Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Anregungen & Feature Requests
5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 3rd, 2018, 2:18 pm

Hallo,

ich wollte meinen derzeitige Version auf die 123 upgraden, da dieser mir im WUI angeboten hat.

Jedoch komme ich aus dem halben Zustand nicht auf die 123er.

Folgendes sagt er mir bei pakfire update:

Code: Select all

Oct  3 14:19:00 ipfw pakfire: DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD INFO: File received. Start checking signature...
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD INFO: Signature of meta-core-upgrade-122 is fine.
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD FINISHED: ipfire/pakfire2/2.21/meta/meta-core-upgrade-122
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD STARTED: paks/core-upgrade-2.21-122.ipfire
Oct  3 14:19:00 ipfw pakfire: MIRROR INFO: 32 servers found in list
Oct  3 14:19:00 ipfw pakfire: PING INFO: mirror.lightningwirelabs.com is alive
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD INFO: Host: mirror.lightningwirelabs.com (HTTPS) - File: pub/ipfire/pakfire2/2.21/paks/core-upgrade-2.21-122.ipfire
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD INFO: pub/ipfire/pakfire2/2.21/paks/core-upgrade-2.21-122.ipfire has size of  bytes
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD INFO: HTTP-Status-Code: 500 - 500 Can't verify SSL peers without knowing which Certificate Authorities to trust
Oct  3 14:19:00 ipfw pakfire: Giving up: There was no chance to get the file paks/core-upgrade-2.21-122.ipfire from any available server. There was an error on the way. Please fix it.
Oct  3 14:19:00 ipfw pakfire: DOWNLOAD STARTED: meta/meta-core-upgrade-123
Oct  3 14:19:00 ipfw pakfire: MIRROR INFO: 32 servers found in list
Oct  3 14:19:01 ipfw pakfire: PING INFO: mirror.espoch.edu.ec is alive
Oct  3 14:19:01 ipfw pakfire: DOWNLOAD INFO: Host: mirror.espoch.edu.ec (HTTPS) - File: ipfire/pakfire2/2.21/meta/meta-core-upgrade-123
Oct  3 14:19:01 ipfw pakfire: DOWNLOAD INFO: ipfire/pakfire2/2.21/meta/meta-core-upgrade-123 has size of  bytes
Oct  3 14:19:01 ipfw pakfire: DOWNLOAD INFO: HTTP-Status-Code: 500 - 500 Can't verify SSL peers without knowing which Certificate Authorities to trust
Oct  3 14:19:01 ipfw pakfire: Giving up: There was no chance to get the file meta/meta-core-upgrade-123 from any available server. There was an error on the way. Please fix it.
Oct  3 14:19:01 ipfw pakfire: No filename given in meta-file.
Manuell über Terminal - auf beim --force gesehen:

Code: Select all

pakfire update
Giving up: There was no chance to get the file "counter.py?ver=2.21&uuid=96b13752-49b9-4abd-a8e6-b3439a72c879" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "2.21/lists/server-list.db" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "lists/packages_list.db" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "lists/core-list.db" from any available server.
There was an error on the way. Please fix it.

Code: Select all

/opt/pakfire/db/meta)
-rw-r--r-- 1 root root  964 Oct  3 14:19 meta-core-upgrade-122
Inhalt:

Code: Select all

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Name: core-upgrade
ProgVersion: 2.21
Release: 122
Size: 50360320
Dependencies:
File: core-upgrade-2.21-122.ipfire
-----BEGIN PGP SIGNATURE-----
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=2NYS
-----END PGP SIGNATURE-----
Die 123er ist leer:

Code: Select all

-rw-r--r-- 1 root root    0 Oct  3 14:19 meta-core-upgrade-123
Auch DNS Umstellungen auf aktuell 8.8.8.8 wie auch 1.1.1.1 oder 81.3.27.54 (Lightning Wire Labs) brachten keine Veränderung inkl. restarts von unbound.

Ping funktioniert - auch schon in die /etc/hosts abgelegt gehabt für tests:

Code: Select all

ping pakfire.ipfire.org
PING fw01.ipfire.org (81.3.27.38) 56(84) bytes of data.
64 bytes from 81.3.27.38 (81.3.27.38): icmp_seq=1 ttl=54 time=30.4 ms
64 bytes from 81.3.27.38 (81.3.27.38): icmp_seq=2 ttl=54 time=30.0 ms
64 bytes from 81.3.27.38 (81.3.27.38): icmp_seq=3 ttl=54 time=30.6 ms

auch ein "rm meta-core-upgrade-123" mit update hinterher brachte nichts.

Code: Select all

root@ipfw-pcomu(/opt/pakfire/db/meta):pakfire update
Giving up: There was no chance to get the file "counter.py?ver=2.21&uuid=96b13752-49b9-4abd-a8e6-b3439a72c879" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "2.21/lists/server-list.db" from any available server.
There was an error on the way. Please fix it.
packages_list.db     100.00% |=============================>|    4.31 KB

Giving up: There was no chance to get the file "lists/core-list.db" from any available server.
There was an error on the way. Please fix it.

Code: Select all

/opt/pakfire/db/core):less mine 121
Was könnte ich noch testen oder machen, damit es wieder geht?

VG, 5p9
Mail Gateway: mail proxy

Image

Image

User avatar
FischerM
Community Developer
Community Developer
Posts: 824
Joined: November 2nd, 2011, 12:28 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by FischerM » October 3rd, 2018, 2:55 pm

Hi!

Kann sein, da was "down"ist - wenn ich versuche, https://pakfire.ipfire.org aufzurufen, erhalte ich momentan nur

Code: Select all

503 Service Unavailable
No server is available to handle this request. 
Gruß,
Matthias

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 3rd, 2018, 5:48 pm

Hi,

ja danke für die Info dazu, hatte ich mir schon fast gedacht, Michael hatte dazu auch schon geantwortet im DEV-Mail, meinte das die DB usw. wieder online wäre.

Vielleicht noch nicht ganz.

VG, 5p9
Mail Gateway: mail proxy

Image

Image

User avatar
Arne.F
Core Developer
Core Developer
Posts: 7977
Joined: May 7th, 2006, 8:57 am
Location: BS <-> NDH
Contact:

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by Arne.F » October 5th, 2018, 7:52 am

Die Meldung auf https://pakfire.ipfire.org ist normal und hat damit nichts zu tun. Unter dieser Domain ist die Buildservice für IPFire 3.x und der ist schon länger offline da wir da was ändern...

Ich fürchte da ist ein gemeiner Bug in core121 so das er kein HTTPS kann solange nicht core122 installiert ist, und wir haben grade alle mirrors rausgeworfen die nur über HTTP erreichbar sind. Das muss ich checken...

Mach am besten gleich mal einen Bug im Bugzilla auf...

Update:
Ich hab grad nochmal nachgeschaut.
core121 enthält ein openssl update und auch die "ca" liste. Das muss eingentlich so gehen. Oder pakfire müsste auf alles System hängen und bei mir validiert der die peers.
Arne

Support the project on the IPFire whishlist!

Image

Image

Image
PS: I will not answer support questions via email and ignore IPFire related messages on my non IPFire.org mail addresses.

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 5th, 2018, 8:06 am

Hi,

jup danke, habe ich eingestellt: https://bugzilla.ipfire.org/show_bug.cgi?id=11900

VG, 5p9
Mail Gateway: mail proxy

Image

Image

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 5th, 2018, 8:28 am

Hi Arne,

ich habe die openssl version 1.1.0h diese sollte auch bei mir passen.

VG, 5p9
Mail Gateway: mail proxy

Image

Image

User avatar
Arne.F
Core Developer
Core Developer
Posts: 7977
Joined: May 7th, 2006, 8:57 am
Location: BS <-> NDH
Contact:

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by Arne.F » October 9th, 2018, 7:40 am

Hi, ich hab es nicht geschafft das Problem nachzuvollziehen. Ich hab core118 auf einen USB Stick neu installiert (i586 und x86_64) und beide Problemlos updaten konnen. Am rauswurf der letzten HTTP only Mirrors liegt das also nicht.
Arne

Support the project on the IPFire whishlist!

Image

Image

Image
PS: I will not answer support questions via email and ignore IPFire related messages on my non IPFire.org mail addresses.

