Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gordon Messmer

On 8/30/19 8:31 AM, Alexander Dalloz wrote:
Based on that it appears to me very clear that the trust with the 
DigiCert chain wasn't given due to a missing trust from the ca-cert bundle



That seems reasonable to me.  :)


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gordon Messmer

On 8/30/19 8:17 AM, Gary Stainburn wrote:

However, when I re-installed ca-certificates it immediately fixed the problem 
on both boxes, which implies an internal problem.



That is only true if yum selected the same server, and there is no 
evidence that it did.  It's possible that reinstalling the package fixed 
the problem, and it's also possible that it did not.


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gary Stainburn
On Friday 30 August 2019 16:27:01 Alexander Dalloz wrote:
> In posting 
> https://lists.centos.org/pipermail/centos/2019-August/173288.html you 
> could see that he has a repo "webtatic" configured, at that time calling 
> a different mirror.
> 
> Alexander

As far as I know I've never had webtatic as a repo. AFAIK it's a mirror used by 
remi (?).

However in the email you refer to it definitely appears in the repo list in the 
output from "yum update".

I don't understand that.
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Alexander Dalloz

Am 2019-08-30 17:04, schrieb Gordon Messmer:

On 8/30/19 5:52 AM, Gary Stainburn wrote:
Incidentally, the*good*  server that I was referencing my broken 
server against has decided to start giving the curl certificate errors 
in the same way that the broken one did. Very strange.  I ran



It's possible that the error is unrelated to the ca-certificates
file.  You'll only see it if yum selects a mirror that uses a Let's
Encrypt or Amazon-signed certificate (at least, those were the CAs for
the hosts I saw you report errors for).  If yum happens to select
mirrors that don't, then everything will work normally.  Reinstalling
the package on the original system may have been coincidental.


Testing yum's activity in debug mode had shown:

https://lists.centos.org/pipermail/centos/2019-August/173297.html

2019-08-29 17:23:17,345 opening local file 
"/var/cache/yum/x86_64/7/epel/metalink.xml.tmp" with mode wb

* About to connect() to mirrors.fedoraproject.org port 443 (#29)
*   Trying 8.43.85.67...
* Connected to mirrors.fedoraproject.org (8.43.85.67) port 443 (#29)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
*   CAfile: /etc/pki/tls/certs/ca-bundle.crt
  CApath: none
* Server certificate:
* 	subject: CN=*.fedoraproject.org,O=Red Hat Inc.,L=Raleigh,ST=North 
Carolina,C=US

*   start date: Feb 01 00:00:00 2017 GMT
*   expire date: May 01 12:00:00 2020 GMT
*   common name: *.fedoraproject.org
* 	issuer: CN=DigiCert SHA2 High Assurance Server 
CA,OU=www.digicert.com,O=DigiCert Inc,C=US

* NSS error -8179 (SEC_ERROR_UNKNOWN_ISSUER)
* Peer's Certificate issuer is not recognized.
* Closing connection 29
2019-08-29 17:23:18,117 exception: [Errno 14] curl#60 - "Peer's 
Certificate issuer is not recognized."
2019-08-29 17:23:18,117 retrycode (14) not in list [-1, 2, 4, 5, 6, 7], 
re-raising


Based on that it appears to me very clear that the trust with the 
DigiCert chain wasn't given due to a missing trust from the ca-cert 
bundle. Unfortunately we haven't seen a status of the ca-certificates 
RPM content before fixing it with a reinstall.


Alexander


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Alexander Dalloz

Am 2019-08-30 17:17, schrieb Gordon Messmer:

On 8/29/19 8:20 AM, Alexander Dalloz wrote:

yum uses libcurl behind the scenes and thus NSS and not OpenSSL.



Good to know.

In that case: Gary, what do you see when you run:

    /usr/lib64/nss/unsupported-tools/vfyserv -p 443 
us-east.repo.webtatic.com



Do you get something indicative when running:
URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=webtatic 
check-update



webtatic is the mirror, not a repo.  That won't do anything useful, 
will it?


In posting 
https://lists.centos.org/pipermail/centos/2019-August/173288.html you 
could see that he has a repo "webtatic" configured, at that time calling 
a different mirror.


