Full transcript below.
Download the add_bareos_repositories.sh file.
Run downloaded script, which adds key to keyrings.
Run 'apt update' which fails because public key is not available.


root@si-scott:~# *curl -Lv -o ./add_bareos_repositories.sh 
https://download.bareos.org/current/xUbuntu_24.04/add_bareos_repositories.sh*
  % Total    % Received % Xferd  Average Speed   Time    Time     Time 
 Current
                                 Dload  Upload   Total   Spent    Left 
 Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--   
  0* Host download.bareos.org:443 was resolved.
* IPv6: 2a03:4000:15:27f::1
* IPv4: 185.170.114.121
*   Trying 185.170.114.121:443...
* Connected to download.bareos.org (185.170.114.121) port 443
* ALPN: curl offers h2,http/1.1
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
*  CAfile: /etc/ssl/certs/ca-certificates.crt
*  CApath: /etc/ssl/certs
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [93 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [2575 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / prime256v1 / 
rsaEncryption
* ALPN: server did not agree on a protocol. Uses default.
* Server certificate:
*  subject: CN=download.bareos.org
*  start date: Sep  3 21:23:43 2024 GMT
*  expire date: Dec  2 21:23:42 2024 GMT
*  subjectAltName: host "download.bareos.org" matched cert's 
"download.bareos.org"
*  issuer: C=US; O=Let's Encrypt; CN=R10
*  SSL certificate verify ok.
*   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), 
signed using sha256WithRSAEncryption
*   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), 
signed using sha256WithRSAEncryption
*   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), 
signed using sha256WithRSAEncryption
* using HTTP/1.x
} [5 bytes data]
> GET /current/xUbuntu_24.04/add_bareos_repositories.sh HTTP/1.1
> Host: download.bareos.org
> User-Agent: curl/8.5.0
> Accept: */*
>
{ [5 bytes data]
< HTTP/1.1 200 OK
< Date: Tue, 29 Oct 2024 14:50:25 GMT
< Server: Apache
< Last-Modified: Fri, 11 Oct 2024 14:52:09 GMT
< ETag: "b3e-62434a1afb5de"
< Accept-Ranges: bytes
< Content-Length: 2878
< Content-Type: text/plain; charset=UTF-8
< Strict-Transport-Security: max-age=31536000; preload
< Content-Security-Policy: child-src 'self' *.bareos.com *.bareos.org 
*.youtube.com
< X-Content-Type-Options: nosniff
<
{ [2878 bytes data]
100  2878  100  2878    0     0   6210      0 --:--:-- --:--:-- --:--:-- 
 6215
* Connection #0 to host download.bareos.org left intact




root@si-scott:~# *ls*
add_bareos_repositories.sh  CIS-LBK




root@si-scott:~# *more add_bareos_repositories.sh*
#!/bin/sh

set -u
set -e

PREFIX_DIR=""
# declare the Bareos repository
DOWNLOADSERVER="download.bareos.org"
URL="https://download.bareos.org/current/xUbuntu_24.04";

# setup credentials for apt auth
# (required for download.bareos.com, subscription)
BAREOS_USERNAME="username_at_example.com"
BAREOS_PASSWORD="MySecretBareosPassword"

if [ "${DOWNLOADSERVER}" = "download.bareos.com" ] && [ -d 
"${PREFIX_DIR}/etc/apt/auth.conf.d/" ]; then
    cat <<EOT >"${PREFIX_DIR}/etc/apt/auth.conf.d/download_bareos_com.conf"
machine download.bareos.com
login ${BAREOS_USERNAME}
password ${BAREOS_PASSWORD}
EOT
    chmod 0600 "${PREFIX_DIR}/etc/apt/auth.conf.d/download_bareos_com.conf"
fi

# add the Bareos repository
cat <<EOT >"${PREFIX_DIR}/etc/apt/sources.list.d/bareos.sources"
Types: deb deb-src
URIs: ${URL}
Suites: /
Architectures: amd64
Signed-By: ${PREFIX_DIR}/etc/apt/keyrings/bareos-experimental.gpg
EOT

