -- Kind Regards, Spiro Harvey Systems Administrator <http://www.dtsanz.com> *www.DTSanz.com* <http://www.dtsanz.com/>** __________________________________** (Australian Office 1300 054 331/+(61) 7 5522 9726 extn 113 (New Zealand Office 0508 387 669/+(64) 4 918 0160 extn 113 (Mobile +(64) 27 430 1153 +sp...@dt... <mailto:spi...@dt...> <https://twitter.com/DTSanz><http://www.facebook.com/DTSNewZealand><http://www.linkedin.com/company/2409094?goback=.fcs_GLHD_dts+_false_R_*2_*2_*2_2_*2_*2_*2_*2_*2_*2_*2&trk=ncsrch_hits><http://www.youtube.com/user/dtstech> Important Notice: This email, and any material sent with it, contains information which is confidential and/or privileged. The information is intended only for the addressee to whom the email is directed. If you are not the addressee, you should not in any way use, distribute, copy or rely on the information. If you have received the email in error please notify the sender immediately and also delete all material pertaining to the email. DTS gives further notice that It does not accept responsibility for the content of any email transmitted by its staff for any reason other than legitimate business purposes. |
From: Ken B. <kb...@ke...> - 2016-08-01 15:33:32
|
Thanks for the quick response. I use SafeKeep as a local file based backup solution for all my Linux servers and duplicity with encryption for off-site backups. I certainly hope people out there are still using this software. On 08/01/2016 08:32 AM, Frank Crawford wrote: > Folks, > > Okay, I've pushed a quick one-line fix to GitHub for this and pushed > an update to EPEL for EL5, which unfortunately will probably take a > fortnight to get out. The new version will be safekeep-1.4.4-2.el5 > <https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-164479d145>. > The actual patch is attached. > > Regards > Frank > > On Mon, 2016-08-01 at 20:13 +1000, Frank Crawford wrote: >> Ken, others, >> >> It is good to see that SafeKeep is still being used, particularly on >> older hosts. I've seen three different reports for this since 1.4.4 >> was released, and I've put together a patch which I'll push to GitHub >> later today. >> >> I'll also release an update to EPEL EL5 repo for it, but not for the >> other distributions. >> >> Regards >> Frank >> >> On Sun, 2016-07-31 at 12:44 -0400, Ken Bass wrote: >>> It would appear that git commit be77e020 from @livenson added the >>> following: >>> >>> # XX a not so elegant branching >>> script = cfg['script'].split(':', 1)[1] if mode == 'server' >>> else script >>> debug('%s_side_script: script = %s' % (mode, script)) >>> >>> Centos 5 systems use python 2.4 which does not support the ternary >>> operator added in python 2.5. >>> So this has been broken for a while and I think I was running 1.4.2. >>> I see the backups stopped when I upgraded to 1.4.3. >>> >>> On 07/31/2016 12:05 PM, Ken Bass wrote: >>>> I noticed that my older server running Centos 5 has not backed up since >>>> it was upgraded to safekeep 1.4.4.-1.el5 (previously running 1.4.3). >>>> >>>> INFO: No increments older than Sun Jul 24 11:56:25 2016 found, exiting. >>>> File "/usr/bin/safekeep", line 809 >>>> script = cfg['script'].split(':', 1)[1] if mode == 'server' else script >>>> ^ >>>> SyntaxError: invalid syntax >>>> >>>> >>>> On 07/09/2016 04:06 AM, Frank Crawford wrote: >>>>> This is release 1.4.4 of SafeKeep, a centralized and easy to use >>>>> backup application that combines the best features of a mirror >>>>> and an incremental backup. >>>> ------------------------------------------------------------------------------ >>>> _______________________________________________ >>>> Safekeep-devel mailing list >>>> Saf...@li... >>>> <mailto:Saf...@li...> >>>> https://lists.sourceforge.net/lists/listinfo/safekeep-devel >>> >>> >>> ------------------------------------------------------------------------------ >>> _______________________________________________ >>> Safekeep-devel mailing list >>> Saf...@li... >>> <mailto:Saf...@li...> >>> https://lists.sourceforge.net/lists/listinfo/safekeep-devel >> ------------------------------------------------------------------------------ >> _______________________________________________ >> Safekeep-devel mailing list >> Saf...@li... >> <mailto:Saf...@li...> >> https://lists.sourceforge.net/lists/listinfo/safekeep-devel > > > ------------------------------------------------------------------------------ > > > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Frank C. <fr...@cr...> - 2016-08-01 12:32:34
|
Folks, Okay, I've pushed a quick one-line fix to GitHub for this and pushed an update to EPEL for EL5, which unfortunately will probably take a fortnight to get out. The new version will be safekeep-1.4.4-2.el5. The actual patch is attached. Regards Frank On Mon, 2016-08-01 at 20:13 +1000, Frank Crawford wrote: > Ken, others, > > > > > It is good to see that SafeKeep is still being used, particularly on older hosts. I've seen three different reports for this since 1.4.4 was released, and I've put together a patch which I'll push to GitHub later today. > > > I'll also release an update to EPEL EL5 repo for it, but not for the other distributions. > > Regards > Frank > > On Sun, 2016-07-31 at 12:44 -0400, Ken Bass wrote: > > > > It would appear that git commit be77e020 from @livenson added the > > following: > > > > > > > > # XX a not so elegant branching > > > > > > script = cfg['script'].split(':', 1)[1] if mode == > > 'server' else script > > > > debug('%s_side_script: script = %s' % (mode, > > script)) > > > > > > > > > > Centos 5 systems use python 2.4 which does not support the > > ternary operator added in python 2.5. > > > > So this has been broken for a while and I think I was > > > > running 1.4.2. I see the backups stopped when I upgraded to > > 1.4.3. > > > > > > > > On 07/31/2016 12:05 PM, Ken Bass wrote: > > > > > > > > > > > > I noticed that my older server running Centos 5 has not backed up since > > > > > > it was upgraded to safekeep 1.4.4.