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 15th, 2018, 9:05 am

Hi Arne,

danke für deine Tests. Es ist echt seltsam, zumal am Netzwerk nichts verändert wurde. Ich habe die Vermutung, dass es irgendwie am SSL liegen könnte.
Ich verstehe nur nicht wie hier die Abhängigkeiten dazu bestimmt sind.

Kann es etwas mit der UUID uuid=96b13752-49b9-4abd-a8e6-b3439a72c879 zu tun haben?

Code: Select all

Oct 14 22:39:53 ipfw-pcomu pakfire: DOWNLOAD STARTED: counter.py?ver=2.21&uuid=96b13752-49b9-4abd-a8e6-b3439a72c879
Oct 14 22:39:53 ipfw-pcomu pakfire: DOWNLOAD INFO: Host: pakfire.ipfire.org (HTTP) - File: counter.py?ver=2.21&uuid=96b13752-49b9-4abd-a8e6-b3439a72c879
Oct 14 22:39:54 ipfw-pcomu pakfire: DOWNLOAD INFO: HTTP-Status-Code: 500 - 500 Can't verify SSL peers without knowing which Certificate Authorities to trust
Ich habe hier ein Backup eingespielt gehabt aus einem anderen Monat, da die Festplatte den Geist aufgegeben hat und danach habe ich erst das Update auf die 122 gestartet, jedoch hatte er mir die 122er nicht gemacht nur bis zur 121, dazu hatte ich in einem anderen Thread schon dieses Fehlerbild gemeldet gehabt.

viewtopic.php?f=5&t=21177&p=118452#p118302

Ich schätze hier war oder ist der Hund begraben. Die Frage wäre, wie könnte ich dies manuell testen mit dem Update von Pakfire in Verbindung mit SSL und UUID?

VG, 5p9
Mail Gateway: mail proxy

Image

Image

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 16th, 2018, 5:40 pm

Hi,

hier noch das Logfile zum Status er hat ein Problem erkannt:

Code: Select all

Extracting files...
etc/
etc/rc.d/
etc/rc.d/init.d/
etc/rc.d/init.d/rngd
etc/ssl/
etc/ssl/certs/
etc/ssl/certs/ca-bundle.trust.crt
etc/ssl/certs/ca-bundle.crt
etc/ssl/cert.pem
etc/issue
etc/system-release
lib/
lib/firmware/
lib/firmware/i2400m-fw-usb-1.5.sbcf
lib/firmware/qca/
lib/firmware/qca/rampatch_00130300.bin
lib/firmware/qca/rampatch_00130302.bin
lib/firmware/qca/rampatch_usb_00000302.bin
lib/firmware/qca/rampatch_usb_00000200.bin
lib/firmware/qca/NOTICE.txt
lib/firmware/qca/nvm_00130302.bin
.................
.................
.................
.................
.................
usr/bin/lzmore
usr/lib/
usr/lib/libssl.so
usr/lib/liblzma.so
usr/lib/liblzma.so.5.2.4
usr/lib/engines-1.1/
usr/lib/engines-1.1/capi.so
usr/lib/engines-1.1/padlock.so
usr/lib/engines-1.1/afalg.so
usr/lib/liblzma.so.5
usr/lib/libcrypto.so
usr/lib/libxt_ACCOUNT_cl.so.0.0.0
usr/lib/libssl.so.1.1
usr/lib/libxt_ACCOUNT_cl.so.0
usr/lib/libcrypto.so.1.1
...Finished.
Restarting Apache daemon...
ESC[1AESC[0GESC[-8GESC[1;34m[ESC[1;32m  OK  ESC[1;34m]ESC[0;39m
Generating grub.cfg ...
Found background: /boot/grub/splash.png
Found linux image: /boot/vmlinuz-3.14.79-ipfire-pae
Found initrd image: /boot/initramfs-3.14.79-ipfire-pae.img
Found linux image: /boot/vmlinuz-3.14.79-ipfire
Found initrd image: /boot/initramfs-3.14.79-ipfire.img
done
pak_update: no process killed
ESC[1;32mserver-list.db        50.46% |==============>               |    1.17 KBESC[0m^MESC[1;32mserver-list.db       100.00% |=============================>|    2.32 KBESC[0m

Giving up: There was no chance to get the file "lists/packages_list.db" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "lists/core-list.db" from any available server.
There was an error on the way. Please fix it.
ESC[0;31mCORE ERROR: No new upgrades available. You are on release 121.ESC[0m

Update: tmux
Version: 1.9a -> 2.5
Release: 3 -> 5
ESC[0m
Update: iptraf-ng
Version: 1.1.4 -> 1.1.4
Release: 2 -> 3
ESC[0m
Update: iftop
Version: 0.17 -> 1.0pre4
Release: 1 -> 2
ESC[0m
Update: git
Version: 2.12.2 -> 2.12.2
Release: 14 -> 15
ESC[0m
Update: rsync
Version: 3.1.2 -> 3.1.3
Release: 10 -> 11
ESC[0m
Update: tcpdump
Version: 4.8.1 -> 4.9.2
Release: 7 -> 10
ESC[0m
Update: clamav
Version: 0.99.2 -> 0.99.4
Release: 34 -> 37
ESC[0m
Update: nmap
Version: 7.40 -> 7.40
Release: 8 -> 9
ESC[0m
Update: htop
Version: 2.0.2 -> 2.1.0
Release: 9 -> 11
ESC[0m
Update: squidclamav
Version: 5.11 -> 5.11
Release: 20 -> 21
ESC[0m
Update: bwm-ng
Version: 0.6 -> 0.6.1-f54b3fa
Release: 1 -> 2
ESC[0m
Update: postfix
Version: 3.1.4 -> 3.2.4
Release: 11 -> 14
ESC[0m
Update: 7zip
Version: 15.14.1 -> 16.02
Release: 6 -> 7
ESC[0m
ESC[0;35mPAKFIRE RESV: tmux: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: iptraf-ng: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: iftop: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: git: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: git: Dependency is already installed: perl-Authen-SASLESC[0m
ESC[0;35mPAKFIRE RESV: git: Dependency is already installed: perl-MIME-Base64ESC[0m
ESC[0;35mPAKFIRE RESV: git: Dependency is already installed: perl-Net-SMTP-SSLESC[0m
ESC[0;35mPAKFIRE RESV: rsync: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: tcpdump: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: clamav: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: nmap: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: htop: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: squidclamav: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: squidclamav: Dependency is already installed: clamavESC[0m
ESC[0;35mPAKFIRE RESV: bwm-ng: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: postfix: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: 7zip: Resolving dependencies...ESC[0m

ESC[1;34mPAKFIRE UPGR: We are going to install all packages listed above.ESC[0m

Giving up: There was no chance to get the file "paks/tmux-2.5-5.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/iptraf-ng-1.1.4-3.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/iftop-1.0pre4-2.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/rsync-3.1.3-11.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/tcpdump-4.9.2-10.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/clamav-0.99.4-37.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/nmap-7.40-9.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/htop-2.1.0-11.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/squidclamav-5.11-21.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/postfix-3.2.4-14.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/7zip-16.02-7.ipfire" from any available server.
There was an error on the way. Please fix it.
ESC[1;34mPAKFIRE UPGR: tmux: Decrypting...ESC[0m

