Hi all, The backend server of packages.debian.org that I access is now returning 503. It seems to be affecting multiple users.
% curl -vv https://packages.debian.org/unstable/ink-generator * Host packages.debian.org:443 was resolved. * IPv6: 2603:400a:ffff:bb8::801f:33, 2a02:16a8:dc41:100::132 * IPv4: 128.31.0.51, 195.192.210.132 * Trying 128.31.0.51:443... * Connected to packages.debian.org (128.31.0.51) port 443 * ALPN: curl offers h2,http/1.1 * TLSv1.3 (OUT), TLS handshake, Client hello (1): * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: /etc/ssl/certs * TLSv1.3 (IN), TLS handshake, Server hello (2): * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): * TLSv1.3 (IN), TLS handshake, Certificate (11): * TLSv1.3 (IN), TLS handshake, CERT verify (15): * TLSv1.3 (IN), TLS handshake, Finished (20): * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): * TLSv1.3 (OUT), TLS handshake, Finished (20): * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / RSASSA-PSS * ALPN: server accepted h2 * Server certificate: * subject: CN=packages.debian.org * start date: Feb 12 00:47:35 2024 GMT * expire date: May 12 00:47:34 2024 GMT * subjectAltName: host "packages.debian.org" matched cert's "packages.debian.org" * issuer: C=US; O=Let's Encrypt; CN=R3 * SSL certificate verify ok. * Certificate level 0: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption * using HTTP/2 * [HTTP/2] [1] OPENED stream for https://packages.debian.org/unstable/ink-generator * [HTTP/2] [1] [:method: GET] * [HTTP/2] [1] [:scheme: https] * [HTTP/2] [1] [:authority: packages.debian.org] * [HTTP/2] [1] [:path: /unstable/ink-generator] * [HTTP/2] [1] [user-agent: curl/8.6.0] * [HTTP/2] [1] [accept: */*] > GET /unstable/ink-generator HTTP/2 > Host: packages.debian.org > User-Agent: curl/8.6.0 > Accept: */* > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * old SSL session ID is stale, removing < HTTP/2 503 < date: Sat, 24 Feb 2024 19:43:30 GMT < server: Apache < x-content-type-options: nosniff < x-frame-options: sameorigin < referrer-policy: no-referrer < x-xss-protection: 1 < permissions-policy: interest-cohort=() < strict-transport-security: max-age=15552000 < content-length: 369 < content-type: text/html; charset=iso-8859-1 < <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>503 Service Unavailable</title> </head><body> <h1>Service Unavailable</h1> <p>The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.</p> <hr> <address>Apache Server at packages.debian.org Port 443</address> </body></html> * Connection #0 to host packages.debian.org left intact Thanks, Boyuan
signature.asc
Description: This is a digitally signed message part