-1.el5 (previously running 1.4.3). > > > > > > > > > INFO: No increments older than Sun Jul 24 11:56:25 2016 found, exiting. > > > File "/usr/bin/safekeep", line 809 > > > > > > script = cfg['script'].split(':', 1)[1] if mode == 'server' else script > > > ^ > > > SyntaxError: invalid syntax > > > > > > > > > On 07/09/2016 04:06 AM, Frank Crawford wrote: > > > > > > > > > > > This is release 1.4.4 of SafeKeep, a centralized and easy to use > > > > backup application that combines the best features of a mirror > > > > and an incremental backup. > > > > > > > > > > ----------------------------------------------------------- ------------------- > > > _______________________________________________ > > > Safekeep-devel mailing list > > > Saf...@li... > > > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > > > > > > > > > > > > > > > > > ----------------------------------------------------------------- ------------- > > _______________________________________________ > > Safekeep-devel mailing list > > Saf...@li... > > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > > ------------------------------------------------------------------- ----------- > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Frank C. <fr...@cr...> - 2016-08-01 10:14:11
|
Ken, others, It is good to see that SafeKeep is still being used, particularly on older hosts. I've seen three different reports for this since 1.4.4 was released, and I've put together a patch which I'll push to GitHub later today. I'll also release an update to EPEL EL5 repo for it, but not for the other distributions. Regards Frank On Sun, 2016-07-31 at 12:44 -0400, Ken Bass wrote: > > It would appear that git commit be77e020 from @livenson added the > following: > > > > # XX a not so elegant branching > > > script = cfg['script'].split(':', 1)[1] if mode == > 'server' else script > > debug('%s_side_script: script = %s' % (mode, > script)) > > > > > Centos 5 systems use python 2.4 which does not support the > ternary operator added in python 2.5. > > So this has been broken for a while and I think I was > > running 1.4.2. I see the backups stopped when I upgraded to > 1.4.3. > > > > On 07/31/2016 12:05 PM, Ken Bass wrote: > > > > > > > I noticed that my older server running Centos 5 has not backed up since > > > > it was upgraded to safekeep 1.4.4.-1.el5 (previously running 1.4.3). > > > > > > INFO: No increments older than Sun Jul 24 11:56:25 2016 found, exiting. > > File "/usr/bin/safekeep", line 809 > > > > script = cfg['script'].split(':', 1)[1] if mode == 'server' else script > > ^ > > SyntaxError: invalid syntax > > > > > > On 07/09/2016 04:06 AM, Frank Crawford wrote: > > > > > > > > This is release 1.4.4 of SafeKeep, a centralized and easy to use > > > backup application that combines the best features of a mirror > > > and an incremental backup. > > > > > > > > > ----------------------------------------------------------------- ------------- > > _______________________________________________ > > Safekeep-devel mailing list > > Saf...@li... > > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > > > > > > > > > ------------------------------------------------------------------- ----------- > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Ken B. <kb...@ke...> - 2016-07-31 16:44:51
|
It would appear that git commit be77e020 from @livenson added the following: # XX a not so elegant branching script = cfg['script'].split(':', 1)[1] if mode == 'server' else script debug('%s_side_script: script = %s' % (mode, script)) Centos 5 systems use python 2.4 which does not support the ternary operator added in python 2.5. So this has been broken for a while and I think I was running 1.4.2. I see the backups stopped when I upgraded to 1.4.3. On 07/31/2016 12:05 PM, Ken Bass wrote: > I noticed that my older server running Centos 5 has not backed up since > it was upgraded to safekeep 1.4.4.-1.el5 (previously running 1.4.3). > > INFO: No increments older than Sun Jul 24 11:56:25 2016 found, exiting. > File "/usr/bin/safekeep", line 809 > script = cfg['script'].split(':', 1)[1] if mode == 'server' else script > ^ > SyntaxError: invalid syntax > > > On 07/09/2016 04:06 AM, Frank Crawford wrote: >> This is release 1.4.4 of SafeKeep, a centralized and easy to use >> backup application that combines the best features of a mirror >> and an incremental backup. > > ------------------------------------------------------------------------------ > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Ken B. <kb...@ke...> - 2016-07-31 16:25:05
|
I noticed that my older server running Centos 5 has not backed up since it was upgraded to safekeep 1.4.4.-1.el5 (previously running 1.4.3). INFO: No increments older than Sun Jul 24 11:56:25 2016 found, exiting. File "/usr/bin/safekeep", line 809 script = cfg['script'].split(':', 1)[1] if mode == 'server' else script ^ SyntaxError: invalid syntax On 07/09/2016 04:06 AM, Frank Crawford wrote: > This is release 1.4.4 of SafeKeep, a centralized and easy to use > backup application that combines the best features of a mirror > and an incremental backup. |
From: Frank C. <fr...@cr...> - 2016-07-09 08:06:35
|
