The adding of the keyring is not the failure.  That adds just fine.  Try 
doing an 'apt update'

* Server certificate:
*  subject: CN=download.bareos.org
*  start date: Sep  3 21:23:43 2024 GMT
*  expire date: Dec  2 21:23:42 2024 GMT
*  subjectAltName: host "download.bareos.org" matched cert's 
"download.bareos.org"
*  issuer: C=US; O=Let's Encrypt; CN=R10
*  SSL certificate verify ok.
*   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), 
signed using sha256WithRSAEncryption
*   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), 
signed using sha256WithRSAEncryption
*   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), 
signed using sha256WithRSAEncryption
* using HTTP/1.x
} [5 bytes data]
> GET /current/xUbuntu_24.04/bareos-keyring.gpg HTTP/1.1
> Host: download.bareos.org
> User-Agent: curl/8.5.0
> Accept: */*
>
{ [5 bytes data]
< HTTP/1.1 200 OK
< Date: Mon, 28 Oct 2024 17:22:11 GMT
< Server: Apache
< Last-Modified: Fri, 11 Oct 2024 14:52:09 GMT
< ETag: "497-62434a1af8ece"
< Accept-Ranges: bytes
< Content-Length: 1175
< Strict-Transport-Security: max-age=31536000; preload
< Content-Security-Policy: child-src 'self' *.bareos.com *.bareos.org 
*.youtube.com
< X-Content-Type-Options: nosniff
<
{ [1175 bytes data]
100  1175  100  1175    0     0   2540      0 --:--:-- --:--:-- --:--:-- 
 2543
* Connection #0 to host download.bareos.org left intact
root@xx-xxxxx:/tmp# *apt update*
Hit:1 http://ubuntu22-mirror.dsc.umich.edu/miserver  InRelease
Hit:2 http://us.archive.ubuntu.com/ubuntu noble InRelease
Get:3 http://us.archive.ubuntu.com/ubuntu noble-updates InRelease [126 kB]
Get:4 http://security.ubuntu.com/ubuntu noble-security InRelease [126 kB]
Get:5 http://us.archive.ubuntu.com/ubuntu noble-backports InRelease [126 kB]
Hit:6 https://repo.zabbix.com/zabbix/6.4/ubuntu noble InRelease
Get:7 http://us.archive.ubuntu.com/ubuntu noble-updates/main amd64 Packages 
[599 kB]
Get:8 http://us.archive.ubuntu.com/ubuntu noble-updates/main amd64 
Components [114 kB]
Get:9 http://us.archive.ubuntu.com/ubuntu noble-updates/restricted amd64 
Components [212 B]
Get:10 http://us.archive.ubuntu.com/ubuntu noble-updates/universe amd64 
Packages [709 kB]
Get:11 http://us.archive.ubuntu.com/ubuntu noble-updates/universe amd64 
Components [305 kB]
Get:12 http://us.archive.ubuntu.com/ubuntu noble-updates/multiverse amd64 
Components [940 B]
Get:13 http://us.archive.ubuntu.com/ubuntu noble-backports/main amd64 
Components [208 B]
Get:14 http://us.archive.ubuntu.com/ubuntu noble-backports/restricted amd64 
Components [212 B]
Get:15 http://us.archive.ubuntu.com/ubuntu noble-backports/universe amd64 
Components [21.1 kB]
Get:16 http://us.archive.ubuntu.com/ubuntu noble-backports/multiverse amd64 
Components [212 B]
Ign:17 https://pkg.duosecurity.com/Ubuntu jammy InRelease
Get:18 https://download.bareos.org/current/xUbuntu_24.04  InRelease [1,896 
B]
Get:19 http://security.ubuntu.com/ubuntu noble-security/main amd64 
Components [7,196 B]
Err:18 https://download.bareos.org/current/xUbuntu_24.04  InRelease
  The following signatures couldn't be verified because the public key is 
not available: NO_PUBKEY 42DA24A6DFEF9127
Get:20 http://security.ubuntu.com/ubuntu noble-security/restricted amd64 
Components [212 B]
Get:21 http://security.ubuntu.com/ubuntu noble-security/universe amd64 
Packages [556 kB]
Hit:22 https://pkg.duosecurity.com/Ubuntu jammy Release
Get:24 http://security.ubuntu.com/ubuntu noble-security/universe amd64 
Components [51.9 kB]
Get:25 http://security.ubuntu.com/ubuntu noble-security/universe amd64 
c-n-f Metadata [13.5 kB]
Get:26 http://security.ubuntu.com/ubuntu noble-security/multiverse amd64 
Components [212 B]
Reading package lists... Done
W: GPG error: https://download.bareos.org/current/xUbuntu_24.04  InRelease: 
The following signatures couldn't be verified because the public key is not 
available: NO_PUBKEY 42DA24A6DFEF9127
E: The repository 'https://download.bareos.org/current/xUbuntu_24.04 
 InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore 
disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration 
details.

