package: duplicity
severity: important
tags: security
Version: 0.4.10-1

The boto class in backends.py requires that AWS_ACCESS_KEY_ID and
AWS_SECRET_ACCESS_KEY be set.  However python-boto is perfectly happy
to read these values out of ~/.boto.

The process environment is public; setting passwords i]n the
environment is problematic because everyone on a multi-user system can
read them.  Therefore duplicity really should take advanatge of
python-boto's facility for reading passwords out of config files.

All that needs to happen is that the check for these environment
variables needs to be removed.




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to