signer and verifier have been deprecated

Bug #1750633 reported by Brianna Poulos
22
This bug affects 4 people
Affects Status Importance Assigned to Milestone
Cursive
Fix Released
Undecided
Tobias Urdin
paramiko (Ubuntu)
Invalid
Undecided
Unassigned

Bug Description

The cryptography library has deprecated the use of signer and verifier as of version 2.0 (see https://cryptography.io/en/latest/changelog/#v2-0 for changelog).

The cursive library uses signer and verifier, and should be updated to use sign and verify instead.

The following is the deprecation warning:

/opt/stack/cursive/cursive/signature_utils.py:139: DeprecationWarning: signer and verifier have been deprecated. Please use sign and verify instead.

Changed in cursive:
assignee: nobody → Brianna Poulos (brianna-poulos)
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in paramiko (Ubuntu):
status: New → Confirmed
Revision history for this message
Robert Mader (robert.mader-liqd) wrote :

I'd really appreciate a backport of the fix. Some other distributions shipping with paramiko 2.0 ship it already, for example mageia (https://advisories.mageia.org/MGAA-2018-0077.html)

It affects everyone doing backups with duplicity over ssh, most notably when using cronjobs. Probably quite a big group. Unfortunately it's not enough to just set the log verbosity to error.

Revision history for this message
Robert Mader (robert.posteo) wrote :

Here's the link to the upstream fix: https://github.com/paramiko/paramiko/pull/979/commits/fdc09c9f93fd189a6398d5b350a3c91011d9b4cb

I'd like to kindly request a backport (actually simply applying) it.
It's a fairly trivial and I just tested it on my server (18.04) without issues.

no longer affects: duplicity
Revision history for this message
Kenneth Loafman (kenneth-loafman) wrote :

This bug does not involve any paramiko entry points used by duplicity, so I removed the dependency.

If I understand this correctly, then duplicity users just need to 'pip install -U paramiko' to get this fix in the newer versions. It is not something duplicity can do.

Revision history for this message
Robert Mader (robert.mader-liqd) wrote :

Hej Kenneth, thanks for the answer. I agree that this is a sufficient workaround, but for an LTS version of Ubuntu, I think it would be worthwhile considering backporting this fix.

People will use Ubuntu 18.04 for many years to come and many will hit this issue, especially people using it on servers and doing backups with duplicity. Installing packages from pip makes updates more complicated and dangerous and is certainly not the desired state for backup solutions. Maybe the maintainer of paramiko, @jbouse, can comment on that?

Revision history for this message
Tobias Urdin (tobias-urdin) wrote :

The signer and verifier part for signature_utils was fixed in 0.2.2 the certificate_utils part will be fixed by https://review.opendev.org/c/x/cursive/+/864846

Changed in cursive:
status: New → In Progress
Changed in cursive:
assignee: Brianna Poulos (brianna-poulos) → Tobias Urdin (tobias-urdin)
Changed in paramiko (Ubuntu):
status: Confirmed → Invalid
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to cursive (master)

Reviewed: https://review.opendev.org/c/x/cursive/+/864846
Committed: https://opendev.org/x/cursive/commit/ad4437300d06442d7b9cb83e5788a7a8ce091600
Submitter: "Zuul (22348)"
Branch: master

commit ad4437300d06442d7b9cb83e5788a7a8ce091600
Author: Tobias Urdin <email address hidden>
Date: Thu Nov 17 08:35:27 2022 +0000

    Stop using removed verifier and signer methods

    These methods is removed in [1] so we move to our
    wrappers for verifiers introduced in [2] and then
    updateo ur testing to not use signer as well.

    [1] https://github.com/pyca/cryptography/pull/6639
    [2] https://review.opendev.org/c/x/cursive/+/547146

    Closes-Bug: #1750633
    Change-Id: I07b2d9c41c5c659692e5bfd6570b66fd646faa2b

Changed in cursive:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.