This is release 1.4.4 of SafeKeep, a centralized and easy to use backup application that combines the best features of a mirror and an incremental backup. This is bug-fix update, primarily to fix a major issue. What's in this release: - Fix error with key deployment reported by Bruce Cowan <bc...@no...> - Cleanup up some minor issues in the build and deployment process Many thanks to all those who sent in bug reports and fixes that made this release possible, and to Dimi Paun for his continual work with SafeKeep. Sources and binaries are available from the following locations: - RedHat EL/CentOS 5,6,7 Fedora 12-24: http://prdownloads.sourceforge.net/safekeep/safekeep-common-1.4.4-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-client-1.4.4-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-server-1.4.4-1.noarch.rpm - Ubuntu Precise (12.04 LTS) to Yakkety (16.10): http://prdownloads.sourceforge.net/safekeep/safekeep-common_1.4.4_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-client_1.4.4_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-server_1.4.4_all.deb - Source: http://prdownloads.sourceforge.net/safekeep/safekeep-1.4.4.tar.gz http://prdownloads.sourceforge.net/safekeep/safekeep-1.4.4-1.src.rpm The GPG Signing Key can be found in the following location: https://raw.githubusercontent.com/dimipaun/safekeep/master/RPM-GPG-KEY-SafeKeep with fingerprint: pub 1024D/4E1CD0E5 2012-02-17 Key fingerprint = B051 E099 25D1 CE50 54DF 227D 96FC 24AC 4E1C D0E5 uid SafeKeep (Signing Key) <saf...@li...> sub 1024g/6AA3270F 2012-02-17 NOTE: The minimum version of Python supported is Python 2.3. If you require support of an older version of Python, then you should select an earlier release of Safekeep. To find out more about the project visit on our website: http://safekeep.sourceforge.net -- Frank Crawford <fr...@cr...> for Dimi Paun <di...@la...> Lattica, Inc. |
From: Frank C. <fr...@cr...> - 2016-07-05 06:58:31
|
Bruce, Try this patch against the latest version, which should fix your problem. It works for me. Due to the seriousness of this issue, it breaks all deployments, I'll release a new version on the weekend with this and any other issues that may come in. Regards FrankOn Mon, 2016-07-04 at 22:33 +1000, Frank Crawford wrote: > Bruce, > > I've had a quick look at the code, and I think I see the issue. I'll > send you a patch to try sometime tomorrow. It seems to be a bug that > has been lurking for sometime with certain options, and the latest > release has made a small change that now makes it always occur. > > Regards > Frank > > On Fri, 2016-07-01 at 20:19 +1000, Frank Crawford wrote: > > Bruce, > > > > I can't check it for a few days, but it looks to be an issue with > > the python routine we are splitting the string with. For some > > reason it has taken the first argument as part of the command to > > run. > > > > Regards > > Frank > > > > Sent from my iPad > > > > On 1 Jul 2016, at 3:31 am, Bruce Cowan <bc...@no...> wrote: > > > > > Hi, > > > > > > I have been using SafeKeep to automatically back up parts of my > > > work machine to an attached USB drive. This week I changed to a > > > new computer running Ubuntu 16.04 (with SafeKeep 1.4.3), and it > > > no longer works for me. I read through the recent messages, so > > > thought adding ssh.keygen.type = ed25519 to the config file might > > > help, but received the same errors. Here is the output from > > > executing with : --keys -vvv --deploy > > > > > > INFO: Handling keys for client: sidewinder > > > INFO: sidewinder: Key do not exist, generating it now: > > > /home/cowan/.ssh/safekeep-server-ctrl-key > > > DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto > > > generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep- > > > server-ctrl-key > > > DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep > > > auto generated key at cowan@sidewinder" -f > > > /home/cowan/.ssh/safekeep-server-ctrl-key] > > > INFO: sidewinder: Key do not exist, generating it now: > > > /home/cowan/.ssh/safekeep-server-data-key > > > DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto > > > generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep- > > > server-data-key > > > DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep > > > auto generated key at cowan@sidewinder" -f > > > /home/cowan/.ssh/safekeep-server-data-key] > > > DBG: Run [ssh -oStrictHostKeyChecking=no root@sidewinder if test > > > -f .ssh/authorized_keys; then cat .ssh/authorized_keys; fi] > > > ERR: ssh -oStrictHostKeyChecking=no failed: OSError: [Errno 2] No > > > such file or directory > > > ERR: ERROR: too many values to unpack > > > Traceback (most recent call last): > > > File "/usr/bin/safekeep", line 2405, in main > > > do_keys(cfgs, args, nice_cln, identity, keys_status, > > > keys_print, keys_deploy) > > > File "/usr/bin/safekeep", line 1986, in do_keys > > > authtext = call(cmd) > > > File "/usr/bin/safekeep", line 263, in call > > > rc, out = _spawn(args, stdin, stdout=True) > > > ValueError: too many values to unpack > > > > > > I don't know python, but if you don't have access to an Ubuntu > > > 16.04 box, I'm happy to run any test scripts you send me if it > > > will help track down the problem. > > > > > > Regards, > > > Bruce > > > -- > > > Bruce Cowan, Software Engineer > > > National Solar Observatory/ATST > > > Tucson, AZ, USA > > ----------------------------------------------------------------- > > ------------- > > Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in > > San > > Francisco, CA to explore cutting-edge tech and listen to tech > > luminaries > > present their vision of the future. This family event has something > > for > > everyone, including kids. Get more information and register