Hello, On Mon, Jul 26, 2021 at 02:49:22PM +0200, Eduard Bloch wrote: > Hallo, > * Václav Ovsík [Mon, Jul 19 2021, 03:05:39PM]: > > Package: apt-cacher-ng > > Version: 3.3.1-2~bpo10+1 > > Severity: normal > > That's an ancient version in backports. Sorry for not having updated > this for a long time.
I am very sorry, but the problem is not in acng :-(. Please, excuse me. I have done upgrade of the host debian.i.cz with acng to Bullseye with Apt-Cacher-NG/3.6.4, but the problem remains. I have done some further investigations and the problem is in the Checkpoint firewall of our organization :-/. > … > > zito@ser1:~/admin$ curl --head > > http://debian.i.cz:9999/debian/dists/bullseye/non-free/i18n/by-hash/SHA256/1719a3a7f5c969d9780aec600763314a8b55aaaed3016a76fa9a7a020c1e584c > > HTTP/1.1 200 OK > > Content-Length: 50436 > > Last-Modified: Tue, 15 Jun 2021 01:57:32 GMT > > This looks very wrong and indicates a file truncation in the cache. I > suggest to go to the admin webpage and run a cleanup operation > (Expiration task, with "check sizes and checksums" and "consider > incomplete files as damaged" checkboxes checked). No truncated, but exchanged with other file (and yes, maybe truncated)! The problem is with HTTP pipelining. bobekpc:~# file /var/lib/apt/lists/partial/ftp.debian.cz_debian_dists_sid_main_i18n_Translation-en.bz2.FAILED /var/lib/apt/lists/partial/ftp.debian.cz_debian_dists_sid_main_i18n_Translation-en.bz2.FAILED: gzip compressed data, max compression, from Unix, original size modulo 2^32 4212331769 bobekpc:~# zcat /var/lib/apt/lists/partial/ftp.debian.cz_debian_dists_sid_main_i18n_Translation-en.bz2.FAILED|head bin/afio utils/afio bin/bash shells/bash bin/bash-static shells/bash-static bin/brltty admin/brltty bin/bsd-csh shells/csh bin/btrfs admin/btrfs-progs bin/btrfs-convert admin/btrfs-progs bin/btrfs-find-root admin/btrfs-progs bin/btrfs-image admin/btrfs-progs bin/btrfs-map-logical admin/btrfs-progs This is Contents file, not Translations… (gzip/bzip2…) Workarounds: * move to https transport (Checkpoint FW can't inspect it) * apt -o Acquire::http::Pipeline-Depth=0 update I hope this report can help someone else with Checkpoint FW in his Internet connection path with HTTP inspection turned on… Excuse me, sorry for the effort you had with this report :-( Regards -- Zito