Package: apt Version: 0.8.10.3+squeeze1 Severity: normal
We're using an internal mirror which is updated at a defined interval for consistency. The 'Release' files from security.debian.org set a quite short timeout in their Vaild-Until: header (10 days). If we're trying to update an internal system from this mirror a few days later (apt-get update), it complains about the 'Release' file being expired and ignores it by default. So we've set the apt.conf option "Acquire::Max-ValidTime" to "1209600" (see apt-config output below). While this works on i686 systems, it is ignored on amd64 systems, even though apt-config shows it. We've worked around this bug for now by also setting "Acquire::Check-Valid-Until" to "false" on our amd64 systems (this option is not ignored), but this isn't a real solution. I already tried setting it as APT::Acquire::Max-ValidTime "1209600" - but that version is ignored on both i686 and amd64. -- Package-specific info: -- apt-config dump -- APT ""; APT::Architecture "amd64"; APT::Build-Essential ""; APT::Build-Essential:: "build-essential"; APT::Install-Recommends "1"; APT::Install-Suggests "0"; APT::Acquire ""; APT::Acquire::Translation "environment"; APT::Authentication ""; APT::Authentication::TrustCDROM "true"; APT::NeverAutoRemove ""; APT::NeverAutoRemove:: "^firmware-linux.*"; APT::NeverAutoRemove:: "^linux-firmware$"; APT::NeverAutoRemove:: "^linux-image.*"; APT::NeverAutoRemove:: "^kfreebsd-image.*"; APT::NeverAutoRemove:: "^linux-restricted-modules.*"; APT::NeverAutoRemove:: "^linux-ubuntu-modules-.*"; APT::Never-MarkAuto-Sections ""; APT::Never-MarkAuto-Sections:: "metapackages"; APT::Never-MarkAuto-Sections:: "restricted/metapackages"; APT::Never-MarkAuto-Sections:: "universe/metapackages"; APT::Never-MarkAuto-Sections:: "multiverse/metapackages"; APT::Never-MarkAuto-Sections:: "oldlibs"; APT::Never-MarkAuto-Sections:: "restricted/oldlibs"; APT::Never-MarkAuto-Sections:: "universe/oldlibs"; APT::Never-MarkAuto-Sections:: "multiverse/oldlibs"; Dir "/"; Dir::State "var/lib/apt/"; Dir::State::lists "lists/"; Dir::State::cdroms "cdroms.list"; Dir::State::mirrors "mirrors/"; Dir::State::extended_states "extended_states"; Dir::State::status "/var/lib/dpkg/status"; Dir::Cache "var/cache/apt/"; Dir::Cache::archives "archives/"; Dir::Cache::srcpkgcache "srcpkgcache.bin"; Dir::Cache::pkgcache "pkgcache.bin"; Dir::Etc "etc/apt/"; Dir::Etc::sourcelist "sources.list"; Dir::Etc::sourceparts "sources.list.d"; Dir::Etc::vendorlist "vendors.list"; Dir::Etc::vendorparts "vendors.list.d"; Dir::Etc::main "apt.conf"; Dir::Etc::netrc "auth.conf"; Dir::Etc::parts "apt.conf.d"; Dir::Etc::preferences "preferences"; Dir::Etc::preferencesparts "preferences.d"; Dir::Etc::trusted "trusted.gpg"; Dir::Etc::trustedparts "trusted.gpg.d"; Dir::Bin ""; Dir::Bin::methods "/usr/lib/apt/methods"; Dir::Bin::dpkg "/usr/bin/dpkg"; Dir::Media ""; Dir::Media::MountPath "/media/apt"; Dir::Log "var/log/apt"; Dir::Log::Terminal "term.log"; Dir::Log::History "history.log"; Dir::Ignore-Files-Silently ""; Dir::Ignore-Files-Silently:: "~$"; Dir::Ignore-Files-Silently:: "\.disabled$"; Dir::Ignore-Files-Silently:: "\.bak$"; Dir::Ignore-Files-Silently:: "\.dpkg-[a-z]+$"; DPkg ""; DPkg::Pre-Install-Pkgs ""; DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true"; Acquire ""; Acquire::Check-Valid-Until "false"; Acquire::Max-ValidTime "1209600"; CommandLine ""; CommandLine::AsString "apt-config dump"; -- (no /etc/apt/preferences present) -- -- /etc/apt/sources.list -- deb http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free deb-src http://debian-squeeze.vmsd.de/debian/ squeeze main contrib non-free deb http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main contrib non-free deb-src http://debian-squeeze.vmsd.de/debian-security/ squeeze/updates main contrib non-free # squeeze-updates, previously known as 'volatile' deb http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib non-free deb-src http://debian-squeeze.vmsd.de/debian/ squeeze-updates main contrib non-free -- System Information: Debian Release: 6.0.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages apt depends on: ii debian-archive-keyring 2010.08.28 GnuPG archive keys of the Debian a ii gnupg 1.4.10-4 GNU privacy guard - a free PGP rep ii libc6 2.11.2-10 Embedded GNU C Library: Shared lib ii libgcc1 1:4.4.5-8 GCC support library ii libstdc++6 4.4.5-8 The GNU Standard C++ Library v3 ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime apt recommends no packages. Versions of packages apt suggests: pn apt-doc <none> (no description available) ii aptitude 0.6.3-3.2 terminal-based package manager (te ii bzip2 1.0.5-6 high-quality block-sorting file co ii dpkg-dev 1.15.8.11 Debian package development tools pn lzma <none> (no description available) ii python-apt 0.7.100.1+squeeze1 Python interface to libapt-pkg -- no debconf information Diese elektronische Nachricht ist vertraulich. Die Information ist nur fuer den Adressaten bestimmt. Falls Sie nicht der Adressat sind, informieren Sie bitte sofort den Absender und vernichten Sie diese E-Mail sowie alle Kopien und angeschlossenen Anlagen. Bitte beachten Sie, dass es in diesem Fall verboten und gesetzeswidrig ist, diese Nachricht zu kopieren, weiterzuleiten oder zu benutzen. Es wurden alle moeglichen Massnahmen getroffen um eine Virusfreiheit der beigefuegten Dateien zu gewaehrleisten. Wir uebernehmen jedoch keine Verantwortung fuer Schaeden, die aufgrund von Software-Viren entstehen und empfehlen Ihnen vor Benutzung der Dateien eine Ueberpruefung auf Viren durchzufuehren. This electronic message contains information that is confidential. The information is intended for the use of the addressee only. If you are not the addressee please inform the sender immediately and delete this e-mail, its attachments and any copies. Please note that any disclosure, copy, distribution or use of the contents of this message is prohibited and may be unlawful. We have taken every reasonable precaution to ensure that any kind of attachment to this e-mail has been swept for viruses. However, we cannot accept liability for any damage sustained as a result of software viruses and would advise you to carry out your own virus checks before opening any attachment. -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