today. > > http://sdm.link/attshape > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > ------------------------------------------------------------------- > ----------- > Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in > San > Francisco, CA to explore cutting-edge tech and listen to tech > luminaries > present their vision of the future. This family event has something > for > everyone, including kids. Get more information and register today. > http://sdm.link/attshape > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > ------------------------------------------------------------------- > ----------- > Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in > San > Francisco, CA to explore cutting-edge tech and listen to tech > luminaries > present their vision of the future. This family event has something > for > everyone, including kids. Get more information and register today. > http://sdm.link/attshape > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Frank C. <fr...@cr...> - 2016-07-04 12:33:23
|
Bruce, I've had a quick look at the code, and I think I see the issue. I'll send you a patch to try sometime tomorrow. It seems to be a bug that has been lurking for sometime with certain options, and the latest release has made a small change that now makes it always occur. Regards FrankOn Fri, 2016-07-01 at 20:19 +1000, Frank Crawford wrote: > Bruce, > > I can't check it for a few days, but it looks to be an issue with the > python routine we are splitting the string with. For some reason it > has taken the first argument as part of the command to run. > > Regards > Frank > > Sent from my iPad > > On 1 Jul 2016, at 3:31 am, Bruce Cowan <bc...@no...> wrote: > > > Hi, > > > > I have been using SafeKeep to automatically back up parts of my > > work machine to an attached USB drive. This week I changed to a new > > computer running Ubuntu 16.04 (with SafeKeep 1.4.3), and it no > > longer works for me. I read through the recent messages, so thought > > adding ssh.keygen.type = ed25519 to the config file might help, but > > received the same errors. Here is the output from executing with : > > --keys -vvv --deploy > > > > INFO: Handling keys for client: sidewinder > > INFO: sidewinder: Key do not exist, generating it now: > > /home/cowan/.ssh/safekeep-server-ctrl-key > > DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto > > generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep- > > server-ctrl-key > > DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto > > generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep- > > server-ctrl-key] > > INFO: sidewinder: Key do not exist, generating it now: > > /home/cowan/.ssh/safekeep-server-data-key > > DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto > > generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep- > > server-data-key > > DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto > > generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep- > > server-data-key] > > DBG: Run [ssh -oStrictHostKeyChecking=no root@sidewinder if test -f > > .ssh/authorized_keys; then cat .ssh/authorized_keys; fi] > > ERR: ssh -oStrictHostKeyChecking=no failed: OSError: [Errno 2] No > > such file or directory > > ERR: ERROR: too many values to unpack > > Traceback (most recent call last): > > File "/usr/bin/safekeep", line 2405, in main > > do_keys(cfgs, args, nice_cln, identity, keys_status, > > keys_print, keys_deploy) > > File "/usr/bin/safekeep", line 1986, in do_keys > > authtext = call(cmd) > > File "/usr/bin/safekeep", line 263, in call > > rc, out = _spawn(args, stdin, stdout=True) > > ValueError: too many values to unpack > > > > I don't know python, but if you don't have access to an Ubuntu > > 16.04 box, I'm happy to run any test scripts you send me if it will > > help track down the problem. > > > > Regards, > > Bruce > > -- > > Bruce Cowan, Software Engineer > > National Solar Observatory/ATST > > Tucson, AZ, USA > ------------------------------------------------------------------- > ----------- > Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in > San > Francisco, CA to explore cutting-edge tech and listen to tech > luminaries > present their vision of the future. This family event has something > for > everyone, including kids. Get more information and register today. > http://sdm.link/attshape > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > ------------------------------------------------------------------- > ----------- > Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in > San > Francisco, CA to explore cutting-edge tech and listen to tech > luminaries > present their vision of the future. This family event has something > for > everyone, including kids. Get more information and register today. > http://sdm.link/attshape > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Frank C. <fr...@cr...> - 2016-07-01 10:19:50
|
