Hi all,

The backend server of packages.debian.org that I access is now returning 503.
It seems to be affecting multiple users.

% curl -vv https://packages.debian.org/unstable/ink-generator
* Host packages.debian.org:443 was resolved.
* IPv6: 2603:400a:ffff:bb8::801f:33, 2a02:16a8:dc41:100::132
* IPv4: 128.31.0.51, 195.192.210.132
*   Trying 128.31.0.51:443...
* Connected to packages.debian.org (128.31.0.51) port 443
* ALPN: curl offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
*  CAfile: /etc/ssl/certs/ca-certificates.crt
*  CApath: /etc/ssl/certs
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
*  subject: CN=packages.debian.org
*  start date: Feb 12 00:47:35 2024 GMT
*  expire date: May 12 00:47:34 2024 GMT
*  subjectAltName: host "packages.debian.org" matched cert's 
"packages.debian.org"
*  issuer: C=US; O=Let's Encrypt; CN=R3
*  SSL certificate verify ok.
*   Certificate level 0: Public key type RSA (4096/152 Bits/secBits), signed 
using sha256WithRSAEncryption
*   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed 
using sha256WithRSAEncryption
*   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed 
using sha256WithRSAEncryption
* using HTTP/2
* [HTTP/2] [1] OPENED stream for 
https://packages.debian.org/unstable/ink-generator
* [HTTP/2] [1] [:method: GET]
* [HTTP/2] [1] [:scheme: https]
* [HTTP/2] [1] [:authority: packages.debian.org]
* [HTTP/2] [1] [:path: /unstable/ink-generator]
* [HTTP/2] [1] [user-agent: curl/8.6.0]
* [HTTP/2] [1] [accept: */*]
> GET /unstable/ink-generator HTTP/2
> Host: packages.debian.org
> User-Agent: curl/8.6.0
> Accept: */*
> 
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
< HTTP/2 503 
< date: Sat, 24 Feb 2024 19:43:30 GMT
< server: Apache
< x-content-type-options: nosniff
< x-frame-options: sameorigin
< referrer-policy: no-referrer
< x-xss-protection: 1
< permissions-policy: interest-cohort=()
< strict-transport-security: max-age=15552000
< content-length: 369
< content-type: text/html; charset=iso-8859-1
< 
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>503 Service Unavailable</title>
</head><body>
<h1>Service Unavailable</h1>
<p>The server is temporarily unable to service your
request due to maintenance downtime or capacity
problems. Please try again later.</p>
<hr>
<address>Apache Server at packages.debian.org Port 443</address>
</body></html>
* Connection #0 to host packages.debian.org left intact


Thanks,
Boyuan

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to