Giving up: There was no chance to get the file "paks/tmux-2.5-5.ipfire" from any available server.
There was an error on the way. Please fix it.
sh: /opt/pakfire/cache/tmux-2.5-5.ipfire: No such file or directory
tar: This does not look like a tar archive
tar: Exiting with failure status due to previous errors
ESC[0;31mCORE ERROR: No new upgrades available. You are on release 121.ESC[0m
Update: tmux
Version: 1.9a -> 2.5
Release: 3 -> 5
ESC[0m
Update: iptraf-ng
Version: 1.1.4 -> 1.1.4
Release: 2 -> 3
ESC[0m
Update: iftop
Version: 0.17 -> 1.0pre4
Release: 1 -> 2
ESC[0m
Update: git
Version: 2.12.2 -> 2.12.2
Release: 14 -> 15
ESC[0m
Update: rsync
Version: 3.1.2 -> 3.1.3
Release: 10 -> 11
ESC[0m
Update: tcpdump
Version: 4.8.1 -> 4.9.2
Release: 7 -> 10
ESC[0m
Update: clamav
Version: 0.99.2 -> 0.99.4
Release: 34 -> 37
ESC[0m
Update: nmap
Version: 7.40 -> 7.40
Release: 8 -> 9
ESC[0m
Update: htop
Version: 2.0.2 -> 2.1.0
Release: 9 -> 11
ESC[0m
Update: squidclamav
Version: 5.11 -> 5.11
Release: 20 -> 21
ESC[0m
Update: bwm-ng
Version: 0.6 -> 0.6.1-f54b3fa
Release: 1 -> 2
ESC[0m
Update: postfix
Version: 3.1.4 -> 3.2.4
Release: 11 -> 14
ESC[0m
Update: 7zip
Version: 15.14.1 -> 16.02
Release: 6 -> 7
ESC[0m
ESC[0;35mPAKFIRE RESV: tmux: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: iptraf-ng: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: iftop: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: git: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: git: Dependency is already installed: perl-Authen-SASLESC[0m
ESC[0;35mPAKFIRE RESV: git: Dependency is already installed: perl-MIME-Base64ESC[0m
ESC[0;35mPAKFIRE RESV: git: Dependency is already installed: perl-Net-SMTP-SSLESC[0m
ESC[0;35mPAKFIRE RESV: rsync: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: tcpdump: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: clamav: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: nmap: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: htop: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: squidclamav: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: squidclamav: Dependency is already installed: clamavESC[0m
ESC[0;35mPAKFIRE RESV: bwm-ng: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: postfix: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: 7zip: Resolving dependencies...ESC[0m

ESC[1;34mPAKFIRE UPGR: We are going to install all packages listed above.ESC[0m

Giving up: There was no chance to get the file "paks/tmux-2.5-5.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/iptraf-ng-1.1.4-3.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/iftop-1.0pre4-2.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/tcpdump-4.9.2-10.ipfire" from any available server.
There was an error on the way. Please fix it.


Giving up: There was no chance to get the file "paks/clamav-0.99.4-37.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/nmap-7.40-9.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/htop-2.1.0-11.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/squidclamav-5.11-21.ipfire" from any available server.
There was an error on the way. Please fix it.
ESC[1;32mpostfix-3.2.4-14....   0.24% |>                             |    4.00 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   0.24% |>                             |    4.01 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   0.41% |>                             |    6.84 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   0.57% |>                             |    9.67 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   0.81% |>                             |   13.67 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   0.83% |>                             |   13.91 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   0.91% |>                             |   15.32 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.08% |>                             |   18.15 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.16% |>                             |   19.57 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.25% |>                             |   20.98 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.41% |>                             |   23.81 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.50% |>                             |   25.22 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.58% |>                             |   26.64 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.67% |>                             |   28.05 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.90% |>                             |   32.05 KBESC[0m^MESC[1;32mpostfix-3.2.4-14....   1.92% |>
.....
.....
.....
^MESC[1;32mpostfix-3.2.4-14....  99.98% |============================> |    1.64 MBESC[0m^MESC[1;32mpostfix-3.2.4-14.... 100.00% |=============================>|    1.64 MBESC[0m

Giving up: There was no chance to get the file "paks/7zip-16.02-7.ipfire" from any available server.
There was an error on the way. Please fix it.
ESC[1;34mPAKFIRE UPGR: tmux: Decrypting...ESC[0m
ESC[1;34mPAKFIRE UPGR: tmux: Upgrading files and running post-upgrading scripts...ESC[0m
ESC[1;34mPAKFIRE UPGR: tmux: Finished.ESC[0m

ESC[1;34mPAKFIRE UPGR: iptraf-ng: Decrypting...ESC[0m
ESC[1;34mPAKFIRE UPGR: iptraf-ng: Upgrading files and running post-upgrading scripts...ESC[0m
ESC[1;34mPAKFIRE UPGR: iptraf-ng: Finished.ESC[0m

ESC[1;34mPAKFIRE UPGR: iftop: Decrypting...ESC[0m
ESC[1;32miftop-1.0pre4-2.i...  13.62% |===>                          |    4.00 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  23.30% |======>                       |    6.84 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  28.11% |========>                     |    8.26 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  32.92% |=========>                    |    9.67 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  46.54% |=============>                |   13.67 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  47.37% |=============>                |   13.91 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  57.00% |================>             |   16.74 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  66.62% |===================>          |   19.57 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  71.44% |====================>         |   20.98 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  81.07% |=======================>      |   23.81 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  85.88% |========================>     |   25.23 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  90.69% |==========================>   |   26.64 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i...  95.51% |===========================>  |   28.05 KBESC[0m^MESC[1;32miftop-1.0pre4-2.i... 100.00% |=============================>|   29.37 KBESC[0m
ESC[1;34mPAKFIRE UPGR: iftop: Upgrading files and running post-upgrading scripts...ESC[0m
ESC[1;34mPAKFIRE UPGR: iftop: Finished.ESC[0m

ESC[1;34mPAKFIRE UPGR: git: Decrypting...ESC[0m
ESC[1;34mPAKFIRE UPGR: git: Upgrading files and running post-upgrading scripts...ESC[0m
ESC[1;34mPAKFIRE UPGR: git: Finished.ESC[0m

ESC[1;34mPAKFIRE UPGR: rsync: Decrypting...ESC[0m
ESC[1;34mPAKFIRE UPGR: rsync: Upgrading files and running post-upgrading scripts...ESC[0m
ESC[1;34mPAKFIRE UPGR: rsync: Finished.ESC[0m

ESC[1;34mPAKFIRE UPGR: tcpdump: Decrypting...ESC[0m

Giving up: There was no chance to get the file "paks/tcpdump-4.9.2-10.ipfire" from any available server.
There was an error on the way. Please fix it.
sh: /opt/pakfire/cache/tcpdump-4.9.2-10.ipfire: No such file or directory
tar: This does not look like a tar archive
tar: Exiting with failure status due to previous errors
ESC[0;31mCORE ERROR: No new upgrades available. You are on release 121.ESC[0m
Update: tcpdump
Version: 4.8.1 -> 4.9.2
Release: 7 -> 10
ESC[0m
Update: clamav
Version: 0.99.2 -> 0.99.4
Release: 34 -> 37
ESC[0m
Update: nmap
Version: 7.40 -> 7.40
Release: 8 -> 9
ESC[0m
Update: htop
Version: 2.0.2 -> 2.1.0
Release: 9 -> 11
ESC[0m
Update: squidclamav
Version: 5.11 -> 5.11
Release: 20 -> 21
ESC[0m
Update: bwm-ng
Version: 0.6 -> 0.6.1-f54b3fa
Release: 1 -> 2
ESC[0m
Update: postfix
Version: 3.1.4 -> 3.2.4
Release: 11 -> 14
ESC[0m
Update: 7zip
Version: 15.14.1 -> 16.02
Release: 6 -> 7
ESC[0m
ESC[0;35mPAKFIRE RESV: tcpdump: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: clamav: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: nmap: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: htop: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: squidclamav: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: squidclamav: Dependency is already installed: clamavESC[0m
ESC[0;35mPAKFIRE RESV: bwm-ng: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: postfix: Resolving dependencies...ESC[0m
ESC[0;35mPAKFIRE RESV: 7zip: Resolving dependencies...ESC[0m

ESC[1;34mPAKFIRE UPGR: We are going to install all packages listed above.ESC[0m

Giving up: There was no chance to get the file "paks/tcpdump-4.9.2-10.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/clamav-0.99.4-37.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/nmap-7.40-9.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/htop-2.1.0-11.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/squidclamav-5.11-21.ipfire" from any available server.
There was an error on the way. Please fix it.

Giving up: There was no chance to get the file "paks/7zip-16.02-7.ipfire" from any available server.
There was an error on the way. Please fix it.
ESC[1;34mPAKFIRE UPGR: tcpdump: Decrypting...ESC[0m

Giving up: There was no chance to get the file "paks/tcpdump-4.9.2-10.ipfire" from any available server.
There was an error on the way. Please fix it.
sh: /opt/pakfire/cache/tcpdump-4.9.2-10.ipfire: No such file or directory
tar: This does not look like a tar archive
tar: Exiting with failure status due to previous errors
in meiner /opt/pakfire/db/lists/core-list.db steht dies drin:

Code: Select all

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

$core_release="123";
-----BEGIN PGP SIGNATURE-----
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=Egy9
-----END PGP SIGNATURE-----
und in der packagelist.db:

Code: Select all

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

7zip;16.02;7;
alsa;1.0.27.1;12;
amavisd;2.5.2;1;
apcupsd;3.14.14;6;
arm;1.4.5.0;1;
asterisk;13.18.5;25;
avahi;0.7;5;
bacula;9.0.6;4;
bird;1.6.3;2;
bluetooth;3.36;1;
bwm-ng;0.6.1-f54b3fa;2;
check_mk_agent;1.2.4p5;4;
cifs-utils;5.9;1;
clamav;0.100.1;39;
client175;0.7;3;
cpufrequtils;008;8;
cups;2.2.2;16;
cups-filters;1.13.4;2;
cyrus-imapd;2.5.11;7;
dbus;1.11.12;2;
ddrescue;1.12;1;
directfb;1.7.7;3;
dnsdist;0.0.498gac688af;1;
dpfhack;0.12devel;1;
ebtables;2.0.10-4;3;
elfutils;0.168;1;
elinks;0.12pre6;7;
epson-inkjet-printer-escpr;1.6.12;2;
faad2;2.7;1;
fetchmail;6.3.26;9;
ffmpeg;3.4;8;
flac;1.3.2;2;
foomatic;4.0.9;3;
fping;4.0;4;
freeradius;3.0.14;3;
ghostscript;9.20;3;
git;2.12.2;15;
gnump3d;3.0;5;
gnu-netcat;0.7.1;1;
gpgme;1.3.2;2;
guardian;2.0;14;
gutenprint;5.2.9;3;
haproxy;1.8.0;4;
hostapd;2.6;42;
hplip;3.18.6;3;
htop;2.2.0;12;
icecast;2.3.2;3;
icegenerator;0.5.5-pre2;1;
icinga;1.11.4;3;
iftop;1.0pre4;2;
igmpproxy;0.1;4;
intltool;0.40.5;1;
iotop;0.6;1;
iperf;2.0.9;3;
iperf3;3.1.2;1;
iptraf-ng;1.1.4;3;
ipvsadm;1.26;1;
jansson;2.10;1;
joe;3.7;2;
keepalived;1.2.17;3;
krb5;1.15.2;3;
lame;3.97;1;
lcd4linux;0.11.0-svn1200-dpf;6;
lcdproc;0.5.7;2;
libassuan;2.4.3;4;
libdaemon;0.14;1;
libdvbpsi;1.2.0;2;
libexif;0.6.21;1;
libid3tag;0.15.1b;1;
libmad;0.15.1b;2;
libmpdclient;2.5;3;
libmpeg2;0.4.0b;1;
libogg;1.3.0;3;
libpciaccess;0.13.4;1;
libpri;1.4.10.2;2;
libshout;2.2.2;1;
libsolv;0.0.0-c02d759;2;
libsrtp;1.5.4;3;
libstatgrab;0.17;1;
libtiff;4.0.6;3;
libtirpc;1.0.2;2;
libusbredir;0.7.1;1;
libvirt;4.0.0;15;
libvorbis;1.3.3;4;
libyajl;2.1.0;1;
linux-pae;4.14.50;75;
ltrace;0.7.3;1;
lynis;2.6.4;6;
make;4.2.1;4;
mc;4.8.20;16;
mcelog;135;1;
mdns-repeater;1.10;1;
miau;0.6.5;2;
minicom;2.4;0;
minidlna;1.1.3;4;
miniupnpd;1.9;3;
monit;5.23.0;10;
motion;4.0.1;2;
mpc;0.21;6;
mpd;0.19.19;18;
mpfire;ipfire;11;
mtr;0.92;3;
multicat;2.0;1;
nagios_nrpe;3.2.1;5;
nagios-plugins;2.2.1;3;
nano;2.9.7;22;
ncat;7.60;3;
netpbm;10.47.61;2;
netsnmpd;5.7.3;7;
nfs;1.3.3;10;
nginx;1.15.1;8;
nmap;7.70;10;
nut;2.7.4;7;
openvmtools;10.2.0-7253323;3;
opus;1.2.1;2;
pakfire3;0.9.25;5;
perl-Authen-SASL;2.16;1;
perl-Carp-Clan;6.04;3;
perl-common-sense;3.74;1;
perl-Date-Calc;6.3;3;
perl-Date-Manip;6.40;4;
perl-DBD-SQLite;1.40;1;
perl-DBI;1.631;2;
perl-File-ReadBackwards;1.05;1;
perl-File-Tail;0.99.3;3;
perl-gettext;1.05;3;
perl-inotify2;1.22;1;
perl-MIME-Base64;3.15;1;
perl-Net-IP;1.26;1;
perl-Net-SMTP-SSL;1.02;1;
perl-TimeDate;1.20;3;
postfix;3.2.4;14;
powertop;v2.9;2;
pycurl;7.19.0;2;
pygpgme;0.3;1;
python3;3.6.1;3;
python-clientform;0.2.9;2;
python-distutils;2.7.13;2;
python-distutils-extra;2.25;1;
python-feedparser;4.1;2;
python-lzma;0.5.3;1;
python-mechanize;0.1.8;2;
python-optional-src;2.7.13;4;
python-progressbar;2.2;1;
python-rssdler;0.4.0a;2;
python-xattr;0.5.0;1;
qemu;2.11.0;23;
rpcbind;0.2.3;2;
rsync;3.1.3;11;
rtpproxy;2.0.0;1;
samba;3.6.25;68;
sane;1.0.24;5;
sarg;2.3.11;4;
sdl;1.2.15;3;
sendEmail;1.56;1;
sox;12.18.1;1;
spamassassin;3.1.3;2;
spandsp;0.0.6pre12;4;
spice;0.14.0;4;
squid-accounting;1.0.4;11;
squidclamav;5.11;21;
sslh;1.7a;5;
strace;4.7;1;
streamripper;1.63.5;1;
stress;1.0.4;1;
stunnel;5.44;4;
swatch;3.2.3;2;
sysbench;0.4.12;1;
taglib;1.5;1;
tcpdump;4.9.2;10;
telnet;0.17;1;
tftpd;0.48;1;
tmux;2.7;6;
tor;0.3.3.9;30;
traceroute;2.0.18;3;
transmission;2.92;15;
urlgrabber;3.9.1;1;
vdr;2.0.5;9;
vdradmin;3.6.9;5;
vdr_dvbapi;1.0.6;1;
vdr_eepg;master;1;
vdr_epgsearch;1.0.1.beta5;7;
vdr_streamdev;0.6.1;2;
vdr_vnsiserver5;1.0.0;1;
watchdog;5.13;4;
wavemon;0.7.5;1;
wio;1.3.2;3;
w_scan;20130331;5;
xinetd;2.3.15;1;
xvid;1.2.1;2;
-----BEGIN PGP SIGNATURE-----
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=07IT
-----END PGP SIGNATURE-----
und im /var/cache/pakfire/ habe ich folgendes:

Code: Select all


total 175116
drwxr-xr-x 2 root root     4096 Oct 14 22:29 .
drwxr-xr-x 6 root root     4096 Jun 23  2017 ..
-rw-r--r-- 1 root root   926575 Jun 23  2017 7zip-15.14.1-6.ipfire
-rw-r--r-- 1 root root   605970 Oct 18  2014 7zip-4.65-3.ipfire
-rw-r--r-- 1 root root   803386 May 16  2016 7zip-9.38.1-4.ipfire
-rw-r--r-- 1 root root    23958 Aug 20 22:14 bwm-ng-0.6.1-f54b3fa-2.ipfire
-rw-r--r-- 1 root root    25233 Oct 18  2014 bwm-ng-0.6-1.ipfire
-rw-r--r-- 1 root root  3969120 Oct 18  2014 clamav-0.98.4-26.ipfire
-rw-r--r-- 1 root root  3938580 Apr 24  2015 clamav-0.98.6-28.ipfire
-rw-r--r-- 1 root root  4325673 May 16  2016 clamav-0.99.2-33.ipfire
-rw-r--r-- 1 root root  4310541 Jun 23  2017 clamav-0.99.2-34.ipfire
-rw-r--r-- 1 root root  4002759 May 16  2016 clamav-0.99-30.ipfire
-rw-r--r-- 1 root root  3268064 Jun 23  2017 git-2.12.2-14.ipfire
-rw-r--r-- 1 root root  2922983 Aug 20 22:14 git-2.12.2-15.ipfire
-rw-r--r-- 1 root root  2613132 Oct  7  2016 git-2.7.4-13.ipfire
-rw-r--r-- 1 root root    31619 Jun 23  2017 guardian-2.0-13.ipfire
-rw-r--r-- 1 root root    31630 Jul 24  2017 guardian-2.0-14.ipfire
-rw-r--r-- 1 root root     7026 Oct 19  2014 guardian-ipfire-9.ipfire
-rw-r--r-- 1 root root    53486 Oct 18  2014 htop-1.0.2-6.ipfire
-rw-r--r-- 1 root root    58041 Apr 24  2015 htop-1.0.3-7.ipfire
-rw-r--r-- 1 root root    67440 May 16  2016 htop-2.0.1-8.ipfire
-rw-r--r-- 1 root root    68067 Jun 23  2017 htop-2.0.2-9.ipfire
-rw-r--r-- 1 root root    23379 Oct 18  2014 iftop-0.17-1.ipfire
-rw-r--r-- 1 root root    30078 Aug 20 22:15 iftop-1.0pre4-2.ipfire
-rw-r--r-- 1 root root    75946 Oct 18  2014 iptraf-ng-1.1.4-2.ipfire
-rw-r--r-- 1 root root    83181 Aug 20 22:15 iptraf-ng-1.1.4-3.ipfire
-rw-r--r-- 1 root root 23360617 Oct 18  2014 linux-pae-3.10.44-51.ipfire
-rw-r--r-- 1 root root 26563721 Apr 24  2015 linux-pae-3.14.33-58.ipfire
-rw-r--r-- 1 root root 26620375 May 16  2016 linux-pae-3.14.57-64.ipfire
-rw-r--r-- 1 root root 27148022 May 16  2016 linux-pae-3.14.65-68.ipfire
-rw-r--r-- 1 root root 27161587 Jun 23  2017 linux-pae-3.14.79-73.ipfire
-rw-r--r-- 1 root root    29766 Oct 18  2014 mtr-0.82-1.ipfire
-rw-r--r-- 1 root root    36327 Apr 24  2015 mtr-0.86-2.ipfire
-rw-r--r-- 1 root root  2705932 Oct 18  2014 nmap-6.01-6.ipfire
-rw-r--r-- 1 root root  2979309 Apr 24  2015 nmap-6.47-7.ipfire
-rw-r--r-- 1 root root  4141838 Jun 23  2017 nmap-7.40-8.ipfire
-rw-r--r-- 1 root root    16403 Oct  7  2016 perl-Authen-SASL-2.16-1.ipfire
-rw-r--r-- 1 root root     9312 Jun 23  2017 perl-common-sense-3.74-1.ipfire
-rw-r--r-- 1 root root    11944 Jun 23  2017 perl-inotify2-1.22-1.ipfire
-rw-r--r-- 1 root root    13237 Oct  7  2016 perl-MIME-Base64-3.15-1.ipfire
-rw-r--r-- 1 root root    17446 Jun 23  2017 perl-Net-IP-1.26-1.ipfire
-rw-r--r-- 1 root root     2681 Oct  7  2016 perl-Net-SMTP-SSL-1.02-1.ipfire
-rw-r--r-- 1 root root  1441273 May 16  2016 postfix-2.10.0-9.ipfire
-rw-r--r-- 1 root root  1723189 Aug 20 22:15 postfix-3.2.4-14.ipfire
-rw-r--r-- 1 root root   225565 Dec 22  2016 rsync-3.1.2-10.ipfire
-rw-r--r-- 1 root root   236972 Aug 20 22:15 rsync-3.1.3-11.ipfire
-rw-r--r-- 1 root root    20556 Oct 20  2014 sendEmail-1.56-1.ipfire
-rw-r--r-- 1 root root    19984 Oct 18  2014 squidclamav-5.11-19.ipfire
-rw-r--r-- 1 root root    20516 Apr 24  2015 squidclamav-5.11-20.ipfire
-rw-r--r-- 1 root root    20436 Aug 20 22:21 squidclamav-5.11-21.ipfire
-rw-r--r-- 1 root root   291322 Oct 18  2014 tcpdump-4.4.0-3.ipfire
-rw-r--r-- 1 root root   306092 Apr 24  2015 tcpdump-4.6.2-4.ipfire
-rw-r--r-- 1 root root   316264 May 16  2016 tcpdump-4.7.4-6.ipfire
-rw-r--r-- 1 root root   350791 Jun 23  2017 tcpdump-4.8.1-7.ipfire
-rw-r--r-- 1 root root   380911 Aug 20 22:22 tcpdump-4.9.2-10.ipfire
-rw-r--r-- 1 root root    16452 Oct 18  2014 tcpick-0.2.1-1.ipfire
-rw-r--r-- 1 root root   165282 Feb 25  2016 tmux-1.9a-3.ipfire
-rw-r--r-- 1 root root   218977 Aug 20 22:15 tmux-2.5-5.ipfire
-rw-r--r-- 1 root root    41805 Jan  6  2018 wio-1.3.1-3.ipfire

Könnte der Fehler hier irgendwo liegen, z.B. in der /opt/pakfire/db/lists/core-list.db in Verbindung mit der UUID und meiner tatsächlichen Version der 121?

VG, 5p9
Mail Gateway: mail proxy

Image

Image

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 17th, 2018, 12:45 pm

Hi,

zusätzlich zu den oben genannten Fragen, noch eine Frage. Wie soll ich am besten einen TCPDump erstellen, da die IP stetig eine andere ist.
Irgendwelche Inputs die ich am besten hier verwenden könnte als flags im tcpdump?`
Ich will nur sicher sein, dass die Abfrage zumindest raus und wieder rein kommt, wenn ich ein pakfire update fahre.

VG, 5p9
Mail Gateway: mail proxy

Image

Image

BeBiMa
Posts: 2635
Joined: July 30th, 2011, 12:55 pm
Location: Mannheim

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by BeBiMa » October 17th, 2018, 1:21 pm

TCPdump kann mit der option -i red0 rein schnittstellen spezifisch betrieben werden.
Bzgl. der Zieladdresse bleibt wohl keine andere Möglichkeit, als den Datenverkehr incl. DNS-Abfragen zu betrachten. :-\
Image
Unitymedia Cable Internet ( 32MBit )

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 17th, 2018, 2:55 pm

Hi,

jup so auch meine Erkenntnisse dazu :-\ und das wird nicht lustig, da muss ich einfach in der Früh um 2 den Sumpf erstellen.

Evtl hat ja noch jemand ne Idee.

Ich seh aber schon wo es hingehen wird. Aber Neuinstallation hab ich nicht vor ... Zu aufwendig.

VG, 5p9
Mail Gateway: mail proxy

Image

Image

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 18th, 2018, 6:12 am

Hi,

interessant, ich bin wohl nicht alleine: viewtopic.php?f=51&t=21374&p=119648#p118622

VG, 5p9
Mail Gateway: mail proxy

Image

Image

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 22nd, 2018, 8:01 am

Hi,

ich habe jetzt einen tcpdump auf 80 und 443 durchgeführt, hier spricht er bei 80 immer von incorrect.