Bruce, I can't check it for a few days, but it looks to be an issue with the python routine we are splitting the string with. For some reason it has taken the first argument as part of the command to run. Regards Frank Sent from my iPad > On 1 Jul 2016, at 3:31 am, Bruce Cowan <bc...@no...> wrote: > > Hi, > > I have been using SafeKeep to automatically back up parts of my work machine to an attached USB drive. This week I changed to a new computer running Ubuntu 16.04 (with SafeKeep 1.4.3), and it no longer works for me. I read through the recent messages, so thought adding ssh.keygen.type = ed25519 to the config file might help, but received the same errors. Here is the output from executing with : --keys -vvv --deploy > > INFO: Handling keys for client: sidewinder > INFO: sidewinder: Key do not exist, generating it now: /home/cowan/.ssh/safekeep-server-ctrl-key > DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep-server-ctrl-key > DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep-server-ctrl-key] > INFO: sidewinder: Key do not exist, generating it now: /home/cowan/.ssh/safekeep-server-data-key > DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep-server-data-key > DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f /home/cowan/.ssh/safekeep-server-data-key] > DBG: Run [ssh -oStrictHostKeyChecking=no root@sidewinder if test -f .ssh/authorized_keys; then cat .ssh/authorized_keys; fi] > ERR: ssh -oStrictHostKeyChecking=no failed: OSError: [Errno 2] No such file or directory > ERR: ERROR: too many values to unpack > Traceback (most recent call last): > File "/usr/bin/safekeep", line 2405, in main > do_keys(cfgs, args, nice_cln, identity, keys_status, keys_print, keys_deploy) > File "/usr/bin/safekeep", line 1986, in do_keys > authtext = call(cmd) > File "/usr/bin/safekeep", line 263, in call > rc, out = _spawn(args, stdin, stdout=True) > ValueError: too many values to unpack > > I don't know python, but if you don't have access to an Ubuntu 16.04 box, I'm happy to run any test scripts you send me if it will help track down the problem. > > Regards, > Bruce > -- > Bruce Cowan, Software Engineer > National Solar Observatory/ATST > Tucson, AZ, USA > ------------------------------------------------------------------------------ > Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in San > Francisco, CA to explore cutting-edge tech and listen to tech luminaries > present their vision of the future. This family event has something for > everyone, including kids. Get more information and register today. > http://sdm.link/attshape > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Bruce C. <bc...@no...> - 2016-06-30 17:32:08
|
<html> <head> <meta http-equiv="content-type" content="text/html; charset=utf-8"> </head> <body text="#000000" bgcolor="#FFFFFF"> <font size="+1">Hi,<br> <br> I have been using SafeKeep to automatically back up parts of my work machine to an attached USB drive. This week I changed to a new computer running Ubuntu 16.04 (with SafeKeep 1.4.3), and it no longer works for me. I read through the recent messages, so thought adding ssh.keygen.type = ed25519 to the config file might help, but received the same errors. Here is the output from executing with : --keys -vvv --deploy<br> <br> </font> <pre wrap="">INFO: Handling keys for client: sidewinder INFO: sidewinder: Key do not exist, generating it now: <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>home/cowan<span class="moz-txt-tag">/</span></i>.ssh/safekeep-server-ctrl-key DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>home/cowan<span class="moz-txt-tag">/</span></i>.ssh/safekeep-server-ctrl-key DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>home/cowan<span class="moz-txt-tag">/</span></i>.ssh/safekeep-server-ctrl-key] INFO: sidewinder: Key do not exist, generating it now: <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>home/cowan<span class="moz-txt-tag">/</span></i>.ssh/safekeep-server-data-key DBG: ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>home/cowan<span class="moz-txt-tag">/</span></i>.ssh/safekeep-server-data-key DBG: Run [ssh-keygen -q -b 4096 -t ed25519 -N "" -C "SafeKeep auto generated key at cowan@sidewinder" -f <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>home/cowan<span class="moz-txt-tag">/</span></i>.ssh/safekeep-server-data-key] DBG: Run [ssh -oStrictHostKeyChecking=no root@sidewinder if test -f .ssh/authorized_keys; then cat .ssh/authorized_keys; fi] ERR: ssh -oStrictHostKeyChecking=no failed: OSError: [Errno 2] No such file or directory ERR: ERROR: too many values to unpack Traceback (most recent call last): File "/usr/bin/safekeep", line 2405, in main do_keys(cfgs, args, nice_cln, identity, keys_status, keys_print, keys_deploy) File "/usr/bin/safekeep", line 1986, in do_keys authtext = call(cmd) File "/usr/bin/safekeep", line 263, in call rc, out = _spawn(args, stdin, stdout=True) ValueError: too many values to unpack </pre> I don't know python, but if you don't have access to an Ubuntu 16.04 box, I'm happy to run any test scripts you send me if it will help track down the problem.<br> <br> Regards,<br> Bruce<br> <pre class="moz-signature" cols="72">-- Bruce Cowan, Software Engineer National Solar Observatory/ATST Tucson, AZ, USA</pre> </body> </html> |
From: Frank C. <fr...@cr...> - 2016-06-21 13:15:16
|
This is release 1.4.3 of SafeKeep, a centralized and easy to use backup application that combines the best features of a mirror and an incremental backup. This is primarily a long delayed update, and includes a number of enhancements and bug fixes. What's in this release: - Updated server-side scripting and general cleanups of code and documentation - Documentation cleanup - Optionally remove CREATE DATABASE statement in dumps as proposed by Marco Bozzolan <ma...@s1...> - Added configuration option to specify ssh-keygen settings - Attempt normal lvremove before invoking dmsetup for cleanup - Correct email subject for errors during list output - Added locking on the server to stop overlapping runs - Update documentation for SSH change - Support for SSH ed25519 keys, switch default key type to RSA from Alexander List <al...@li...> - Added server side startup hook support. - Fixed a couple of small bugs related to: - report errors during server cleanups, - missing remote scripts, and - client errors not reported by server during cleanups. - Sort entries based on IDs as proposed by Carl Franks <ca...