Alexander

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gary Stainburn
On Friday 30 August 2019 16:04:51 Gordon Messmer wrote:
> On 8/30/19 5:52 AM, Gary Stainburn wrote:
> > Incidentally, the*good*  server that I was referencing my broken server 
> > against has decided to start giving the curl certificate errors in the same 
> > way that the broken one did. Very strange.  I ran
> 
> 
> It's possible that the error is unrelated to the ca-certificates file.  
> You'll only see it if yum selects a mirror that uses a Let's Encrypt or 
> Amazon-signed certificate (at least, those were the CAs for the hosts I 
> saw you report errors for).  If yum happens to select mirrors that 
> don't, then everything will work normally.  Reinstalling the package on 
> the original system may have been coincidental.

Hi Gordon,

That would make a great deal of sense, and fits in with the external influence 
which would explain why it's suddenly appearing on both servers.

However, when I re-installed ca-certificates it immediately fixed the problem 
on both boxes, which implies an internal problem.

Gary
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gordon Messmer

On 8/29/19 8:20 AM, Alexander Dalloz wrote:

yum uses libcurl behind the scenes and thus NSS and not OpenSSL.



Good to know.

In that case: Gary, what do you see when you run:

    /usr/lib64/nss/unsupported-tools/vfyserv -p 443 
us-east.repo.webtatic.com



Do you get something indicative when running:
URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=webtatic 
check-update 



webtatic is the mirror, not a repo.  That won't do anything useful, will it?

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gordon Messmer

On 8/30/19 5:52 AM, Gary Stainburn wrote:

Incidentally, the*good*  server that I was referencing my broken server against 
has decided to start giving the curl certificate errors in the same way that 
the broken one did. Very strange.  I ran



It's possible that the error is unrelated to the ca-certificates file.  
You'll only see it if yum selects a mirror that uses a Let's Encrypt or 
Amazon-signed certificate (at least, those were the CAs for the hosts I 
saw you report errors for).  If yum happens to select mirrors that 
don't, then everything will work normally.  Reinstalling the package on 
the original system may have been coincidental.



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gary Stainburn
On Friday 30 August 2019 12:45:04 Paddy Doyle wrote:
> 
> Just to mention that the 'etckeeper' package from EPEL is great for
> tracking changes to /etc. Package installs trigger a commit, as do a daily
> cron job.
> 
> If in this case it was a corrupt file in /etc/pki, then a 'git log' or
> similar could show when it happened. Although I think you tried 'rpm -V'
> already so perhaps it wasn't a corrupt cert file.
> 
> Paddy
> 

Hi Paddy,

Thanks for this.  I'll have a look.  

Incidentally, the *good* server that I was referencing my broken server against 
has decided to start giving the curl certificate errors in the same way that 
the broken one did. Very strange.  I ran 

yum --disablerepo=\* --enablerepo=base --enablerepo=updates reinstall 
ca-certificates

on this server and again it fixed the problem. This would suggest that the 
problem is actually external to the original broken server.
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Paddy Doyle
On Fri, Aug 30, 2019 at 12:17:47PM +0100, Gary Stainburn wrote:

> On Friday 30 August 2019 12:03:26 Alexander Dalloz wrote:
> >
> > Besides a corrupted certificates bundle I cannot imagine a different 
> > root cause actually.

Just to mention that the 'etckeeper' package from EPEL is great for
tracking changes to /etc. Package installs trigger a commit, as do a daily
cron job.

If in this case it was a corrupt file in /etc/pki, then a 'git log' or
similar could show when it happened. Although I think you tried 'rpm -V'
already so perhaps it wasn't a corrupt cert file.

Paddy

-- 
Paddy Doyle
Research IT / Trinity Centre for High Performance Computing,
Lloyd Building, Trinity College Dublin, Dublin 2, Ireland.
Phone: +353-1-896-3725
https://www.tchpc.tcd.ie/
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gary Stainburn
On Friday 30 August 2019 12:03:26 Alexander Dalloz wrote:
> You are welcome Gary. And I am curious about what the cause of your repo 
> troubles is.

I have looked back over what I have done, and cannot see what has caused the 
problem to occurr. I do not see anywhere where it could have been from any 
action that I have taken, including deleting the contents of the yum cache.

