duplicity-talk
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Duplicity-talk] Host key authenticity could not be verified


From: Kenneth Loafman
Subject: Re: [Duplicity-talk] Host key authenticity could not be verified
Date: Tue, 25 Sep 2007 09:48:10 -0500
User-agent: Thunderbird 1.5.0.13 (X11/20070824)

Brandon Keepers wrote:
> Here is the output of running duplicity with the -v9 option:
> 
> Reading globbing filelist /etc/duplicity_excludes.txt
> Main action: inc
> Running 'sftp  address@hidden' (attempt #1)
> Timeout waiting for response
> Running 'sftp  address@hidden' failed (attempt #1)

OK, that's really sparse.  Attached is a patch for backends.py that will
print some meaningful info, if there is any to be had.  Again, try with
-v9 and post the entire log from command line down.

Thanks for working with us on this!

...Ken
Index: backends.py
===================================================================
RCS file: /sources/duplicity/duplicity/duplicity/backends.py,v
retrieving revision 1.42
diff -u -r1.42 backends.py
--- backends.py 19 Sep 2007 14:42:44 -0000      1.42
+++ backends.py 25 Sep 2007 14:23:46 -0000
@@ -366,10 +366,11 @@
                                if state == "authorizing":
                                        match = child.expect([self.pexpect.EOF,
                                                                                
  self.pexpect.TIMEOUT,
-                                                                               
  "(?i)password",
+                                                                               
  "(?i)password:",
                                                                                
  "(?i)permission denied",
                                                                                
  "authenticity"],
                                                                                
 timeout = globals.timeout)
+                                       log.Log("State = %s, Before = '%s'" % 
(state, child.before.strip()), 9)
                                        if match == 0:
                                                log.Log("Failed to 
authenticate", 5)
                                                break
@@ -392,6 +393,7 @@
                                                                                
  "authenticity",
                                                                                
  "ETA"],
                                                                                
 timeout = globals.timeout)
+                                       log.Log("State = %s, Before = '%s'" % 
(state, child.before.strip()), 9)
                                        if match == 0:
                                                break
                                        elif match == 1:
@@ -407,6 +409,7 @@
                                                                                
  self.pexpect.TIMEOUT,
                                                                                
  "ETA"],
                                                                                
 timeout = globals.timeout)
+                                       log.Log("State = %s, Before = '%s'" % 
(state, child.before.strip()), 9)
                                        if match == 0:
                                                break
                                        elif match == 1:
@@ -432,10 +435,11 @@
                                match = child.expect([self.pexpect.EOF,
                                                                          
self.pexpect.TIMEOUT,
                                                                          
"sftp>",
-                                                                         
"(?i)password",
+                                                                         
"(?i)password:",
                                                                          
"(?i)permission denied",
                                                                          
"authenticity",
                                                                          
"(?i)no such file or directory"])
+                               log.Log("State = sftp, Before = '%s'" % 
(child.before.strip()), 9)
                                if match == 0:
                                        break
                                elif match == 1:

Attachment: signature.asc
Description: OpenPGP digital signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]