@fi...> - Applied long outstanding patches from 2014 - Fix lvremove error as reported by Eric Aslakson <eri...@ho...> - Clean up html generation with patches from Stanislav Blokhin <sta...@to...> Many thanks to all those who sent in bug reports and fixes that made this release possible, and to Dimi Paun for his continual work with SafeKeep. Sources and binaries are available from the following locations: - RedHat EL/CentOS 5,6,7 Fedora 12-24: http://prdownloads.sourceforge.net/safekeep/safekeep-common-1.4.3-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-client-1.4.3-1.noarch.rpm http://prdownloads.sourceforge.net/safekeep/safekeep-server-1.4.3-1.noarch.rpm - Ubuntu Precise (12.04 LTS) to Yakkety (16.10): http://prdownloads.sourceforge.net/safekeep/safekeep-common_1.4.3_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-client_1.4.3_all.deb http://prdownloads.sourceforge.net/safekeep/safekeep-server_1.4.3_all.deb - Source: http://prdownloads.sourceforge.net/safekeep/safekeep-1.4.3.tar.gz http://prdownloads.sourceforge.net/safekeep/safekeep-1.4.3-1.src.rpm The GPG Signing Key can be found in the following location: https://raw.githubusercontent.com/dimipaun/safekeep/master/RPM-GPG-KEY-SafeKeep with fingerprint: pub 1024D/4E1CD0E5 2012-02-17 Key fingerprint = B051 E099 25D1 CE50 54DF 227D 96FC 24AC 4E1C D0E5 uid SafeKeep (Signing Key) <saf...@li...> sub 1024g/6AA3270F 2012-02-17 NOTE: The minimum version of Python supported is Python 2.3. If you require support of an older version of Python, then you should select an earlier release of Safekeep. To find out more about the project visit on our website: http://safekeep.sourceforge.net -- Frank Crawford <fr...@cr...> for Dimi Paun <di...@la...> Lattica, Inc. |
From: Frank C. <fr...@cr...> - 2016-06-14 10:58:05
|
Yep, I plan to do that in the next week. What fun. FrankOn Mon, 2016-06-13 at 12:25 +0000, Dimi Paun wrote: > Hi Frank, > Nice to see you back in action! > I've looked at the patches and they look good, I guess you can pull > the trigger on the release any time now. > Cheers, > > On Sun, Jun 5, 2016, 8:50 AM Frank Crawford <fr...@cr... > > wrote: > > Folks, > > > > I know it have been very quiet on this list and the work with > > Safekeep for some time now, but I've found some time to get back > > into it. In the meantime, here is a list the patches that have > > been applied over the last few years: > > > > Updated server-side scripting and general cleanups of code and > > documentation > > Documentation cleanup > > Optionally remove CREATE DATABASE statement in dumps as > > proposed by Marco Bozzolan <ma...@s1...> > > Added configuration option to specify ssh-keygen settings > > Attempt normal lvremove before invoking dmsetup for cleanup > > Correct email subject for errors during list output > > Added locking on the server to stop overlapping runs > > Update documentation for SSH change > > Support for SSH ed25519 keys, switch default key type to RSA > > from Alexander List <al...@li...> > > Added server side startup hook support. > > Fixed a couple of small bugs related to: > > - report errors during server cleanups, > > - missing remote scripts, and > > - client errors not reported by server during cleanups. > > Sort entries based on IDs as proposed by Carl Franks > > artist.com> > > Applied long outstanding patches from 2014 > > - Fix lvremove error as reported by Eric Aslakson > > @hotmail.com> > > - Clean up html generation with patches from Stanislav Blokhin > > <sta...@to...> > > > > There are a few more updates I am planning before a new release, > > probably only a week or so. > > > > In the meantime, as some of these items have only been lightly > > tested, it would be nice if someone other than myself did some > > testing. > > > > You can pick up the latest version from GitHub: https://github.com/ > > dimipaun/safekeep.git > > > > Any questions, let me know. > > > > Regards > > Frank > > ----------------------------------------------------------------- > > ------------- > > What NetFlow Analyzer can do for you? Monitors network bandwidth > > and traffic > > patterns at an interface-level. Reveals which users, apps, and > > protocols are > > consuming the most bandwidth. Provides multi-vendor support for > > NetFlow, > > J-Flow, sFlow and other flows. Make informed decisions using > > capacity > > planning reports. https://ad.doubleclick.net/ddm/clk/305295220;1326 > > 59582;e_______________________________________________ > > Safekeep-devel mailing list > > Saf...@li... > > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > > > -- > Dimi Paun > Chief Executive Officer > M / 416-568-0102 > E / di...@la... > W/ lattica.com > Lattica Inc., 10 Four Seasons Place, Suite 1000, Toronto, Canada > ------------------------------------------------------------------- > ----------- > What NetFlow Analyzer can do for you? Monitors network bandwidth and > traffic > patterns at an interface-level. Reveals which users, apps, and > protocols are > consuming the most bandwidth. Provides multi-vendor support for > NetFlow, > J-Flow, sFlow and other flows. Make informed decisions using > capacity > planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659 > 582;e > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Dimi P. <di...@la...> - 2016-06-13 12:50:14
|