> That's good. Now please verify that the ca-certificates RPM is healthy:
> 
> rpm -V ca-certificates
> 
> In addition you can grep for the DigiCert certificates which are used by 
> the fedoraproject.org mirror servers for EPEL (concentrating on a single 
> broken HTTPS repo for now):
> 
> # grep "DigiCert" /etc/pki/tls/certs/ca-bundle.crt
> # DigiCert Assured ID Root CA
> # DigiCert Assured ID Root G2
> # DigiCert Assured ID Root G3
> # DigiCert Global Root CA
> # DigiCert Global Root G2
> # DigiCert Global Root G3
> # DigiCert High Assurance EV Root CA  <<- that one must be there
> # DigiCert Trusted Root G4
> 
> Besides a corrupted certificates bundle I cannot imagine a different 
> root cause actually.

I have done both of these steps and got the same results as you. This may be 
because I have already re-installed ca-certificates as Tony's suggestion.

The main thing is that the server now has a working yum once again, but it 
wouls have been nice to find out the original cause.

Once again, thanks to everyone for you assistance.  I found it very educational.
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gary Stainburn
On Friday 30 August 2019 11:51:35 Tony Mountifield wrote:
> And you could try re-installing ca-certificates on the offending box.
> 
> # yum --disablerepo=\* --enablerepo=base --enablerepo=updates reinstall 
> ca-certificates
> 
> Cheers
> Tony

I have just done this and it appears to have fixed the problem.  I have now 
successfully done a yum update including updates from the epel repo.

Thanks to everyone for your assistance.

Gary
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Alexander Dalloz

Am 2019-08-30 10:52, schrieb Gary Stainburn:

On Thursday 29 August 2019 18:10:19 Alexander Dalloz wrote:

> 2019-08-29 17:23:18,117 exception: [Errno 14] curl#60 - "Peer's
> Certificate issuer is not recognized."
> 2019-08-29 17:23:18,117 retrycode (14) not in list [-1, 2, 4, 5, 6,
> 7], re-raising

[ ... ]

> Cannot retrieve metalink for repository: epel/x86_64. Please verify
> its path and try again

So can we check what version of the ca-certificates packages is being
installed on your system?

And a check into a different direction: what's the date and time of 
that
system? Does it fit or is it wrong? Time being not accurate can make 
SSL

connections fail.


Firstly, thank you for you help with this Alexander.


You are welcome Gary. And I am curious about what the cause of your repo 
troubles is.



I had already checked the system time. It was about 3 minutes out, but
I fixed it anyway.  I have checked the RPM for the certificates, and
it matches the one on another box that works.


[root@stan2 ~]# date
Fri 30 Aug 09:45:27 BST 2019
[root@stan2 ~]# rpm -qa|grep cert
ca-certificates-2018.2.22-70.0.el7_5.noarch
[root@stan2 ~]#


That's good. Now please verify that the ca-certificates RPM is healthy:

rpm -V ca-certificates

In addition you can grep for the DigiCert certificates which are used by 
the fedoraproject.org mirror servers for EPEL (concentrating on a single 
broken HTTPS repo for now):


# grep "DigiCert" /etc/pki/tls/certs/ca-bundle.crt
# DigiCert Assured ID Root CA
# DigiCert Assured ID Root G2
# DigiCert Assured ID Root G3
# DigiCert Global Root CA
# DigiCert Global Root G2
# DigiCert Global Root G3
# DigiCert High Assurance EV Root CA  <<- that one must be there
# DigiCert Trusted Root G4

Besides a corrupted certificates bundle I cannot imagine a different 
root cause actually.


