-
-
Notifications
You must be signed in to change notification settings - Fork 506
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dietpi-update 7.4.2 to 7.6.2 failed #4801
Comments
Basically there are 2 issues and both are known. Could you post following output plus before we go to fix them.
|
|
|
Fix for both issues would be
I hope I catched correct location of And a side node not related to the issue. You are running oldold Debian Stretch version. You migh consider to upgrade to Buster https://dietpi.com/docs/usage/#how-to-upgrade-to-buster |
Thank you, it worked. However, the file in sources.list.d/ is called dietpi-mosquitto.list and has the following content: |
Yeah I wasn't sure on the correct source file name. As I'm online with my mobile phone only, I couldn't verify it.
|
So the contained patch does not run 🤔. Can you run the following, please, to help us checking for the possible reason: apt-key list '95BD4743' Probably we should use the full fingerprint instead of only those (last) 8 characters. Here it works well on Stretch, here with the new key, expiring in 2024, of course: # apt-key list '95BD4743'
pub rsa3072 2019-03-18 [SC] [expires: 2024-02-16]
1505 8500 A023 5D97 F5D1 0063 B188 E2B6 95BD 4743
uid [ unknown] DEB.SURY.ORG Automatic Signing Key <[email protected]>
sub rsa3072 2019-03-18 [E] [expires: 2024-02-16]
# apt-key list '95BD4743' 2> /dev/null | grep 'expires: 2024-'
pub rsa3072 2019-03-18 [SC] [expires: 2024-02-16]
sub rsa3072 2019-03-18 [E] [expires: 2024-02-16]
# apt-key list '15058500A0235D97F5D10063B188E2B695BD4743'
pub rsa3072 2019-03-18 [SC] [expires: 2024-02-16]
1505 8500 A023 5D97 F5D1 0063 B188 E2B6 95BD 4743
uid [ unknown] DEB.SURY.ORG Automatic Signing Key <[email protected]>
sub rsa3072 2019-03-18 [E] [expires: 2024-02-16] |
root@rp3b:# htop root@rp3b:~# |
That all looks pretty correct, no idea why the pre-patch was not applied: https://github.com/MichaIng/DietPi/blob/03bc475/.update/pre-patches#L27-L37 It checks for
@Joulinar |
Ok I will hold back resolution to get some deeper investigation done. |
Okay second issue, the Mosquitto repository suffers from the same issue as |
Yes it is: https://www.ssllabs.com/ssltest/analyze.html?d=repo.mosquitto.org&s=85.119.83.194&latest Path
|
1 | Sent by server | repo.mosquitto.orgFingerprint SHA256: 09c7e86de19ba551a58d5c5aa8d7729958aabe42b37a3b07f2459819a9da4bacPin SHA256: 8T79+AGILqZ5hAfZwlFKYHonbAPmtCfO46a4rAG4I5I=RSA 2048 bits (e 65537) / SHA256withRSA |
---|---|---|
2 | Sent by server | R3Fingerprint SHA256: 67add1166b020ae61b8f5fc96813c04c2aa589960796865572a3c7e737613dfdPin SHA256: jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0=RSA 2048 bits (e 65537) / SHA256withRSA |
3 | In trust store | ISRG Root X1 Self-signedFingerprint SHA256: 96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6Pin SHA256: C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M=RSA 4096 bits (e 65537) / SHA256withRSA |
Path #2
: Not trusted (invalid certificate [Fingerprint SHA256: 0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739])
1 | Sent by server | repo.mosquitto.orgFingerprint SHA256: 09c7e86de19ba551a58d5c5aa8d7729958aabe42b37a3b07f2459819a9da4bacPin SHA256: 8T79+AGILqZ5hAfZwlFKYHonbAPmtCfO46a4rAG4I5I=RSA 2048 bits (e 65537) / SHA256withRSA |
---|---|---|
2 | Sent by server | R3Fingerprint SHA256: 67add1166b020ae61b8f5fc96813c04c2aa589960796865572a3c7e737613dfdPin SHA256: jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0=RSA 2048 bits (e 65537) / SHA256withRSA |
3 | Sent by server | ISRG Root X1Fingerprint SHA256: 6d99fb265eb1c5b3744765fcbc648f3cd8e1bffafdc4c2f99b9d47cf7ff1c24fPin SHA256: C5+lpZ7tcVwmwQIMcRtPbsQtWLABXhQzejna0wHFr8M=RSA 4096 bits (e 65537) / SHA256withRSACRL ERROR: HTTP request failed with status code 404: http://crl.identrust.com/DSTROOTCAX3CRL.crl |
4 | In trust store | DST Root CA X3 Self-signedFingerprint SHA256: 0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739Pin SHA256: Vjs8r4z+80wjNcr1YKepWQboSIRi63WsWXhIMN+eWys=RSA 2048 bits (e 65537) / SHA1withRSAValid until: Thu, 30 Sep 2021 14:01:15 UTCEXPIREDWeak or insecure signature, but no impact on root certificate |
Reported: eclipse-mosquitto/mosquitto#2336
Is there a manual work-around for this issue? I'm currently stuck on version 7.5.2 and attempting to update to 7.8.2 and get the same error.
I attempted the suggested workaround to no avail:
which gives the same error on that last update command |
Pls can you share the entire log message for the command |
|
If it helps I sent bug reports from the last time I tried as well as just trying again now, with the same error from dietpi-update.
|
Please try the following:
|
|
after the last apt upgrade it seems to now get through the dietpi-udate, thanks for the help. |
I'm wondering how this was fixed now because you still had the same issue while running But good if it has been fixed. Btw: you are running oldold Debian Stretch. At least you should think of to upgrade to Buster as we will stop supporting Stretch systems soon and you will not receive further updates. |
However, good when it's solved now. I'll mark this issue as closed. The three repositories have been informed about the issue, but it is not that trivial to solve as with common Certbot versions Let's Encrypt's ACME servers themselves still provide the invalid certification path for some reason. A workaround is in place, and at least generally it works ( |
Linux rp3b 4.19.66-v7+ #1253 SMP Thu Aug 15 11:49:46 BST 2019 armv7l GNU/Linux
apt-get -q update
Steps to reproduce:
.
Expected behaviour:
Actual behaviour:
The text was updated successfully, but these errors were encountered: