Hello,

On Mon, Jul 26, 2021 at 02:49:22PM +0200, Eduard Bloch wrote:
> Hallo,
> * Václav Ovsík [Mon, Jul 19 2021, 03:05:39PM]:
> > Package: apt-cacher-ng
> > Version: 3.3.1-2~bpo10+1
> > Severity: normal
> 
> That's an ancient version in backports. Sorry for not having updated
> this for a long time.

I am very sorry, but the problem is not in acng :-(.
Please, excuse me.
I have done upgrade of the host debian.i.cz with acng to Bullseye with
Apt-Cacher-NG/3.6.4, but the problem remains.
I have done some further investigations and the problem is in the Checkpoint
firewall of our organization :-/.


> …
> >  zito@ser1:~/admin$ curl --head 
> > http://debian.i.cz:9999/debian/dists/bullseye/non-free/i18n/by-hash/SHA256/1719a3a7f5c969d9780aec600763314a8b55aaaed3016a76fa9a7a020c1e584c
> >  HTTP/1.1 200 OK
> >  Content-Length: 50436
> >  Last-Modified: Tue, 15 Jun 2021 01:57:32 GMT
> 
> This looks very wrong and indicates a file truncation in the cache. I
> suggest to go to the admin webpage and run a cleanup operation
> (Expiration task, with "check sizes and checksums" and "consider
> incomplete files as damaged" checkboxes checked).

No truncated, but exchanged with other file (and yes, maybe truncated)!
The problem is with HTTP pipelining.

 bobekpc:~# file 
/var/lib/apt/lists/partial/ftp.debian.cz_debian_dists_sid_main_i18n_Translation-en.bz2.FAILED
 
/var/lib/apt/lists/partial/ftp.debian.cz_debian_dists_sid_main_i18n_Translation-en.bz2.FAILED:
 gzip compressed data, max compression, from Unix, original size modulo 2^32 
4212331769
 bobekpc:~# zcat 
/var/lib/apt/lists/partial/ftp.debian.cz_debian_dists_sid_main_i18n_Translation-en.bz2.FAILED|head
 bin/afio                                                utils/afio
 bin/bash                                                shells/bash
 bin/bash-static                                         shells/bash-static
 bin/brltty                                              admin/brltty
 bin/bsd-csh                                             shells/csh
 bin/btrfs                                               admin/btrfs-progs
 bin/btrfs-convert                                       admin/btrfs-progs
 bin/btrfs-find-root                                     admin/btrfs-progs
 bin/btrfs-image                                         admin/btrfs-progs
 bin/btrfs-map-logical                                   admin/btrfs-progs

This is Contents file, not Translations… (gzip/bzip2…)

Workarounds:
    * move to https transport (Checkpoint FW can't inspect it)
    * apt -o Acquire::http::Pipeline-Depth=0  update


I hope this report can help someone else with Checkpoint FW in his Internet
connection path with HTTP inspection turned on…

Excuse me, sorry for the effort you had with this report :-(
Regards
-- 
Zito

Reply via email to