Of course you could search system-wide for broken RPM content:

# for RPM in $(rpm -qa); do rpm -V ${RPM} >/dev/null; if [ "$?" -eq 1 ]; 
then echo "- ${RPM} -"; rpm -V ${RPM}; fi; done


Regards,
Alexander

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Tony Mountifield
In article <201908300952.37126.gary.stainb...@ringways.co.uk>,
Gary Stainburn  wrote:
> On Thursday 29 August 2019 18:10:19 Alexander Dalloz wrote:
> > > 2019-08-29 17:23:18,117 exception: [Errno 14] curl#60 - "Peer's
> > > Certificate issuer is not recognized."
> > > 2019-08-29 17:23:18,117 retrycode (14) not in list [-1, 2, 4, 5, 6,
> > > 7], re-raising
> > 
> > [ ... ]
> > 
> > > Cannot retrieve metalink for repository: epel/x86_64. Please verify
> > > its path and try again
> > 
> > So can we check what version of the ca-certificates packages is being 
> > installed on your system?
> > 
> > And a check into a different direction: what's the date and time of that 
> > system? Does it fit or is it wrong? Time being not accurate can make SSL 
> > connections fail.
> 
> Firstly, thank you for you help with this Alexander.
> 
> I had already checked the system time. It was about 3 minutes out, but I 
> fixed it anyway.  I have checked the RPM for
> the certificates, and it matches the one on another box that works.
> 
> 
> [root@stan2 ~]# date
> Fri 30 Aug 09:45:27 BST 2019
> [root@stan2 ~]# rpm -qa|grep cert
> ca-certificates-2018.2.22-70.0.el7_5.noarch
> [root@stan2 ~]# 

Can you verify the ca-certificates package on both your systems and compare?
Here is what my C7 box shows (same version package as yours):

[root@hp3 ~]# rpm -Vv ca-certificates
./etc/pki/ca-trust
./etc/pki/ca-trust/README
.  c /etc/pki/ca-trust/ca-legacy.conf
./etc/pki/ca-trust/extracted
./etc/pki/ca-trust/extracted/README
./etc/pki/ca-trust/extracted/java
./etc/pki/ca-trust/extracted/java/README
.M...  g /etc/pki/ca-trust/extracted/java/cacerts
./etc/pki/ca-trust/extracted/openssl
./etc/pki/ca-trust/extracted/openssl/README
.M...  g /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
./etc/pki/ca-trust/extracted/pem
./etc/pki/ca-trust/extracted/pem/README
.M...  g /etc/pki/ca-trust/extracted/pem/email-ca-bundle.pem
.M...  g /etc/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem
.M...  g /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
./etc/pki/ca-trust/source
./etc/pki/ca-trust/source/README
./etc/pki/ca-trust/source/anchors
./etc/pki/ca-trust/source/blacklist
.  g /etc/pki/ca-trust/source/ca-bundle.legacy.crt
./etc/pki/java
./etc/pki/java/cacerts
./etc/pki/tls
./etc/pki/tls/cert.pem
./etc/pki/tls/certs
./etc/pki/tls/certs/ca-bundle.crt
./etc/pki/tls/certs/ca-bundle.trust.crt
./etc/ssl
./etc/ssl/certs
./usr/bin/ca-legacy
./usr/bin/update-ca-trust
.  d /usr/share/doc/ca-certificates-2018.2.22/README
.  d /usr/share/man/man8/ca-legacy.8.gz
.  d /usr/share/man/man8/update-ca-trust.8.gz
./usr/share/pki
./usr/share/pki/ca-trust-legacy
./usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt
./usr/share/pki/ca-trust-legacy/ca-bundle.legacy.disable.crt
./usr/share/pki/ca-trust-source
./usr/share/pki/ca-trust-source/README
./usr/share/pki/ca-trust-source/anchors
./usr/share/pki/ca-trust-source/blacklist
./usr/share/pki/ca-trust-source/ca-bundle.trust.p11-kit
[root@hp3 ~]#

And you could try re-installing ca-certificates on the offending box.

# yum --disablerepo=\* --enablerepo=base --enablerepo=updates reinstall 
ca-certificates

Cheers
Tony
-- 
Tony Mountifield
Work: t...@softins.co.uk - http://www.softins.co.uk
Play: t...@mountifield.org - http://tony.mountifield.org
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Peter

On 30/08/19 9:02 PM, Gary Stainburn wrote:

[root@stan2 ~]# yum update

  2. Reconfigure the baseurl/etc. for the repository, to point to a working
 upstream. This is most often useful if you are using a newer
 distribution release than is supported by the repository (and the
 packages for the previous distribution release still work).

Cannot retrieve metalink for repository: epel/x86_64. Please verify its path 
and try again


At this point I would follow the above advice, basically comment out the 
metalink= lines in your epel.repo file and uncomment the baseurl lines, 
then try the update again.


