-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Stephen Gran un jour écriva:
>
> It sounds like the mirror is toast. Please mail the mirror admins.
> I don't have an email address off hand, sorry, but it should be
> either on the mirrors page or the organization page of debian.org.
Behin
This one time, at band camp, Hedges, Mark said:
> > So, will someone take this seriously?
>
> Now I tried update again with no further changes and it is totally
> fubar:
It sounds like the mirror is toast. Please mail the mirror admins. I
don't have an email address off hand, sorry, but it shou
> So, will someone take this seriously?
Now I tried update again with no further changes and it is totally
fubar:
Failed to fetch
http://ftp.us.debian.org/debian/dists/testing/main/binary-i386/Packages.
bz2 MD5Sum mismatch
Failed to fetch
http://ftp.us.debian.org/debian/dists/testing/contrib/bin
>
> I had debian-archive-keyring installed already. I still get
> the error. But it is sporadic -- usually if I wait a few
> hours or switch direct to klecker (or back if klecker gives
> the error) (or to and from ftp.us and the frontiernet mirror)
> and try update again, it is fine, witho
From: "Sam Morris" <[EMAIL PROTECTED]>
Date: Fri, 1 Sep 2006 00:01:03 + (UTC)
On Thu, 31 Aug 2006 11:50:44 -0700, Robert Dobbs wrote:
>
> But it does not matter. I still get the same error on `apt-get update`:
>
> W: GPG error: http://security.debian.org stable/updates Release: The
> follo
On Thu, 31 Aug 2006 11:50:44 -0700, Robert Dobbs wrote:
> That key is in debian-keyring, but was not in apt.
>
> I had to manually add the /usr/share/keyrings/debian-keyring.* keyrings to
> ~root/.gnupg/gpg.conf, then extract the keys and add with apt-key.
>
> Shouldn't this be automatic?
>
> B
From: Daniel Leidert <[EMAIL PROTECTED]>
Date: Fri, 01 Sep 2006 01:30:51 +0200
Just install the mentioned debian-archive-keyring package and run
'apt-key update'. Probably you fetched the wrong key:
$ gpg --no-default-keyring --keyring
/usr/share/keyrings/debian-role-keys.gpg --list-keys
d
Am Donnerstag, den 31.08.2006, 11:50 -0700 schrieb Robert Dobbs:
> That key is in debian-keyring, but was not in apt.
> I had to manually add the /usr/share/keyrings/debian-keyring.* keyrings to
> ~root/.gnupg/gpg.conf, then extract the keys and add with apt-key.
There is no need to add them to
On Thu, 31 Aug 2006, Sam Morris wrote:
> > You can check with
> >
> > # lsof +L1
> >
> > It will show you open Files that have been
> > unlinked. If any of those are part of the upgraded
> > packages, you restart that process.
>
> Note that this has been broken since at most Linux 2.6.8. Relyin
ahi, ahi, ahi ... top posting ... this is bad ;-)
Robert Dobbs wrote:
I cannot do it because of my company's firewall.
you can go to a keyring site and download the key from here
Why is the key not in debian-keyring package?
key is updated each year ... but next update will be in January (
That key is in debian-keyring, but was not in apt.
I had to manually add the /usr/share/keyrings/debian-keyring.* keyrings to
~root/.gnupg/gpg.conf, then extract the keys and add with apt-key.
Shouldn't this be automatic?
But it does not matter. I still get the same error on `apt-get update`
I cannot do it because of my company's firewall.
Why is the key not in debian-keyring package?
-JR
From: Davide Prina <[EMAIL PROTECTED]>
To: debian-security@lists.debian.org
Subject: Re: GPG errors from apt update
Date: Thu, 31 Aug 2006 19:59:23 +0200
Robert Dobbs wrote:
W: GPG error: http
Robert Dobbs wrote:
W: GPG error: http://security.debian.org stable/updates Release: The
following signatures were invalid: BADSIG 010908312D230C5F Debian
have you update that key before?
# gpg --keyserver pgp.mit.edu --recv-keys 010908312D230C5F
# gpg --armor --export 010908312D230C5F | apt
I just got this one, too:
Failed to fetch
http://ftp.us.debian.org/debian/dists/unstable/main/binary-i386/Packages.bz2
MD5Sum mismatch
Failed to fetch
http://ftp.us.debian.org/debian/dists/unstable/non-free/binary-i386/Packages.bz2
MD5Sum mismatch
From: "Robert Dobbs" <[EMAIL PROTECTED
I get these errors trying to update my system. Did someone hack the
security server?
W: GPG error: http://security.debian.org stable/updates Release: The
following signatures were invalid: BADSIG 010908312D230C5F Debian Archive
Automatic Signing Key (2006) <[EMAIL PROTECTED]>
W: GPG error: ht
On Thu, 31 Aug 2006 09:55:26 +0200, Rolf Kutz wrote:
> * Quoting Mikko Rapeli ([EMAIL PROTECTED]):
>
>> On Tue, Aug 29, 2006 at 10:54:45PM +0200, Moritz Muehlenhoff wrote:
>> > Mikko Rapeli wrote:
>> > > Could Debian security advisories help a bit, since the people making the
>> > > packaging cha
On Thu, 31 Aug 2006, Hans wrote:
It's a good idea but it will not catch all cases, some apps run for days
without any user interventions, nothing garanties that the pop up will
be seen, sending an email if the popup is not didmissed after a delay
could mitigate this.
I agree it will not catch
Le jeudi 31 août 2006 à 10:08 +0200, Giacomo Mulas a écrit :
> On Wed, 30 Aug 2006, Noah Meyerhans wrote:
>
> > workstations for which I'm responsible, and it's difficult for me to
> > make sure that the users e.g. restart firefox when we release an update.
>
> It would be nice to agree to a conv
On Wed, 30 Aug 2006, Noah Meyerhans wrote:
workstations for which I'm responsible, and it's difficult for me to
make sure that the users e.g. restart firefox when we release an update.
It would be nice to agree to a convention whereas when an app gets some
well-defined signal it ought to tell
* Quoting Mikko Rapeli ([EMAIL PROTECTED]):
> On Tue, Aug 29, 2006 at 10:54:45PM +0200, Moritz Muehlenhoff wrote:
> > Mikko Rapeli wrote:
> > > Could Debian security advisories help a bit, since the people making the
> > > packaging changes propably know how to make the changes effective on a
> >
20 matches
Mail list logo