Code: Select all

:tcpdump -vvv -i red0 dst port 80

Code: Select all


tcpdump: listening on red0, link-type EN10MB (Ethernet), capture size 262144 bytes
09:46:20.689980 IP (tos 0x0, ttl 64, id 50046, offset 0, flags [none], proto TCP (6), length 60)
    192.168.YYY.ZZZ.49679 > 81.3.27.38.http: Flags [S], cksum 0x2f0a (incorrect -> 0x884a), seq 4262731347, win 29200, options [mss 1460,sackOK,TS val 487596786 ecr 0,nop,wscale 7], length 0
09:46:20.716268 IP (tos 0x0, ttl 64, id 50053, offset 0, flags [none], proto TCP (6), length 52)
    192.168.YYY.ZZZ.49679 > 81.3.27.38.http: Flags [.], cksum 0x2f02 (incorrect -> 0x2825), seq 4262731348, ack 2233509924, win 229, options [nop,nop,TS val 487596794 ecr 85314986], length 0
09:46:20.762231 IP (tos 0x0, ttl 64, id 50056, offset 0, flags [none], proto TCP (6), length 230)
    192.168.YYY.ZZZ.49679 > 81.3.27.38.http: Flags [P.], cksum 0x2fb4 (incorrect -> 0xbc83), seq 0:178, ack 1, win 229, options [nop,nop,TS val 487596807 ecr 85314986], length 178: HTTP, length: 178
        GET /counter.py?ver=2.21&uuid=96b13752-49b9-4abd-a8e6-b3439a72c879 HTTP/1.1
        TE: deflate,gzip;q=0.3
        Connection: TE, close
        Host: pakfire.ipfire.org
        User-Agent: Pakfire/2.21

09:46:20.798061 IP (tos 0x0, ttl 64, id 50065, offset 0, flags [none], proto TCP (6), length 52)
    192.168.YYY.ZZZ.49679 > 81.3.27.38.http: Flags [F.], cksum 0x2f02 (incorrect -> 0x2654), seq 178, ack 174, win 237, options [nop,nop,TS val 487596818 ecr 85315067], length 0
09:46:21.044170 IP (tos 0x0, ttl 64, id 50114, offset 0, flags [none], proto TCP (6), length 60)
    192.168.YYY.ZZZ.49680 > 81.3.27.38.http: Flags [S], cksum 0x2f0a (incorrect -> 0x298b), seq 3326391415, win 29200, options [mss 1460,sackOK,TS val 487596892 ecr 0,nop,wscale 7], length 0
09:46:21.073278 IP (tos 0x0, ttl 64, id 50115, offset 0, flags [none], proto TCP (6), length 52)
    192.168.YYY.ZZZ.49680 > 81.3.27.38.http: Flags [.], cksum 0x2f02 (incorrect -> 0xc5fd), seq 3326391416, ack 2921627938, win 229, options [nop,nop,TS val 487596901 ecr 85315343], length 0
09:46:21.073721 IP (tos 0x0, ttl 64, id 50116, offset 0, flags [none], proto TCP (6), length 195)
    192.168.YYY.ZZZ.49680 > 81.3.27.38.http: Flags [P.], cksum 0x2f91 (incorrect -> 0x8e50), seq 0:143, ack 1, win 229, options [nop,nop,TS val 487596901 ecr 85315343], length 143: HTTP, length: 143
        HEAD /2.21/lists/server-list.db HTTP/1.1
        TE: deflate,gzip;q=0.3
        Connection: TE, close
        Host: pakfire.ipfire.org
        User-Agent: Pakfire/2.21

09:46:21.109494 IP (tos 0x0, ttl 64, id 50127, offset 0, flags [none], proto TCP (6), length 52)
    192.168.YYY.ZZZ.49680 > 81.3.27.38.http: Flags [F.], cksum 0x2f02 (incorrect -> 0xc4ae), seq 143, ack 138, win 237, options [nop,nop,TS val 487596912 ecr 85315378], length 0
09:46:21.315020 IP (tos 0x0, ttl 64, id 50178, offset 0, flags [none], proto TCP (6), length 60)
    192.168.YYY.ZZZ.49681 > 81.3.27.38.http: Flags [S], cksum 0x2f0a (incorrect -> 0x32fc), seq 3999105691, win 29200, options [mss 1460,sackOK,TS val 487596973 ecr 0,nop,wscale 7], length 0
09:46:21.342448 IP (tos 0x0, ttl 64, id 50182, offset 0, flags [none], proto TCP (6), length 52)
    192.168.YYY.ZZZ.49681 > 81.3.27.38.http: Flags [.], cksum 0x2f02 (incorrect -> 0xd40b), seq 3999105692, ack 1651033910, win 229, options [nop,nop,TS val 487596981 ecr 85315611], length 0
09:46:21.343053 IP (tos 0x0, ttl 64, id 50183, offset 0, flags [none], proto TCP (6), length 194)
    192.168.YYY.ZZZ.49681 > 81.3.27.38.http: Flags [P.], cksum 0x2f90 (incorrect -> 0xab81), seq 0:142, ack 1, win 229, options [nop,nop,TS val 487596982 ecr 85315611], length 142: HTTP, length: 142
        GET /2.21/lists/server-list.db HTTP/1.1
        TE: deflate,gzip;q=0.3
        Connection: TE, close
        Host: pakfire.ipfire.org
        User-Agent: Pakfire/2.21

09:46:21.372703 IP (tos 0x0, ttl 64, id 50189, offset 0, flags [none], proto TCP (6), length 52)
    192.168.YYY.ZZZ.49681 > 81.3.27.38.http: Flags [F.], cksum 0x2f02 (incorrect -> 0xd2c4), seq 142, ack 138, win 237, options [nop,nop,TS val 487596990 ecr 85315641], length 0
09:46:22.198260 IP (tos 0x0, ttl 127, id 27279, offset 0, flags [DF], proto TCP (6), length 41)
    192.168.YYY.ZZZ.63230 > ip5886b629.dynamic.kabel-deutschland.de.http: Flags [.], cksum 0xb843 (correct), seq 1033665349:1033665350, ack 1752044190, win 64240, length 1: HTTP
09:46:32.229706 IP (tos 0x0, ttl 127, id 27294, offset 0, flags [DF], proto TCP (6), length 41)
    192.168.YYY.ZZZ.63230 > ip5886b629.dynamic.kabel-deutschland.de.http: Flags [.], cksum 0xb843 (correct), seq 0:1, ack 1, win 64240, length 1: HTTP
Geht an folgendes Src:

Code: Select all

inetnum:        81.3.27.32 - 81.3.27.63
netname:        IPFIRE-ORG-NET
descr:          visit www.ipfire.org
country:        DE
admin-c:        MT15803-RIPE
tech-c:         MT15803-RIPE
status:         ASSIGNED PA
mnt-by:         SSERV-MNT
created:        2016-01-19T10:15:52Z
last-modified:  2016-01-19T10:15:52Z
source:         RIPE

Und via https sehe ich garkeine Anfragen die es in der Liste gibt di an irgend eine ipifre-pakfire IP gehen sollte.

Code: Select all

:tcpdump -vvv -i red0 host 192.168.YYY.ZZZ and dst port 443

Code: Select all

tcpdump: listening on red0, link-type EN10MB (Ethernet), capture size 262144 bytes
09:49:17.952288 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 91)
    192.168.YYY.ZZZ.52069 > 185.60.216.19.https: Flags [FP.], cksum 0xae18 (correct), seq 4199133787:4199133826, ack 2965400777, win 2048, options [nop,nop,TS val 321990663 ecr 3304922008], length 39
09:49:20.521404 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.YYY.ZZZ.52069 > 185.60.216.19.https: Flags [R.], cksum 0xbc55 (correct), seq 40, ack 1, win 2048, length 0
09:49:22.637914 IP (tos 0x0, ttl 115, id 31648, offset 0, flags [DF], proto TCP (6), length 41)
    business-24-134-67-181.pool2.vodafone-ip.de.hacl-probe > 192.168.YYY.ZZZ.https: Flags [.], cksum 0x4d99 (correct), seq 3739040322:3739040323, ack 1259127364, win 1642, length 1
09:49:25.036325 IP (tos 0x2,ECT(0), ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 83)
    192.168.YYY.ZZZ.52755 > 17.248.146.238.https: Flags [P.], cksum 0xc6d3 (correct), seq 3693791719:3693791750, ack 3592022404, win 1024, options [nop,nop,TS val 214342024 ecr 4066277303], length 31
09:49:25.036739 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    192.168.YYY.ZZZ.52755 > 17.248.146.238.https: Flags [F.], cksum 0xc51f (correct), seq 31, ack 1, win 1024, options [nop,nop,TS val 214342024 ecr 4066277303], length 0
09:49:30.139470 IP (tos 0x0, ttl 63, id 23177, offset 0, flags [DF], proto TCP (6), length 52)
    192.168.YYY.ZZZ.59670 > 185.60.216.54.https: Flags [R.], cksum 0x3359 (correct), seq 2755194417, ack 3043133388, win 702, options [nop,nop,TS val 428646593 ecr 3711081104], length 0
09:49:31.205689 IP (tos 0x0, ttl 127, id 27628, offset 0, flags [none], proto UDP (17), length 288)
    192.168.YYY.ZZZ.57652 > resolver1.opendns.com.https: [udp sum ok] UDP, length 260
09:49:32.432151 IP (tos 0x0, ttl 115, id 31706, offset 0, flags [DF], proto TCP (6), length 818)
    business-24-134-67-181.pool2.vodafone-ip.de.hacl-probe > 192.168.YYY.ZZZ.https: Flags [P.], cksum 0xf8cd (correct), seq 1:779, ack 1, win 1642, length 778
09:49:32.731980 IP (tos 0x0, ttl 115, id 31709, offset 0, flags [DF], proto TCP (6), length 40)
    business-24-134-67-181.pool2.vodafone-ip.de.hacl-probe > 192.168.YYY.ZZZ.https: Flags [.], cksum 0x4791 (correct), seq 779, ack 770, win 1639, length 0
Das ist der Public-Key der Root-Zone.