Later on you should try changing them back, but it appears as if for now 
at least you're having issues downloading the metalink file.



Peter
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gary Stainburn
On Friday 30 August 2019 04:54:14 Peter wrote:
> 
> I would try this:
> 
> yum clean all

ran okay.

> yum --disablerepo=epel update

ran okay but said there was nothing to update which I find hard to believe. It 
has been a month or so at least since the last successful update. It did 
complain about the REMI repos, which is odd as this all started when my yum 
update only updated PHP and Google Chrome, with PHP coming from REMI.

> yum --disablerepo=epel --enablerepo=extras reinstall epel-release

ran okay and successfully reinstalled epel-release.noarch 0:7-11

> yum update

Still failed in the same way as before. Full output below.

[root@stan2 ~]# yum clean all
Loaded plugins: fastestmirror, langpacks
Cleaning repos: base epel extras remi-php72 remi-safe updates
Cleaning up list of fastest mirrors
Other repos take up 57 k of disk space (use --verbose for details)
[root@stan2 ~]# yum --disablerepo=epel update
Loaded plugins: fastestmirror, langpacks
Determining fastest mirrors
 * base: mirror.sov.uk.goscomb.net
 * extras: mirror.clustered.net
 * remi-php72: mirror.23media.com
 * remi-safe: mirror.23media.com
 * updates: mirrors.vooservers.com
base
   | 3.6 kB  00:00:00 
extras  
   | 3.4 kB  00:00:00 
https://mirror.23media.com/remi/enterprise/7/php72/x86_64/repodata/repomd.xml: 
[Errno 14] curl#60 - "Peer's Certificate issuer is not recognized."
Trying other mirror.
It was impossible to connect to the CentOS servers.
This could mean a connectivity issue in your environment, such as the 
requirement to configure a proxy,
or a transparent proxy that tampers with TLS security, or an incorrect system 
clock.
You can try to solve this issue by using the instructions on 
https://wiki.centos.org/yum-errors
If above article doesn't help to resolve this issue please use 
https://bugs.centos.org/.

https://mirror.oxilion.nl/remi/enterprise/7/php72/x86_64/repodata/repomd.xml: 
[Errno 14] curl#60 - "Peer's certificate issuer has been marked as not trusted 
by the user."
Trying other mirror.
https://mirrors.ukfast.co.uk/sites/remi/enterprise/7/php72/x86_64/repodata/repomd.xml:
 [Errno 14] curl#60 - "Peer's Certificate issuer is not recognized."
Trying other mirror.
remi-php72  
   | 3.0 kB  00:00:00 
remi-safe   
   | 3.0 kB  00:00:00 
updates 
   | 3.4 kB  00:00:00 
(1/6): base/7/x86_64/group_gz   
   | 166 kB  00:00:00 
(2/6): extras/7/x86_64/primary_db   
   | 215 kB  00:00:00 
(3/6): remi-php72/primary_db
   | 225 kB  00:00:00 
(4/6): remi-safe/primary_db 
   | 1.6 MB  00:00:02 
(5/6): updates/7/x86_64/primary_db  
   | 7.4 MB  00:00:02 
(6/6): base/7/x86_64/primary_db 
   | 6.0 MB  00:00:03 
No packages marked for update   
  
[root@stan2 ~]# yum --disablerepo=epel --enablerepo=extras reinstall 
epel-release
 
Loaded plugins: fastestmirror, langpacks
  
Loading mirror speeds from cached hostfile  
  
 * base: mirror.sov.uk.goscomb.net  
  
 * extras: mirror.clustered.net 
  
 * remi-php72: mirror.23media.com   
 

Re: [CentOS] I broke "yum update" - C7

2019-08-30 Thread Gary Stainburn
On Thursday 29 August 2019 18:10:19 Alexander Dalloz wrote:
> > 2019-08-29 17:23:18,117 exception: [Errno 14] curl#60 - "Peer's
> > Certificate issuer is not recognized."
> > 2019-08-29 17:23:18,117 retrycode (14) not in list [-1, 2, 4, 5, 6,
> > 7], re-raising
> 
> [ ... ]
> 
> > Cannot retrieve metalink for repository: epel/x86_64. Please verify
> > its path and try again
> 
> So can we check what version of the ca-certificates packages is being 
> installed on your system?
> 
> And a check into a different direction: what's the date and time of that 
> system? Does it fit or is it wrong? Time being not accurate can make SSL 
> connections fail.