# add package key
mkdir -p "${PREFIX_DIR}/etc/apt/keyrings/"
# download key via
# wget -O /etc/apt/keyrings/bareos-experimental.gpg 
${URL}/bareos-keyring.gpg
# or
cat << EOT | gpg --dearmor -o 
"${PREFIX_DIR}/etc/apt/keyrings/bareos-experimental.gpg"
-----BEGIN PGP PUBLIC KEY BLOCK-----

mQINBF23EK4BEAC1FADpF6aaC93bxouVT6/BuXJajjtLkHNKfY26BYuvpwgLmVwp
M8vBuQWEPxxP6y2wXffv5bO/0Y1tS7tCW4i7duKz6W6as7/N13P/Mah8KOS0Zles
VM94fKXX8um7okqY9EwqgWVyHetW0PVpMKCsguMezv0IUmGAi/XX/GgJBeDYWvTh
S8DXtMhqWMXWv9yptJJsFQgdS0GVb8fcHG+Vl5GWmb+p8+R5x2JjLrP2OIoY8caD
boueBiUUeYnlPQqBa7flZSlBslSbk8qwnr75r/fX0/ihnFfLZol348AOCjPeWEYM
H3xQvuuyXsOg7dJ3dX4pE/MwUUOSlWyAACvCDYLQ+Xlvnt1j1dmbnGiBYRfn9cMZ
YEDZVSey7LwUwkXi9yXAc5+g6+OUUz1dIoZCyiAezttU8yfoiLXgilOHm7LniW4o
n5LIxTmo3pUSeEdQntFKd8jStIhvhGyKop1wlDU+FGUaxgWdswKE5se7WdaR6Em7
iuOMd9hZpS24Y4jeGjr4v4uwzB/Y8eB+vvM/ISGJltC8zgNpk81Dv1g2m/cy3YLb
POUxNy5+TAdO3UztuYbGQqgDax8RESD/6CbC8Z8X4TXYETjqtBR/9dNWBJCMb3aT
CXqZyc0YwiU0ISDCZhKbrPCkhwniOI4gqNz2pyFn9eUBw4xXx4DV0rQkyQARAQAB
tDRCYXJlb3MgZXhwZXJpbWVudGFsIFNpZ25pbmcgS2V5IDxzaWduaW5nQGJhcmVv
cy5jb20+iQJOBBMBCAA4AhsDAh4BAheAFiEEgoNM8ALYm6VcHtCqQtokpt/vkScF
AmXLUuMFCwkIBwIGFQoJCAsCBBYCAwEACgkQQtokpt/vkSc0DxAAnCyk0+LL4yZn
hL3AFKww0jgX++0QHYGZOFUoFyuqrPEtkjDAgBhNugPKejb15kRxhPuTHriXD9iO
O7F7hlnOGpnm/V11Gsu1k0tHgPYTS0U+ZkAtqTh/pWpKbEGV1tcUX2qMgoJRDopp
wUbnpQfFBGxqmqFZB4as7P4JkQRqMVCTGDsW3bmoTLYwi1IzB5YUPyfP7PxCvpwC
RHm/cidvRztiwUv5Y8ZD8b8G1B18klPNwTDkrGIj4MGTEDmuk82Ohu7Y44VpJ8mM
2kXv4z84VwqulYWj7t4WzxN8xpYMQw+2Yj9y1t4meYmlrG5df6MFlT7sW3DO4duJ
b5QI40B1RPhMeVUdrCAuNcsQxwpbcnDcuQZYKvkFhu8E2QBm+dQq6+y3fjbebvF5
y4GfwYGryNjlA3Vz24DylaN7k0VzccYGPK7WaPEgFI89OyqMdGveQR61xpe/1H/Q
GtQR1y3j6cR3K7M5cAJ0KIwA09lsOdcjd73Dl5xSmp8O9G/yf5Ybu/gDy422AeT3
KZ7zixRyB5NRSn6t51OehZOWZSQtMP8dkP2AzKkZs3GB3h2bREU6kMjY0BD7secV
eIeL6THtJhpm8OGacLSN/G4bDjxFpmlUxPH7nwL6zFCxPBoQubhzxgIIFSfKcB/E
iigZf6MxTddPMRaD36FLlataihx7mLQ=
=GxhN
-----END PGP PUBLIC KEY BLOCK-----
EOT

echo "Repository ${URL} successfully added."