Hi Frank, Nice to see you back in action! I've looked at the patches and they look good, I guess you can pull the trigger on the release any time now. Cheers, On Sun, Jun 5, 2016, 8:50 AM Frank Crawford <fr...@cr...> wrote: > Folks, > > I know it have been very quiet on this list and the work with Safekeep for > some time now, but I've found some time to get back into it. In the > meantime, here is a list the patches that have been applied over the last > few years: > > Updated server-side scripting and general cleanups of code and > documentation > Documentation cleanup > Optionally remove CREATE DATABASE statement in dumps as proposed by > Marco Bozzolan <ma...@s1...> > Added configuration option to specify ssh-keygen settings > Attempt normal lvremove before invoking dmsetup for cleanup > Correct email subject for errors during list output > Added locking on the server to stop overlapping runs > Update documentation for SSH change > Support for SSH ed25519 keys, switch default key type to RSA from > Alexander List <al...@li...> > Added server side startup hook support. > Fixed a couple of small bugs related to: > - report errors during server cleanups, > - missing remote scripts, and > - client errors not reported by server during cleanups. > Sort entries based on IDs as proposed by Carl Franks < > ca...@fi...> > Applied long outstanding patches from 2014 > - Fix lvremove error as reported by Eric Aslakson < > eri...@ho...> > - Clean up html generation with patches from Stanislav Blokhin < > sta...@to...> > > There are a few more updates I am planning before a new release, probably > only a week or so. > > In the meantime, as some of these items have only been lightly tested, it > would be nice if someone other than myself did some testing. > > You can pick up the latest version from GitHub: > https://github.com/dimipaun/safekeep.git > > Any questions, let me know. > > Regards > Frank > > ------------------------------------------------------------------------------ > What NetFlow Analyzer can do for you? Monitors network bandwidth and > traffic > patterns at an interface-level. Reveals which users, apps, and protocols > are > consuming the most bandwidth. Provides multi-vendor support for NetFlow, > J-Flow, sFlow and other flows. Make informed decisions using capacity > planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel > -- *Dimi Paun*Chief Executive Officer *M* / 416-568-0102 *E* / di...@la... *W*/ lattica.com <http://www.lattica.com> Lattica Inc., 10 Four Seasons Place, Suite 1000, Toronto, Canada |
From: Frank C. <fr...@cr...> - 2016-06-05 12:50:20
|
Folks, I know it have been very quiet on this list and the work with Safekeep for some time now, but I've found some time to get back into it. In the meantime, here is a list the patches that have been applied over the last few years: Updated server-side scripting and general cleanups of code and documentation Documentation cleanup Optionally remove CREATE DATABASE statement in dumps as proposed by Marco Bozzolan <ma...@s1...> Added configuration option to specify ssh-keygen settings Attempt normal lvremove before invoking dmsetup for cleanup Correct email subject for errors during list output Added locking on the server to stop overlapping runs Update documentation for SSH change Support for SSH ed25519 keys, switch default key type to RSA from Alexander List <al...@li...> Added server side startup hook support. Fixed a couple of small bugs related to: - report errors during server cleanups, - missing remote scripts, and - client errors not reported by server during cleanups. Sort entries based on IDs as proposed by Carl Franks <carl@firearti st.com> Applied long outstanding patches from 2014 - Fix lvremove error as reported by Eric Aslakson <ericaslakson@hot mail.com> - Clean up html generation with patches from Stanislav Blokhin <sta nis...@to...> There are a few more updates I am planning before a new release, probably only a week or so. In the meantime, as some of these items have only been lightly tested, it would be nice if someone other than myself did some testing. You can pick up the latest version from GitHub: https://github.com/dimi paun/safekeep.git Any questions, let me know. Regards Frank |
From: Frank C. <fr...@cr...> - 2016-04-28 10:32:35
|
Alexander, Thanks for that patch. I did notice that recently and was going to code something up to fix it, however, you beat me to it. I'll apply it shortly. I was also thinking of going further and making it a possible configuration option, either globally or on a host by host basis. What do you think? Regards Frank On Thu, 2016-04-28 at 16:10 +0800, Alexander List wrote: > Hi, > > unfortunately the key types used for SSH connections are hardcoded in > safekeep. > > Ubuntu 16.04 LTS comes with a newer version of OpenSSH which does not > permit ssh-dss keys anymore by default. That means people who upgrade > their machines will see their backups failing all of a sudden. > > The first step to rectify this is to add ed25519 to the list of > supported keys, the second step is to use RSA keys instead of DSS > keys, > and bumping up the key length from 1024 to 4096 bits. > > I don't think we have to move to automatically generating ed25519 > keys > for now, as that may not work with older clients to be backed up... > > Attached is a patch that achieves steps 1 and 2. > > BTW, it would be great if you could move to github.com - then this > would > just have been a pull request ;) > > Best regards > > Alex > > > ------------------------------------------------------------------- > ----------- > Find and fix application performance issues faster with Applications > Manager > Applications Manager provides deep performance insights into multiple > tiers of > your business applications. It resolves application problems quickly > and > reduces your MTTR. Get your free trial! > https://ad.doubleclick.net/ddm/clk/302982198;130105516;z > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Alexander L. <al...@li...> - 2016-04-28 08:25:34