Firstly, thank you for you help with this Alexander.

I had already checked the system time. It was about 3 minutes out, but I fixed 
it anyway.  I have checked the RPM for the certificates, and it matches the one 
on another box that works.


[root@stan2 ~]# date
Fri 30 Aug 09:45:27 BST 2019
[root@stan2 ~]# rpm -qa|grep cert
ca-certificates-2018.2.22-70.0.el7_5.noarch
[root@stan2 ~]# 
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Peter

On 29/08/19 9:58 PM, Gary Stainburn wrote:

  One of the configured repositories failed (Unknown),
  and yum doesn't have enough cached data to continue. At this point the only
  safe thing yum can do is fail. There are a few ways to work "fix" this:

Cannot retrieve metalink for repository: epel/x86_64. Please verify its path 
and try again


I would try this:

yum clean all
yum --disablerepo=epel update
yum --disablerepo=epel --enablerepo=extras reinstall epel-release
yum update

If that doesn't work show the complete output from the above commands 
and we'll go from there.



Peter
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Alexander Dalloz

Am 2019-08-29 18:26, schrieb Gary Stainburn:

On Thursday 29 August 2019 16:47:11 Alexander Dalloz wrote:

rpm -Vv nss


[root@stan2 ~]# rpm -Vv nss
./etc/pki/nss-legacy
.  c /etc/pki/nss-legacy/nss-rhel7.config
./etc/pki/nssdb
.  c /etc/pki/nssdb/cert8.db
.  c /etc/pki/nssdb/cert9.db
.  c /etc/pki/nssdb/key3.db
.  c /etc/pki/nssdb/key4.db
.  c /etc/pki/nssdb/pkcs11.txt
.  c /etc/pki/nssdb/secmod.db
./usr/lib64/libnss3.so
.  g /usr/lib64/libnssckbi.so
./usr/lib64/libsmime3.so
./usr/lib64/libssl3.so
./usr/lib64/nss/libnssckbi.so
.  d /usr/share/man/man5/cert8.db.5.gz
.  d /usr/share/man/man5/cert9.db.5.gz
.  d /usr/share/man/man5/key3.db.5.gz
.  d /usr/share/man/man5/key4.db.5.gz
.  d /usr/share/man/man5/pkcs11.txt.5.gz
.  d /usr/share/man/man5/secmod.db.5.gz


Ok, that package content looks healthy. No problem there.

[root@stan2 ~]# URLGRABBER_DEBUG=1 yum --disablerepo=\* 
--enablerepo=epel update

[snip]
Loading mirror speeds from cached hostfile
2019-08-29 17:23:17,344 combined options: {
  'text' : 'epel/x86_64/metalink',


[ ... ]


2019-08-29 17:23:17,344 attempt 1/10:
https://mirrors.fedoraproject.org/metalink?repo=epel-7&arch=x86_64
2019-08-29 17:23:17,345 opening local file
"/var/cache/yum/x86_64/7/epel/metalink.xml.tmp" with mode wb
* About to connect() to mirrors.fedoraproject.org port 443 (#29)
*   Trying 8.43.85.67...
* Connected to mirrors.fedoraproject.org (8.43.85.67) port 443 (#29)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
*   CAfile: /etc/pki/tls/certs/ca-bundle.crt
  CApath: none
* Server certificate:
*   subject: CN=*.fedoraproject.org,O=Red Hat Inc.,L=Raleigh,ST=North
Carolina,C=US
*   start date: Feb 01 00:00:00 2017 GMT
*   expire date: May 01 12:00:00 2020 GMT
*   common name: *.fedoraproject.org
*   issuer: CN=DigiCert SHA2 High Assurance Server
CA,OU=www.digicert.com,O=DigiCert Inc,C=US
* NSS error -8179 (SEC_ERROR_UNKNOWN_ISSUER)
* Peer's Certificate issuer is not recognized.


So here we are.