root@si-scott:~# *sh ./add_bareos_repositories.sh*
File '/etc/apt/keyrings/bareos-experimental.gpg' exists. Overwrite? (y/N) y
Repository https://download.bareos.org/current/xUbuntu_24.04 successfully 
added.




root@si-scott:~# *apt update*
Hit:1 http://ubuntu22-mirror.dsc.umich.edu/miserver  InRelease
Hit:2 http://us.archive.ubuntu.com/ubuntu noble InRelease
Hit:3 http://us.archive.ubuntu.com/ubuntu noble-updates InRelease
Hit:4 http://us.archive.ubuntu.com/ubuntu noble-backports InRelease
Hit:5 http://security.ubuntu.com/ubuntu noble-security InRelease
Hit:6 https://repo.zabbix.com/zabbix/6.4/ubuntu noble InRelease
Ign:7 https://pkg.duosecurity.com/Ubuntu jammy InRelease
Get:8 https://download.bareos.org/current/xUbuntu_24.04  InRelease [1,896 B]
Err:8 https://download.bareos.org/current/xUbuntu_24.04  InRelease
  The following signatures couldn't be verified because the public key is 
not available: NO_PUBKEY 42DA24A6DFEF9127
Hit:9 https://pkg.duosecurity.com/Ubuntu jammy Release
Reading package lists... Done
W: GPG error: https://download.bareos.org/current/xUbuntu_24.04  InRelease: 
The following signatures couldn't be verified because the public key is not 
available: NO_PUBKEY 42DA24A6DFEF9127
E: The repository 'https://download.bareos.org/current/xUbuntu_24.04 
 InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore 
disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration 
details.



root@si-scott:~# *lsb_release -a*
No LSB modules are available.
Distributor ID: Ubuntu
Description:    Ubuntu 24.04.1 LTS
Release:        24.04
Codename:       noble
On Tuesday, October 29, 2024 at 4:53:06 AM UTC-4 Bruno Friedmann 
(bruno-at-bareos) wrote:

> Sorry but for there (outside bareos infra) it is still possible to grab 
> the repo.
>
> apt update
> Hit:1 http://archive.ubuntu.com/ubuntu noble InRelease
> Hit:2 http://archive.ubuntu.com/ubuntu noble-updates InRelease
> *Hit:3 https://download.bareos.org/current/xUbuntu_24.04 
> <https://download.bareos.org/current/xUbuntu_24.04>  InRelease*
> Hit:4 http://archive.ubuntu.com/ubuntu noble-backports InRelease
> Hit:5 http://security.ubuntu.com/ubuntu noble-security InRelease
> Reading package lists... Done
> Building dependency tree... Done
> Reading state information... Done
> All packages are up to date.
>
> Installing software is possible and doesn't complain.
>
> root@c4fa85f6f3ba:/# apt install bareos bareos-filedaemon-python3-plugin
> Reading package lists... Done
> Building dependency tree... Done
> Reading state information... Done
> The following additional packages will be installed:
>   bareos-bconsole bareos-client bareos-common bareos-database-common 
> bareos-database-postgresql bareos-database-tools bareos-director 
> bareos-filedaemon
>   bareos-filedaemon-python-plugins-common bareos-storage bareos-tools 
> bsd-mailx cpio dbconfig-common dbconfig-pgsql liblockfile-bin liblockfile1 
> libnsl2 postfix
>   python3-dateutil
> Suggested packages:
>   bareos-traymonitor postfix-cdb postfix-doc postfix-ldap postfix-lmdb 
> postfix-mta-sts-resolver postfix-mysql postfix-pcre postfix-pgsql 
> postfix-sqlite procmail sasl2-bin
>   | dovecot-common ufw
> The following NEW packages will be installed:
>   bareos bareos-bconsole bareos-client bareos-common 
> bareos-database-common bareos-database-postgresql bareos-database-tools 
> bareos-director bareos-filedaemon
>   bareos-filedaemon-python-plugins-common bareos-filedaemon-python3-plugin 
> bareos-storage bareos-tools bsd-mailx cpio dbconfig-common dbconfig-pgsql 
> liblockfile-bin
>   liblockfile1 libnsl2 postfix python3-dateutil
> 0 upgraded, 22 newly installed, 0 to remove and 0 not upgraded.
> Need to get 5,317 kB of archives.
> After this operation, 18.5 MB of additional disk space will be used.
> Do you want to continue? [Y/n] y
> Get:1 http://archive.ubuntu.com/ubuntu noble/universe amd64 
> dbconfig-common all 2.0.24 [596 kB]
> Get:2 https://download.bareos.org/current/xUbuntu_24.04  bareos-common 
> 23.0.5~pre146.7e91df1c0-130 [1,082 kB]
> Get:3 http://archive.ubuntu.com/ubuntu noble/universe amd64 
> dbconfig-pgsql all 2.0.24 [914 B]
> Get:4 http://archive.ubuntu.com/ubuntu noble/main amd64 cpio amd64 
> 2.15+dfsg-1ubuntu2 [82.7 kB]
> Get:5 http://archive.ubuntu.com/ubuntu noble/main amd64 libnsl2 amd64 
> 1.3.0-3build3 [41.4 kB]
> Get:6 http://archive.ubuntu.com/ubuntu noble/main amd64 postfix amd64 
> 3.8.6-1build2 [1,254 kB]
> Get:7 https://download.bareos.org/current/xUbuntu_24.04  bareos-bconsole 
> 23.0.5~pre146.7e91df1c0-130 [123 kB]
> Get:8 https://download.bareos.org/current/xUbuntu_24.04 
>  bareos-database-postgresql 23.0.5~pre146.7e91df1c0-130 [33.0 kB]
> Get:9 http://archive.ubuntu.com/ubuntu noble/main amd64 liblockfile-bin 
> amd64 1.17-1build3 [11.2 kB]
> Get:10 http://archive.ubuntu.com/ubuntu noble/main amd64 liblockfile1 
> amd64 1.17-1build3 [6,840 B]
> Get:11 http://archive.ubuntu.com/ubuntu noble/main amd64 bsd-mailx amd64 
> 8.1.2-0.20220412cvs-1build1 [67.2 kB]
> Get:12 https://download.bareos.org/current/xUbuntu_24.04 
>  bareos-database-common 23.0.5~pre146.7e91df1c0-130 [114 kB]
> Get:13 http://archive.ubuntu.com/ubuntu noble/main amd64 python3-dateutil 
> all 2.8.2-3ubuntu1 [79.4 kB]
> Get:14 https://download.bareos.org/current/xUbuntu_24.04 
