Seems you are alone in that case, work well here (maybe you can retry)

 curl -Lv -o /var/tmp/bareos-experimental.gpg 
https://download.bareos.org/current/xUbuntu_24.04/bareos-keyring.gpg
  % Total    % Received % Xferd  Average Speed   Time    Time     Time 
 Current
                                 Dload  Upload   Total   Spent    Left 
 Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--   
  0* Host download.bareos.org:443 was resolved.
* IPv6: 2a03:4000:15:27f::1
* IPv4: 185.170.114.121
*   Trying [2a03:4000:15:27f::1]:443...
* Connected to download.bareos.org (2a03:4000:15:27f::1) port 443
* ALPN: curl offers h2,http/1.1
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
*  CAfile: /etc/ssl/certs/ca-certificates.crt
*  CApath: /etc/ssl/certs
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [93 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [2575 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / prime256v1 / 
rsaEncryption
* ALPN: server did not agree on a protocol. Uses default.
* Server certificate:
*  subject: CN=download.bareos.org
*  start date: Sep  3 21:23:43 2024 GMT
*  expire date: Dec  2 21:23:42 2024 GMT
*  subjectAltName: host "download.bareos.org" matched cert's 
"download.bareos.org"
*  issuer: C=US; O=Let's Encrypt; CN=R10
*  SSL certificate verify ok.
*   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), 
signed using sha256WithRSAEncryption
*   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), 
signed using sha256WithRSAEncryption
*   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), 
signed using sha256WithRSAEncryption
* using HTTP/1.x
} [5 bytes data]
> GET /current/xUbuntu_24.04/bareos-keyring.gpg HTTP/1.1
> Host: download.bareos.org
> User-Agent: curl/8.5.0
> Accept: */*
>
{ [5 bytes data]
< HTTP/1.1 200 OK
< Date: Mon, 28 Oct 2024 10:48:58 GMT
< Server: Apache
< Last-Modified: Fri, 11 Oct 2024 14:52:09 GMT
< ETag: "497-62434a1af8ece"
< Accept-Ranges: bytes
< Content-Length: 1175
< Strict-Transport-Security: max-age=31536000; preload
< Content-Security-Policy: child-src 'self' *.bareos.com *.bareos.org 
*.youtube.com
< X-Content-Type-Options: nosniff
<
{ [1175 bytes data]
100  1175  100  1175    0     0  13473      0 --:--:-- --:--:-- --:--:-- 
13505
* Connection #0 to host download.bareos.org left intact

gpg  /var/tmp/bareos-experimental.gpg
gpg: WARNING: no command supplied.  Trying to guess what you mean ...
pub   rsa4096 2019-10-28 [SC]
      82834CF002D89BA55C1ED0AA42DA24A6DFEF9127
uid           Bareos experimental Signing Key <xxxx>


On Saturday 26 October 2024 at 00:09:02 UTC+2 John Lockard wrote:

> I've tried using the add_bareos_repositories script, as well as adding the 
> .gpg keys, yet when doing 'apt update' I still get:
>
> Get:9 https://download.bareos.org/current/xUbuntu_24.04 InRelease [1,896 
> B]
> Err:9 https://download.bareos.org/current/xUbuntu_24.04 InRelease
>   The following signatures couldn't be verified because the public key is 
> not available: NO_PUBKEY 42DA24A6DFEF9127
> Reading package lists... Done
> W: GPG error: https://download.bareos.org/current/xUbuntu_24.04 
> InRelease: The following signatures couldn't be verified because the public 
> key is not available: NO_PUBKEY 42DA24A6DFEF9127
> E: The repository 'https://download.bareos.org/current/xUbuntu_24.04 
>  InRelease' is not signed.
> N: Updating from such a repository can't be done securely, and is 
> therefore disabled by default.
>
> I've also tried doing it by hand:
>
> wget -O /etc/apt/keyrings/bareos-experimental.gpg 
> https://download.bareos.org/current/xUbuntu_24.04/bareos-keyring.gpg
>
> Same results.
>
> Bad keys on the Bareos site???
>
> Thanks,
> -John
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"bareos-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/bareos-users/cf8c3617-9fc9-47fa-a386-eb67b64c7259n%40googlegroups.com.

Reply via email to