While the current ca-certificates package of CentOS 7 
ca-certificates-2018.2.22-70.0.el7_5.noarch does not hold the 
intermediate certificate "DigiCert SHA2 High Assurance Server" I don't 
get that issue.


# grep "DigiCert" /etc/pki/tls/certs/ca-bundle.crt
# DigiCert Assured ID Root CA
# DigiCert Assured ID Root G2
# DigiCert Assured ID Root G3
# DigiCert Global Root CA
# DigiCert Global Root G2
# DigiCert Global Root G3
# DigiCert High Assurance EV Root CA
# DigiCert Trusted Root G4


* Closing connection 29
2019-08-29 17:23:18,117 exception: [Errno 14] curl#60 - "Peer's
Certificate issuer is not recognized."
2019-08-29 17:23:18,117 retrycode (14) not in list [-1, 2, 4, 5, 6,
7], re-raising


[ ... ]


Cannot retrieve metalink for repository: epel/x86_64. Please verify
its path and try again


So can we check what version of the ca-certificates packages is being 
installed on your system?


And a check into a different direction: what's the date and time of that 
system? Does it fit or is it wrong? Time being not accurate can make SSL 
connections fail.


Alexander

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Gary Stainburn
On Thursday 29 August 2019 16:47:11 Alexander Dalloz wrote:
> rpm -Vv nss

[root@stan2 ~]# rpm -Vv nss
./etc/pki/nss-legacy
.  c /etc/pki/nss-legacy/nss-rhel7.config
./etc/pki/nssdb
.  c /etc/pki/nssdb/cert8.db
.  c /etc/pki/nssdb/cert9.db
.  c /etc/pki/nssdb/key3.db
.  c /etc/pki/nssdb/key4.db
.  c /etc/pki/nssdb/pkcs11.txt
.  c /etc/pki/nssdb/secmod.db
./usr/lib64/libnss3.so
.  g /usr/lib64/libnssckbi.so
./usr/lib64/libsmime3.so
./usr/lib64/libssl3.so
./usr/lib64/nss/libnssckbi.so
.  d /usr/share/man/man5/cert8.db.5.gz
.  d /usr/share/man/man5/cert9.db.5.gz
.  d /usr/share/man/man5/key3.db.5.gz
.  d /usr/share/man/man5/key4.db.5.gz
.  d /usr/share/man/man5/pkcs11.txt.5.gz
.  d /usr/share/man/man5/secmod.db.5.gz
[root@stan2 ~]# URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=epel update
[snip]
Loading mirror speeds from cached hostfile
2019-08-29 17:23:17,344 combined options: {
  'text' : 'epel/x86_64/metalink',
  'delegate' : {
'async': None,
'bandwidth': 0,
'cache_openers': True,
'checkfunc': None,
'close_connection': 0,
'copy_local'   : 0,
'curl_obj' : None,
'data' : None,
'default_speed': 100.0,
'delegate' : None,
'failfunc' : ,
'failure_callback': None,
'ftp_disable_epsv': False,
'ftp_headers'  : None,
'half_life': 2592000,
'http_headers' : (),
'interrupt_callback': None,
'ip_resolve'   : None,
'keepalive': True,
'libproxy' : False,
'max_connections': 5,
'max_header_size': 2097152,
'minrate'  : 0,
'mirror_group' : None,
'multi_progress_obj': None,
'no_cache' : False,
'opener'   : None,
'password' : None,
'prefix'   : None,
'progress_obj' : None,
'proxies'  : None,
'proxy': None,
'quote': None,
'range': None,
'reget': None,
'retry': 10,
'retry_no_cache': False,
'retrycodes'   : [-1, 2, 4, 5, 6, 7],
'size' : None,
'ssl_ca_cert'  : None,
'ssl_cert' : None,
'ssl_cert_type': 'PEM',
'ssl_context'  : None,
'ssl_key'  : None,
'ssl_key_pass' : None,
'ssl_key_type' : 'PEM',
'ssl_verify_host': True,
'ssl_verify_peer': True,
'text' : None,
'throttle' : 0,
'timedhosts'   : None,
'timeout'  : 30.0,
'urlparser': ,
'user_agent'   : 'urlgrabber/3.10 yum/3.4.3',
'username' : None,
}
  }
2019-08-29 17:23:17,344 attempt 1/10: 
https://mirrors.fedoraproject.org/metalink?repo=epel-7&arch=x86_64
2019-08-29 17:23:17,345 opening local file 
"/var/cache/yum/x86_64/7/epel/metalink.xml.tmp" with mode wb
* About to connect() to mirrors.fedoraproject.org port 443 (#29)
*   Trying 8.43.85.67...
* Connected to mirrors.fedoraproject.org (8.43.85.67) port 443 (#29)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
*   CAfile: /etc/pki/tls/certs/ca-bundle.crt
  CApath: none
* Server certificate:
*   subject: CN=*.fedoraproject.org,O=Red Hat Inc.,L=Raleigh,ST=North 
Carolina,C=US
*   start date: Feb 01 00:00:00 2017 GMT
*   expire date: May 01 12:00:00 2020 GMT
*   common name: *.fedoraproject.org
*   issuer: CN=DigiCert SHA2 High Assurance Server 
CA,OU=www.digicert.com,O=DigiCert Inc,C=US
* NSS error -8179 (SEC_ERROR_UNKNOWN_ISSUER)
* Peer's Certificate issuer is not recognized.
* Closing connection 29
2019-08-29 17:23:18,117 exception: [Errno 14] curl#60 - "Peer's Certificate 
issuer is not recognized."
2019-08-29 17:23:18,117 retrycode (14) not in list [-1, 2, 4, 5, 6, 7], 
re-raising


