Package: security.debian.org
Severity: important

For the past several months I have been getting periodic errors with
the signing key as follows:

sudo aptitude update
   ........
 W: GPG error: http://ftp.debian.org etch Release: The following
 signatures were
 invalid: BADSIG A70DAF536070D3A1 Debian Archive Automatic Signing Key
 (4.0/etch)
  <ftpmas...@debian.org>
 W: You may want to run apt-get update to correct these problems

Repeated running aptitude update sometimes clears the errors.  If not,
then running dist-upgrade gives:

wover...@imb-msump-l-01:~$ sudo aptitude dist-upgrade
 Reading package lists... Done
 Building dependency tree... Done
 Reading extended state information
 Initializing package states... Done
 Reading task descriptions... Done
 Building tag database... Done
 The following packages will be upgraded:
   devscripts dpkg dpkg-dev dselect libc6 libc6-dev libc6-i686 libpq4
     linux-image-2.6.18-6-686 locales reportbug
     11 packages upgraded, 0 newly installed, 0 to remove and 0 not
 upgraded.
 Need to get 0B/32.6MB of archives. After unpacking 106kB will be used.
 Do you want to continue? [Y/n/?] y
 WARNING: untrusted versions of the following packages will be installed!

 Untrusted packages could compromise your system's security.
 You should only proceed with the installation if you are certain that
 this is what you want to do.

  reportbug libc6-i686 locales devscripts dpkg dpkg-dev libc6-dev libpq4
    libc6 dselect
    
    Do you want to ignore this warning and proceed anyway?


It feels like the problem is becoming more frequent.  Is one or more
of the servers serving security.debian.org out of sync?

A dig on security.debian.org gives me:

 dig -t ANY security.debian.org
 
 ; <<>> DiG 9.3.4-P1.1 <<>> -t ANY security.debian.org
 ;; global options:  printcmd
 ;; Got answer:
 ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30614
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 3, ADDITIONAL: 0
 
 ;; QUESTION SECTION:
 ;security.debian.org.           IN      ANY
 
 ;; ANSWER SECTION:
 security.debian.org.    300     IN      A       130.89.149.225
 security.debian.org.    300     IN      A       195.20.242.89
 security.debian.org.    300     IN      A       212.211.132.32
 security.debian.org.    300     IN      A       212.211.132.250
 security.debian.org.    300     IN      A       128.31.0.36
 security.debian.org.    3600    IN      MX      10 klecker.debian.org.
 
 ;; AUTHORITY SECTION:
 debian.org.             2814    IN      NS      raff.debian.org.
 debian.org.             2814    IN      NS      rietz.debian.org.
 debian.org.             2814    IN      NS      klecker.debian.org.
 
 ;; Query time: 94 msec
 ;; SERVER: 128.150.130.16#53(128.150.130.16)
 ;; WHEN: Fri Dec 19 14:56:10 2008
 ;; MSG SIZE  rcvd: 194
 


All of these systems were clean new installs of Debian 4.0.
               Warren

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to