On Monday, October 28, 2024 at 6:51:09 AM UTC-4 Bruno Friedmann 
(bruno-at-bareos) wrote:

> Seems you are alone in that case, work well here (maybe you can retry)
>
>  curl -Lv -o /var/tmp/bareos-experimental.gpg 
> https://download.bareos.org/current/xUbuntu_24.04/bareos-keyring.gpg
>   % Total    % Received % Xferd  Average Speed   Time    Time     Time 
>  Current
>                                  Dload  Upload   Total   Spent    Left 
>  Speed
>   0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--   
>   0* Host download.bareos.org:443 was resolved.
> * IPv6: 2a03:4000:15:27f::1
> * IPv4: 185.170.114.121
> *   Trying [2a03:4000:15:27f::1]:443...
> * Connected to download.bareos.org (2a03:4000:15:27f::1) port 443
> * ALPN: curl offers h2,http/1.1
> } [5 bytes data]
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> } [512 bytes data]
> *  CAfile: /etc/ssl/certs/ca-certificates.crt
> *  CApath: /etc/ssl/certs
> { [5 bytes data]
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> { [93 bytes data]
> * TLSv1.2 (IN), TLS handshake, Certificate (11):
> { [2575 bytes data]
> * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
> { [333 bytes data]
> * TLSv1.2 (IN), TLS handshake, Server finished (14):
> { [4 bytes data]
> * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
> } [70 bytes data]
> * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
> } [1 bytes data]
> * TLSv1.2 (OUT), TLS handshake, Finished (20):
> } [16 bytes data]
> * TLSv1.2 (IN), TLS handshake, Finished (20):
> { [16 bytes data]
> * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / prime256v1 
> / rsaEncryption
> * ALPN: server did not agree on a protocol. Uses default.
> * Server certificate:
> *  subject: CN=download.bareos.org
> *  start date: Sep  3 21:23:43 2024 GMT
> *  expire date: Dec  2 21:23:42 2024 GMT
> *  subjectAltName: host "download.bareos.org" matched cert's "
> download.bareos.org"
> *  issuer: C=US; O=Let's Encrypt; CN=R10
> *  SSL certificate verify ok.
> *   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), 
> signed using sha256WithRSAEncryption
> *   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), 
> signed using sha256WithRSAEncryption
> *   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), 
> signed using sha256WithRSAEncryption
> * using HTTP/1.x
> } [5 bytes data]
> > GET /current/xUbuntu_24.04/bareos-keyring.gpg HTTP/1.1
> > Host: download.bareos.org
> > User-Agent: curl/8.5.0
> > Accept: */*
> >
> { [5 bytes data]
> < HTTP/1.1 200 OK
> < Date: Mon, 28 Oct 2024 10:48:58 GMT
> < Server: Apache
> < Last-Modified: Fri, 11 Oct 2024 14:52:09 GMT
> < ETag: "497-62434a1af8ece"
> < Accept-Ranges: bytes
> < Content-Length: 1175
> < Strict-Transport-Security: max-age=31536000; preload
> < Content-Security-Policy: child-src 'self' *.bareos.com *.bareos.org *.
> youtube.com
> < X-Content-Type-Options: nosniff
> <
> { [1175 bytes data]
> 100  1175  100  1175    0     0  13473      0 --:--:-- --:--:-- --:--:-- 
> 13505
> * Connection #0 to host download.bareos.org left intact
>
> gpg  /var/tmp/bareos-experimental.gpg
> gpg: WARNING: no command supplied.  Trying to guess what you mean ...
> pub   rsa4096 2019-10-28 [SC]
>       82834CF002D89BA55C1ED0AA42DA24A6DFEF9127
> uid           Bareos experimental Signing Key <xxxx>
>
>
> On Saturday 26 October 2024 at 00:09:02 UTC+2 John Lockard wrote:
>
>> I've tried using the add_bareos_repositories script, as well as adding 
>> the .gpg keys, yet when doing 'apt update' I still get:
>>
>> Get:9 https://download.bareos.org/current/xUbuntu_24.04 InRelease [1,896 
>> B]
>> Err:9 https://download.bareos.org/current/xUbuntu_24.04 InRelease
>>   The following signatures couldn't be verified because the public key is 
>> not available: NO_PUBKEY 42DA24A6DFEF9127
>> Reading package lists... Done
>> W: GPG error: https://download.bareos.org/current/xUbuntu_24.04 
>> InRelease: The following signatures couldn't be verified because the public 
>> key is not available: NO_PUBKEY 42DA24A6DFEF9127
>> E: The repository 'https://download.bareos.org/current/xUbuntu_24.04 
>>  InRelease' is not signed.
>> N: Updating from such a repository can't be done securely, and is 
>> therefore disabled by default.
>>
>> I've also tried doing it by hand:
>>
>> wget -O /etc/apt/keyrings/bareos-experimental.gpg 
>> https://download.bareos.org/current/xUbuntu_24.04/bareos-keyring.gpg
>>
>> Same results.
>>
>> Bad keys on the Bareos site???
>>
>> Thanks,
>> -John
>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"bareos-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/bareos-users/455c44db-02d2-41db-8264-93a782c8fdf2n%40googlegroups.com.

Reply via email to