> So, please either try the new version and see how you get on, or provide
> more detail.

security.debian.org currently consists of 3 IPs
128.31.0.36
212.211.132.32
212.211.132.250

If you telnet to every IP on port 80 and try
GET /debian-security/dists/etch/updates/
you'll see from time to time (now?) that

128.31.0.36

is out of sync on Release.gpg Release and others (maybe)

If you request several files of security.debian.org through
apt-cacher, it downloads them by downloading a file, rotating
the IP and downloading the next.

This is considered bad behaviour(TM). 
At least on browsers (see binding attacks).
Names/IPs should be looked up once and bind to one result
for a specified time (timeout on inactivity?) or only be rotated on
real problems (404, connection problems),
thus also unsynced servers do no harm on complex
data-storages (like Debian archives).

What happens:
128.31.0.36 GET /debian-security/dists/etch/updates/Release
128.31.0.36 GET /debian-security/dists/etch/updates/Release.gpg
212.211.132.32 
GET /debian-security/dists/etch/updates/main/binary-alpha/Packages
=> BAD archive

128.31.0.36 GET /debian-security/dists/etch/updates/Release
212.211.132.32 GET /debian-security/dists/etch/updates/Release.gpg
=> BAD signature
....

Am I wrong?

The fix in /etc/hosts binds the name to a single IP so the
rotating doesn't happen. => No BAD archive, No BAD signature




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to