|
Hi, unfortunately the key types used for SSH connections are hardcoded in safekeep. Ubuntu 16.04 LTS comes with a newer version of OpenSSH which does not permit ssh-dss keys anymore by default. That means people who upgrade their machines will see their backups failing all of a sudden. The first step to rectify this is to add ed25519 to the list of supported keys, the second step is to use RSA keys instead of DSS keys, and bumping up the key length from 1024 to 4096 bits. I don't think we have to move to automatically generating ed25519 keys for now, as that may not work with older clients to be backed up... Attached is a patch that achieves steps 1 and 2. BTW, it would be great if you could move to github.com - then this would just have been a pull request ;) Best regards Alex -- "Those who surrender freedom for security will not have, nor do they deserve, either one." -- Benjamin Franklin |
From: Frank C. <fr...@cr...> - 2015-08-15 02:04:42
|
Jan, This is more an issue with rdiff-backup than safekeep and may be better discussed on the rdiff-backup list (<rdi...@no...>). Two things to do would be also bump up the verbosity on safekeep (i.e. multiple -v's on the run) as well for rdiff-backup, which you have done, and to send us more of the output to see if we can see anything else. Also, don't discount an OS bug, as I remember seeing reports of issues with futex kernel locking recently, which could cause issues like this. Given it is different files each time, it is probably not data dependent, but may be either time or a race condition. Sorry, can't help more at the moment, as there aren't enough details. Regards Frank On Fri, 2015-08-14 at 16:33 +0200, Jan Škoda wrote: > Hello, > > I am using safekeep for filesystem backup through rdiff-backup. The > backup process however often hangs in the middle of a file (different > file every time) for some servers. With '-v6' option log contains: > > > ... > > Processing changed file srv/mapcache/cz/bku_orto1.db > > Regular copying ('srv', 'mapcache', 'cz', 'bku_orto1.db') > > to/disk0/backup/cache2.geo--cache/srv/mapcache/cz/rdiff > > -backup.tmp.5 > > The file: > > -rw-rw-r-- 1 boris mapcache 4.5G Dec 2 2014 > > /srv/mapcache/cz/bku_orto1.db > Resulting tmp file: > > -rw------- 1 safekeep nogroup 1.4G Aug 14 15:31 rdiff-backup.tmp.5 > > According to strace, all processes (safekeep and rdiff-backup) are > waiting for input through some pipe. I use trickle and almost default > configuration of safekeep (just backup.user and base.dir set). > > Does anyone have an idea how to debug or fix this problem? > > Thank you! > -- > Jan Škoda > > > --------------------------------------------------------------------- > --------- > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |
From: Jan Š. <sk...@js...> - 2015-08-14 14:48:42
|
Hello, I am using safekeep for filesystem backup through rdiff-backup. The backup process however often hangs in the middle of a file (different file every time) for some servers. With '-v6' option log contains: > ... > Processing changed file srv/mapcache/cz/bku_orto1.db > Regular copying ('srv', 'mapcache', 'cz', 'bku_orto1.db') to/disk0/backup/cache2.geo--cache/srv/mapcache/cz/rdiff-backup.tmp.5 The file: > -rw-rw-r-- 1 boris mapcache 4.5G Dec 2 2014 /srv/mapcache/cz/bku_orto1.db Resulting tmp file: > -rw------- 1 safekeep nogroup 1.4G Aug 14 15:31 rdiff-backup.tmp.5 According to strace, all processes (safekeep and rdiff-backup) are waiting for input through some pipe. I use trickle and almost default configuration of safekeep (just backup.user and base.dir set). Does anyone have an idea how to debug or fix this problem? Thank you! -- Jan Škoda |
From: Frank C. <fr...@cr...> - 2015-05-07 11:52:26
|
Jan, Thanks. I don't know why there was an issue with the keys, but the way you have describe it should be okay. Also, I'll have a look at the ploop details and see what I can come up with. Regards Frank On Wed, 2015-05-06 at 21:28 +0200, Jan Škoda wrote: > On 6.5.2015 13:11, Frank Crawford wrote: > > In particular, if you are mainly talking about distributing root's keys, > > then it will work fine, with standard protection. > > I finally got it to work by copying the backup id_rsa key over > safekeep-server-*-key and deleting safekeep-server-*-key.pub (dont know > why the deletition was necessary). It's kind of dirty though, but easy > to automate. > > > Alternatively, do you have more details about ploop, so I can look at > > what it would take to add it. > > Standard way to backup openvz vm is: > https://openvz.org/Ploop/Backup#File-based_backup > > There are also lower-level commands for manipulating ploop: > https://openvz.org/Ploop/readme > > I could add the above code as pre and post-backup hook, but as there are > no backup tools able to incrementally and consistently backup openvz vm, > I think it would be great if safekeep could do that :). > > -- > Jan Škoda > > ------------------------------------------------------------------------------ > One dashboard for servers and applications across Physical-Virtual-Cloud > Widest out-of-the-box monitoring support with 50+ applications > Performance metrics, stats and reports that give you Actionable Insights > Deep dive visibility with transaction tracing using APM Insight. > http://ad.doubleclick.net/ddm/clk/290420510;117567292;y > _______________________________________________ Safekeep-devel mailing list Saf...@li... https://lists.sourceforge.net/lists/listinfo/safekeep-devel |