>  bareos-database-tools 23.0.5~pre146.7e91df1c0-130 [246 kB]
> Get:15 https://download.bareos.org/current/xUbuntu_24.04  bareos-director 
> 23.0.5~pre146.7e91df1c0-130 [545 kB]
> Get:16 https://download.bareos.org/current/xUbuntu_24.04 
>  bareos-filedaemon 23.0.5~pre146.7e91df1c0-130 [237 kB]
> Get:17 https://download.bareos.org/current/xUbuntu_24.04 
>  bareos-filedaemon-python-plugins-common 23.0.5~pre146.7e91df1c0-130 [31.2 
> kB]
> Get:18 https://download.bareos.org/current/xUbuntu_24.04 
>  bareos-filedaemon-python3-plugin 23.0.5~pre146.7e91df1c0-130 [55.7 kB]
> Get:19 https://download.bareos.org/current/xUbuntu_24.04  bareos-storage 
> 23.0.5~pre146.7e91df1c0-130 [198 kB]
> Get:20 https://download.bareos.org/current/xUbuntu_24.04  bareos-tools 
> 23.0.5~pre146.7e91df1c0-130 [466 kB]
> Get:21 https://download.bareos.org/current/xUbuntu_24.04  bareos-client 
> 23.0.5~pre146.7e91df1c0-130 [23.1 kB]
> Get:22 https://download.bareos.org/current/xUbuntu_24.04  bareos 
> 23.0.5~pre146.7e91df1c0-130 [23.3 kB]
> Fetched 5,317 kB in 1s (8,549 kB/s)
> debconf: delaying package configuration, since apt-utils is not installed
>
> I can only advise to maybe download and use again the 
> add_bareos_repositories.sh script you can grab from
>
> https://download.bareos.org/current/xUbuntu_24.04/add_bareos_repositories.sh
>
> Hope this help you.
> On Monday 28 October 2024 at 21:02:50 UTC+1 John Lockard wrote:
>
>> The adding of the keyring is not the failure.  That adds just fine.  Try 
>> doing an 'apt update'
>>
>> * Server certificate:
>> *  subject: CN=download.bareos.org
>> *  start date: Sep  3 21:23:43 2024 GMT
>> *  expire date: Dec  2 21:23:42 2024 GMT
>> *  subjectAltName: host "download.bareos.org" matched cert's "
>> download.bareos.org"
>> *  issuer: C=US; O=Let's Encrypt; CN=R10
>> *  SSL certificate verify ok.
>> *   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), 
>> signed using sha256WithRSAEncryption
>> *   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), 
>> signed using sha256WithRSAEncryption
>> *   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), 
>> signed using sha256WithRSAEncryption
>> * using HTTP/1.x
>> } [5 bytes data]
>> > GET /current/xUbuntu_24.04/bareos-keyring.gpg HTTP/1.1
>> > Host: download.bareos.org
>> > User-Agent: curl/8.5.0
>> > Accept: */*
>> >
>> { [5 bytes data]
>> < HTTP/1.1 200 OK
>> < Date: Mon, 28 Oct 2024 17:22:11 GMT
>>
>> < Server: Apache
>> < Last-Modified: Fri, 11 Oct 2024 14:52:09 GMT
>> < ETag: "497-62434a1af8ece"
>> < Accept-Ranges: bytes
>> < Content-Length: 1175
>> < Strict-Transport-Security: max-age=31536000; preload
>> < Content-Security-Policy: child-src 'self' *.bareos.com *.bareos.org *.
>> youtube.com
>> < X-Content-Type-Options: nosniff
>> <
>> { [1175 bytes data]
>> 100  1175  100  1175    0     0   2540      0 --:--:-- --:--:-- --:--:-- 
>>  2543
>>
>> * Connection #0 to host download.bareos.org left intact
>> root@xx-xxxxx:/tmp# *apt update*
>> Hit:1 http://ubuntu22-mirror.dsc.umich.edu/miserver  InRelease
>> Hit:2 http://us.archive.ubuntu.com/ubuntu noble InRelease
>> Get:3 http://us.archive.ubuntu.com/ubuntu noble-updates InRelease [126 
>> kB]
>> Get:4 http://security.ubuntu.com/ubuntu noble-security InRelease [126 kB]
>> Get:5 http://us.archive.ubuntu.com/ubuntu noble-backports InRelease [126 
>> kB]
>> Hit:6 https://repo.zabbix.com/zabbix/6.4/ubuntu noble InRelease
>> Get:7 http://us.archive.ubuntu.com/ubuntu noble-updates/main amd64 
>> Packages [599 kB]
>> Get:8 http://us.archive.ubuntu.com/ubuntu noble-updates/main amd64 
>> Components [114 kB]