Code: Select all

dig DNSKEY . +multiline

Code: Select all

; <<>> DiG 9.11.3 <<>> DNSKEY . +multiline
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38394
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;.                      IN DNSKEY

;; ANSWER SECTION:
.                       69326 IN DNSKEY 256 3 8 (
                                AwEAAdp440E6Mz7c+Vl4sPd0lTv2Qnc85dTW64j0RDD7
                                sS/zwxWDJ3QRES2VKDO0OXLMqVJSs2YCCSDKuZXpDPuf
                                ++YfAu0j7lzYYdWTGwyNZhEaXtMQJIKYB96pW6cRkiG2
                                Dn8S2vvo/PxW9PKQsyLbtd8PcwWglHgReBVp7kEv/Dd+
                                3b3YMukt4jnWgDUddAySg558Zld+c9eGWkgWoOiuhg4r
                                QRkFstMX1pRyOSHcZuH38o1WcsT4y3eT0U/SR6TOSLIB
                                /8Ftirux/h297oS7tCcwSPt0wwry5OFNTlfMo8v7WGur
                                ogfk8hPipf7TTKHIi20LWen5RCsvYsQBkYGpF78=
                                ) ; ZSK; alg = RSASHA256 ; key id = 2134
.                       69326 IN DNSKEY 257 3 8 (
                                AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQ
                                bSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh
                                /RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWA
                                JQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXp
                                oY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3
                                LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGO
                                Yl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGc
                                LmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=
                                ) ; KSK; alg = RSASHA256 ; key id = 19036
.                       69326 IN DNSKEY 257 3 8 (
                                AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTO
                                iW1vkIbzxeF3+/4RgWOq7HrxRixHlFlExOLAJr5emLvN
                                7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQuCaSnIDdD5
                                LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF0jLHwVN8
                                efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7
                                pr+eoZG+SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLY
                                A4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnXGXws
                                9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU=
                                ) ; KSK; alg = RSASHA256 ; key id = 20326

;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Mon Oct 22 10:36:03 CEST 2018
;; MSG SIZE  rcvd: 853

Der Import der der 118er des gpg.pakfire liegt wohl noch im log als Couldn't resolve host 'pgp.ipfire.org' :

Code: Select all

gpg: keyring `//.gnupg/secring.gpg' created
gpg: requesting key 64D96617 from hkp server pgp.ipfire.org
gpgkeys: HTTP fetch error 6: Couldn't resolve host 'pgp.ipfire.org'
gpg: no valid OpenPGP data found.
[GNUPG:] NODATA 1
gpg: Total number processed: 0
[GNUPG:] IMPORT_RES 0 0 0 0 0 0 0 0 0 0 0 0 0 0
gpg: requesting key 65D0FD58 from hkp server pgp.ipfire.org
gpgkeys: HTTP fetch error 6: Couldn't resolve host 'pgp.ipfire.org'
gpg: no valid OpenPGP data found.
[GNUPG:] NODATA 1
gpg: Total number processed: 0
[GNUPG:] IMPORT_RES 0 0 0 0 0 0 0 0 0 0 0 0 0 0
gpg: keyring `/root/.gnupg/secring.gpg' created
gpg: requesting key 64D96617 from hkp server pgp.ipfire.org
gpg: key 64D96617: public key "Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>" imported
[GNUPG:] IMPORTED 4BDE364C64D96617 Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>
[GNUPG:] IMPORT_OK 1 179740DC4D8C47DC63C099C74BDE364C64D96617
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0
gpg: requesting key 65D0FD58 from hkp server pgp.ipfire.org
gpg: key 65D0FD58: public key "CA Cert Signing Authority (Root CA) <gpg@cacert.org>" imported
[GNUPG:] IMPORTED D2BB0D0165D0FD58 CA Cert Signing Authority (Root CA) <gpg@cacert.org>
[GNUPG:] IMPORT_OK 1 A31D4F81EF4EBD07B456FA04D2BB0D0165D0FD58
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0
gpg: requesting key 64D96617 from hkp server pgp.ipfire.org
gpg: key 64D96617: public key "Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>" imported
[GNUPG:] IMPORTED 4BDE364C64D96617 Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>
[GNUPG:] IMPORT_OK 1 179740DC4D8C47DC63C099C74BDE364C64D96617
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0
gpg: requesting key 65D0FD58 from hkp server pgp.ipfire.org
gpg: key 65D0FD58: public key "CA Cert Signing Authority (Root CA) <gpg@cacert.org>" imported
[GNUPG:] IMPORTED D2BB0D0165D0FD58 CA Cert Signing Authority (Root CA) <gpg@cacert.org>
[GNUPG:] IMPORT_OK 1 A31D4F81EF4EBD07B456FA04D2BB0D0165D0FD58
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0

System ist erreichbar:

Code: Select all

ping pgp.ipfire.org
PING pool.sks-keyservers.net (193.70.2.173) 56(84) bytes of data.
64 bytes from keyserver2.boquet.org (193.70.2.173): icmp_seq=1 ttl=50 time=15.3 ms
64 bytes from keyserver2.boquet.org (193.70.2.173): icmp_seq=2 ttl=50 time=19.9 ms
und unter dem keyserverlist habe ich nur folgende:

Code: Select all

:gpg --list-key
/root/.gnupg/pubring.gpg
------------------------
pub   1024D/64D96617 2007-04-23
uid                  Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>
sub   2048g/1620EB8B 2007-04-23

pub   1024D/65D0FD58 2003-07-11 [expires: 2033-07-03]
uid                  CA Cert Signing Authority (Root CA) <gpg@cacert.org>
sub   2048g/113ED0F2 2003-07-11 [expires: 2033-07-03]

auf einem anderen System sieht es so aus:

Code: Select all

gpg: keyring `//.gnupg/secring.gpg' created
gpg: requesting key 64D96617 from hkp server pgp.ipfire.org
gpg: key 64D96617: public key "Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>" imported
[GNUPG:] IMPORTED 4BDE364C64D96617 Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>
[GNUPG:] IMPORT_OK 1 179740DC4D8C47DC63C099C74BDE364C64D96617
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0
gpg: requesting key 65D0FD58 from hkp server pgp.ipfire.org
gpg: key 65D0FD58: public key "CA Cert Signing Authority (Root CA) <gpg@cacert.org>" imported
[GNUPG:] IMPORTED D2BB0D0165D0FD58 CA Cert Signing Authority (Root CA) <gpg@cacert.org>
[GNUPG:] IMPORT_OK 1 A31D4F81EF4EBD07B456FA04D2BB0D0165D0FD58
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0
gpg: keyring `/root/.gnupg/secring.gpg' created
gpg: requesting key 64D96617 from hkp server pgp.ipfire.org
gpg: key 64D96617: public key "Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>" imported
[GNUPG:] IMPORTED 4BDE364C64D96617 Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>
[GNUPG:] IMPORT_OK 1 179740DC4D8C47DC63C099C74BDE364C64D96617
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0
gpg: requesting key 65D0FD58 from hkp server pgp.ipfire.org
gpg: key 65D0FD58: public key "CA Cert Signing Authority (Root CA) <gpg@cacert.org>" imported
[GNUPG:] IMPORTED D2BB0D0165D0FD58 CA Cert Signing Authority (Root CA) <gpg@cacert.org>
[GNUPG:] IMPORT_OK 1 A31D4F81EF4EBD07B456FA04D2BB0D0165D0FD58
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 1
gpg:               imported: 1
[GNUPG:] IMPORT_RES 1 0 1 0 0 0 0 0 0 0 0 0 0 0

eine Aktualiserung der GPG KEYs sieht so aus:

Code: Select all

:gpg --keyserver pgp.ipfire.org --always-trust --recv-key 64D96617
gpg: requesting key 64D96617 from hkp server pgp.ipfire.org
gpg: key 64D96617: "Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>" not changed
gpg: Total number processed: 1
gpg:              unchanged: 1

Code: Select all

gpg --keyserver pgp.ipfire.org --always-trust --recv-key 65D0FD58
gpg: requesting key 65D0FD58 from hkp server pgp.ipfire.org
gpg: key 65D0FD58: "CA Cert Signing Authority (Root CA) <gpg@cacert.org>" 403 new signatures
gpg: key 65D0FD58: public key "CA Cert Signing Authority (Root CA) <gpg@cacert.org>" imported
gpg: no need for a trustdb check with `always' trust model
gpg: Total number processed: 2
gpg:               imported: 1  (RSA: 1)
gpg:         new signatures: 403
Jedoch wieder mit dem Fehler:

Code: Select all

Oct 22 11:47:29 ipfw-pcomu pakfire: PAKFIRE INFO: IPFire Pakfire 2.21 started!
Oct 22 11:47:29 ipfw-pcomu pakfire: Sending my uuid: 96b13752-49b9-4abd-a8e6-b3439a72c879
Oct 22 11:47:29 ipfw-pcomu pakfire: DOWNLOAD STARTED: counter.py?ver=2.21&uuid=96b13752-49b9-4abd-a8e6-b3439a72c879
Oct 22 11:47:29 ipfw-pcomu pakfire: DOWNLOAD INFO: Host: pakfire.ipfire.org (HTTP) - File: counter.py?ver=2.21&uuid=96b13752-49b9-4abd-a8e6-b3439a72c879
Oct 22 11:47:29 ipfw-pcomu pakfire: DOWNLOAD INFO: HTTP-Status-Code: 500 - 500 Can't verify SSL peers without knowing which Certificate Authorities to trust
Oct 22 11:47:29 ipfw-pcomu pakfire: Giving up: There was no chance to get the file counter.py?ver=2.21
Oct 22 11:47:29 ipfw-pcomu pakfire: MIRROR INFO: server-list.db is 8046 seconds old. - DEBUG: force
Oct 22 11:47:29 ipfw-pcomu pakfire: DOWNLOAD STARTED: 2.21/lists/server-list.db
Oct 22 11:47:29 ipfw-pcomu pakfire: DOWNLOAD INFO: Host: pakfire.ipfire.org (HTTP) - File: 2.21/lists/server-list.db
Oct 22 11:47:29 ipfw-pcomu pakfire: DOWNLOAD INFO: 2.21/lists/server-list.db has size of  bytes
Oct 22 11:47:30 ipfw-pcomu pakfire: DOWNLOAD INFO: HTTP-Status-Code: 500 - 500 Can't verify SSL peers without knowing which Certificate Authorities to trust
Oct 22 11:47:30 ipfw-pcomu pakfire: Giving up: There was no chance to get the file 2.21/lists/server-list.db from any available server. There was an error on the way. Please fix it.
Oct 22 11:47:30 ipfw-pcomu pakfire: DB INFO: packages_list.db is 35920 seconds old. - DEBUG: force
Oct 22 11:47:30 ipfw-pcomu pakfire: DOWNLOAD STARTED: lists/packages_list.db
Oct 22 11:47:30 ipfw-pcomu pakfire: MIRROR INFO: 25 servers found in list
Oct 22 11:47:30 ipfw-pcomu pakfire: PING INFO: firemirror.scp-systems.ch is alive
Oct 22 11:47:30 ipfw-pcomu pakfire: DOWNLOAD INFO: Host: firemirror.scp-systems.ch (HTTPS) - File: pakfire2/2.21/lists/packages_list.db
Oct 22 11:47:30 ipfw-pcomu pakfire: DOWNLOAD INFO: pakfire2/2.21/lists/packages_list.db has size of  bytes
Oct 22 11:47:30 ipfw-pcomu pakfire: DOWNLOAD INFO: HTTP-Status-Code: 500 - 500 Can't verify SSL peers without knowing which Certificate Authorities to trust
Oct 22 11:47:30 ipfw-pcomu pakfire: Giving up: There was no chance to get the file lists/packages_list.db from any available server. There was an error on the way. Please fix it.
Oct 22 11:47:30 ipfw-pcomu pakfire: CORE INFO: core-list.db is 652703 seconds old. - DEBUG: force
Oct 22 11:47:30 ipfw-pcomu pakfire: DOWNLOAD STARTED: lists/core-list.db
Oct 22 11:47:30 ipfw-pcomu pakfire: MIRROR INFO: 25 servers found in list
Oct 22 11:47:31 ipfw-pcomu pakfire: PING INFO: mirror.cedia.org.ec is alive
Oct 22 11:47:31 ipfw-pcomu pakfire: DOWNLOAD INFO: Host: mirror.cedia.org.ec (HTTPS) - File: ipfire/pakfire2/2.21/lists/core-list.db
Oct 22 11:47:31 ipfw-pcomu pakfire: DOWNLOAD INFO: ipfire/pakfire2/2.21/lists/core-list.db has size of  bytes
Oct 22 11:47:31 ipfw-pcomu pakfire: DOWNLOAD INFO: HTTP-Status-Code: 500 - 500 Can't verify SSL peers without knowing which Certificate Authorities to trust
Oct 22 11:47:31 ipfw-pcomu pakfire: Giving up: There was no chance to get the file lists/core-list.db from any available server. There was an error on the way. Please fix it.
Oct 22 11:47:31 ipfw-pcomu pakfire: PAKFIRE INFO: Pakfire has finished. Closing.

und nun habe ich einen Unterschied - was mich wundert an dem einen System wo es geht steht dies drin:

Code: Select all

gpg --with-fingerprint pubring.gpg
pub  1024D/64D96617 2007-04-23 Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>
      Key fingerprint = 1797 40DC 4D8C 47DC 63C0  99C7 4BDE 364C 64D9 6617
sub  2048g/1620EB8B 2007-04-23
pub  1024D/65D0FD58 2003-07-11 CA Cert Signing Authority (Root CA) <gpg@cacert.org>
      Key fingerprint = A31D 4F81 EF4E BD07 B456  FA04 D2BB 0D01 65D0 FD58
sub  2048g/113ED0F2 2003-07-11 [expires: 2033-07-03]

und bei meinem Problemkind sehe ich folgendes:

Code: Select all

gpg --with-fingerprint pubring.gpg
pub  1024D/64D96617 2007-04-23 Michael Tremer (Pakfire Signing Key) <paks@ipfire.org>
      Key fingerprint = 1797 40DC 4D8C 47DC 63C0  99C7 4BDE 364C 64D9 6617
sub  2048g/1620EB8B 2007-04-23
pub  1024D/65D0FD58 2003-07-11 CA Cert Signing Authority (Root CA) <gpg@cacert.org>
      Key fingerprint = A31D 4F81 EF4E BD07 B456  FA04 D2BB 0D01 65D0 FD58
sub  2048g/113ED0F2 2003-07-11 [expires: 2033-07-03]
pub  1024R/65D0FD58 2014-06-16 [revoked]
uid                            CA Cert Signing Authority (Root CA) <gpg@cacert.org>
Mail Gateway: mail proxy

Image

Image

5p9
Mentor
Mentor
Posts: 1821
Joined: May 1st, 2011, 3:27 pm

Re: Pakfire HTTP-Status-Code: 500 CoreUpdate 121 - 123

Post by 5p9 » October 23rd, 2018, 7:32 am

Hi,

gibt es eine Möglichkeit anhand der ISO das System zu aktualiseiern, wenn er schon nicht mit den Spiegelserver sprechen will?
Ich bin ja schon lang dabei, aber dieses Problem hatte ich bis dato nie, ist ja nicht so als kenne ich die gute alte IPF nicht wirklich ;) Aber da steige ich aus, was den Updateprozess anbelangt.

VG, 5p9
Mail Gateway: mail proxy

Image

Image

Post Reply

Who is online

Users browsing this forum: No registered users and 2 guests