Package: security.debian.org Severity: important
For the past several months I have been getting periodic errors with the signing key as follows: sudo aptitude update ........ W: GPG error: http://ftp.debian.org etch Release: The following signatures were invalid: BADSIG A70DAF536070D3A1 Debian Archive Automatic Signing Key (4.0/etch) <ftpmas...@debian.org> W: You may want to run apt-get update to correct these problems Repeated running aptitude update sometimes clears the errors. If not, then running dist-upgrade gives: wover...@imb-msump-l-01:~$ sudo aptitude dist-upgrade Reading package lists... Done Building dependency tree... Done Reading extended state information Initializing package states... Done Reading task descriptions... Done Building tag database... Done The following packages will be upgraded: devscripts dpkg dpkg-dev dselect libc6 libc6-dev libc6-i686 libpq4 linux-image-2.6.18-6-686 locales reportbug 11 packages upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 0B/32.6MB of archives. After unpacking 106kB will be used. Do you want to continue? [Y/n/?] y WARNING: untrusted versions of the following packages will be installed! Untrusted packages could compromise your system's security. You should only proceed with the installation if you are certain that this is what you want to do. reportbug libc6-i686 locales devscripts dpkg dpkg-dev libc6-dev libpq4 libc6 dselect Do you want to ignore this warning and proceed anyway? It feels like the problem is becoming more frequent. Is one or more of the servers serving security.debian.org out of sync? A dig on security.debian.org gives me: dig -t ANY security.debian.org ; <<>> DiG 9.3.4-P1.1 <<>> -t ANY security.debian.org ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30614 ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 3, ADDITIONAL: 0 ;; QUESTION SECTION: ;security.debian.org. IN ANY ;; ANSWER SECTION: security.debian.org. 300 IN A 130.89.149.225 security.debian.org. 300 IN A 195.20.242.89 security.debian.org. 300 IN A 212.211.132.32 security.debian.org. 300 IN A 212.211.132.250 security.debian.org. 300 IN A 128.31.0.36 security.debian.org. 3600 IN MX 10 klecker.debian.org. ;; AUTHORITY SECTION: debian.org. 2814 IN NS raff.debian.org. debian.org. 2814 IN NS rietz.debian.org. debian.org. 2814 IN NS klecker.debian.org. ;; Query time: 94 msec ;; SERVER: 128.150.130.16#53(128.150.130.16) ;; WHEN: Fri Dec 19 14:56:10 2008 ;; MSG SIZE rcvd: 194 All of these systems were clean new installs of Debian 4.0. Warren -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-6-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org