>> Get:9 http://us.archive.ubuntu.com/ubuntu noble-updates/restricted amd64 
>> Components [212 B]
>> Get:10 http://us.archive.ubuntu.com/ubuntu noble-updates/universe amd64 
>> Packages [709 kB]
>> Get:11 http://us.archive.ubuntu.com/ubuntu noble-updates/universe amd64 
>> Components [305 kB]
>> Get:12 http://us.archive.ubuntu.com/ubuntu noble-updates/multiverse 
>> amd64 Components [940 B]
>> Get:13 http://us.archive.ubuntu.com/ubuntu noble-backports/main amd64 
>> Components [208 B]
>> Get:14 http://us.archive.ubuntu.com/ubuntu noble-backports/restricted 
>> amd64 Components [212 B]
>> Get:15 http://us.archive.ubuntu.com/ubuntu noble-backports/universe 
>> amd64 Components [21.1 kB]
>> Get:16 http://us.archive.ubuntu.com/ubuntu noble-backports/multiverse 
>> amd64 Components [212 B]
>> Ign:17 https://pkg.duosecurity.com/Ubuntu jammy InRelease
>> Get:18 https://download.bareos.org/current/xUbuntu_24.04  InRelease 
>> [1,896 B]
>> Get:19 http://security.ubuntu.com/ubuntu noble-security/main amd64 
>> Components [7,196 B]
>> Err:18 https://download.bareos.org/current/xUbuntu_24.04  InRelease
>>
>>   The following signatures couldn't be verified because the public key is 
>> not available: NO_PUBKEY 42DA24A6DFEF9127
>>
>> Get:20 http://security.ubuntu.com/ubuntu noble-security/restricted amd64 
>> Components [212 B]
>> Get:21 http://security.ubuntu.com/ubuntu noble-security/universe amd64 
>> Packages [556 kB]
>> Hit:22 https://pkg.duosecurity.com/Ubuntu jammy Release
>> Get:24 http://security.ubuntu.com/ubuntu noble-security/universe amd64 
>> Components [51.9 kB]
>> Get:25 http://security.ubuntu.com/ubuntu noble-security/universe amd64 
>> c-n-f Metadata [13.5 kB]
>> Get:26 http://security.ubuntu.com/ubuntu noble-security/multiverse amd64 
>> Components [212 B]
>> Reading package lists... Done
>> W: GPG error: https://download.bareos.org/current/xUbuntu_24.04 
>>  InRelease: The following signatures couldn't be verified because the 
>> public key is not available: NO_PUBKEY 42DA24A6DFEF9127
>> E: The repository 'https://download.bareos.org/current/xUbuntu_24.04 
>>  InRelease' is not signed.
>> N: Updating from such a repository can't be done securely, and is 
>> therefore disabled by default.
>> N: See apt-secure(8) manpage for repository creation and user 
>> configuration details.
>>
>> On Monday, October 28, 2024 at 6:51:09 AM UTC-4 Bruno Friedmann 
>> (bruno-at-bareos) wrote:
>>
>>> Seems you are alone in that case, work well here (maybe you can retry)
>>>
>>>  curl -Lv -o /var/tmp/bareos-experimental.gpg 
>>> https://download.bareos.org/current/xUbuntu_24.04/bareos-keyring.gpg
>>>   % Total    % Received % Xferd  Average Speed   Time    Time     Time 
>>>  Current
>>>                                  Dload  Upload   Total   Spent    Left 
>>>  Speed
>>>   0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:-- 
>>>     0* Host download.bareos.org:443 was resolved.
>>> * IPv6: 2a03:4000:15:27f::1
>>> * IPv4: 185.170.114.121
>>> *   Trying [2a03:4000:15:27f::1]:443...
>>> * Connected to download.bareos.org (2a03:4000:15:27f::1) port 443
>>> * ALPN: curl offers h2,http/1.1
>>> } [5 bytes data]
>>> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
>>> } [512 bytes data]
>>> *  CAfile: /etc/ssl/certs/ca-certificates.crt
>>> *  CApath: /etc/ssl/certs
>>> { [5 bytes data]
>>> * TLSv1.3 (IN), TLS handshake, Server hello (2):
>>> { [93 bytes data]
>>> * TLSv1.2 (IN), TLS handshake, Certificate (11):
>>> { [2575 bytes data]
>>> * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
>>> { [333 bytes data]
>>> * TLSv1.2 (IN), TLS handshake, Server finished (14):
>>> { [4 bytes data]
>>> * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
>>> } [70 bytes data]
>>> * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
>>> } [1 bytes data]
>>> * TLSv1.2 (OUT), TLS handshake, Finished (20):
>>> } [16 bytes data]
>>> * TLSv1.2 (IN), TLS handshake, Finished (20):
>>> { [16 bytes data]
>>> * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / 
>>> prime256v1 / rsaEncryption
>>> * ALPN: server did not agree on a protocol. Uses default.
>>> * Server certificate:
>>> *  subject: CN=download.bareos.org
>>> *  start date: Sep  3 21:23:43 2024 GMT
>>> *  expire date: Dec  2 21:23:42 2024 GMT
>>> *  subjectAltName: host "download.bareos.org" matched cert's "
>>> download.bareos.org"
>>> *  issuer: C=US; O=Let's Encrypt; CN=R10
>>> *  SSL certificate verify ok.
>>> *   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), 
>>> signed using sha256WithRSAEncryption
>>> *   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), 
>>> signed using sha256WithRSAEncryption
>>> *   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), 
>>> signed using sha256WithRSAEncryption
>>> * using HTTP/1.x
>>> } [5 bytes data]
>>> > GET /current/xUbuntu_24.04/bareos-keyring.gpg HTTP/1.1
>>> > Host: download.bareos.org
>>> > User-Agent: curl/8.5.0
>>> > Accept: */*
>>> >
>>> { [5 bytes data]
>>> < HTTP/1.1 200 OK
>>> < Date: Mon, 28 Oct 2024 10:48:58 GMT
>>> < Server: Apache
>>> < Last-Modified: Fri, 11 Oct 2024 14:52:09 GMT
>>> < ETag: "497-62434a1af8ece"
>>> < Accept-Ranges: bytes
>>> < Content-Length: 1175
>>> < Strict-Transport-Security: max-age=31536000; preload
>>> < Content-Security-Policy: child-src 'self' *.bareos.com *.bareos.org *.
>>> youtube.com
>>> < X-Content-Type-Options: nosniff
>>> <
>>> { [1175 bytes data]
>>> 100  1175  100  1175    0     0  13473      0 --:--:-- --:--:-- --:--:-- 
>>> 13505
>>> * Connection #0 to host download.bareos.org left intact
>>>
>>> gpg  /var/tmp/bareos-experimental.gpg
>>> gpg: WARNING: no command supplied.  Trying to guess what you mean ...
>>> pub   rsa4096 2019-10-28 [SC]
>>>       82834CF002D89BA55C1ED0AA42DA24A6DFEF9127
>>> uid           Bareos experimental Signing Key <xxxx>
>>>
>>>
>>> On Saturday 26 October 2024 at 00:09:02 UTC+2 John Lockard wrote:
>>>
>>>> I've tried using the add_bareos_repositories script, as well as adding 
>>>> the .gpg keys, yet when doing 'apt update' I still get:
>>>>
>>>> Get:9 https://download.bareos.org/current/xUbuntu_24.04 InRelease 
>>>> [1,896 B]
>>>> Err:9 https://download.bareos.org/current/xUbuntu_24.04 InRelease
>>>>   The following signatures couldn't be verified because the public key 
>>>> is not available: NO_PUBKEY 42DA24A6DFEF9127
>>>> Reading package lists... Done
>>>> W: GPG error: https://download.bareos.org/current/xUbuntu_24.04 
>>>> InRelease: The following signatures couldn't be verified because the 
>>>> public 
>>>> key is not available: NO_PUBKEY 42DA24A6DFEF9127
>>>> E: The repository 'https://download.bareos.org/current/xUbuntu_24.04 
>>>>  InRelease' is not signed.
>>>> N: Updating from such a repository can't be done securely, and is 
>>>> therefore disabled by default.
>>>>
>>>> I've also tried doing it by hand:
>>>>
>>>> wget -O /etc/apt/keyrings/bareos-experimental.gpg 
>>>> https://download.bareos.org/current/xUbuntu_24.04/bareos-keyring.gpg
>>>>
>>>> Same results.
>>>>
>>>> Bad keys on the Bareos site???
>>>>
>>>> Thanks,
>>>> -John
>>>>
>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"bareos-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/bareos-users/1c8fd6ec-4349-42bd-8093-38a9c4bf7526n%40googlegroups.com.

Reply via email to