 One of the configured repositories failed (Unknown),
 and yum doesn't have enough cached data to continue. At this point the only
 safe thing yum can do is fail. There are a few ways to work "fix" this:

 1. Contact the upstream for the repository and get them to fix the problem.

 2. Reconfigure the baseurl/etc. for the repository, to point to a working
upstream. This is most often useful if you are using a newer
distribution release than is supported by the repository (and the
packages for the previous distribution release still work).

 3. Run the command with the repository temporarily disabled
yum --disablerepo= ...

 4. Disable the repository permanently, so yum won't use it by default. Yum
will then just ignore the repository until you permanently enable it
again or use --enablerepo for temporary usage:

yum-config-manager --disable 
or
subscription-manager repos --disable=

 5. Configure the failing repository to be skipped, if it is unavailable.
Note that yum will try to contact the repo. when it runs most commands,
so will have

Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Alexander Dalloz

Am 2019-08-29 17:36, schrieb Gary Stainburn:

On Thursday 29 August 2019 16:20:00 Alexander Dalloz wrote:

Hi,

yum uses libcurl behind the scenes and thus NSS and not OpenSSL.

Do you get something indicative when running:

URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=webtatic
check-update

Alexander


I get a lot of output for what looks like access to the local respos.d
files all ending with success. I have included below the first and
last of these immediately followed by the line saying that webtastic
is not found

[root@stan2 ~]# URLGRABBER_DEBUG=1 yum --disablerepo=\*
--enablerepo=webtatic check update


[ ... ]


Error getting repository data for webtatic, repository not found



Hm, I thought one of the repositories failing due to failing SSL is the 
webtatic one.


From your posting today 12:03 CEST:

 * webtatic: uk.repo.webtatic.com

Anyhow, a test agaist "epel" would work too as it is configured to use a 
https target as well.


URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=epel update

Please check this too: rpm -Vv nss

Alexander
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Gary Stainburn
On Thursday 29 August 2019 16:20:00 Alexander Dalloz wrote:
> Hi,
> 
> yum uses libcurl behind the scenes and thus NSS and not OpenSSL.
> 
> Do you get something indicative when running:
> 
> URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=webtatic 
> check-update
> 
> Alexander

I get a lot of output for what looks like access to the local respos.d files 
all ending with success. I have included below the first and last of these 
immediately followed by the line saying that webtastic is not found

[root@stan2 ~]# URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=webtatic 
check update
2019-08-29 16:27:08,367 urlgrabber version  = 3.10
2019-08-29 16:27:08,367 trans function "_"  = 
2019-08-29 16:27:08,391 combined options: {
  'delegate' : {
'async': None,
'bandwidth': 0,
'cache_openers': True,
'checkfunc': None,
'close_connection': 0,
'copy_local'   : 0,
'curl_obj' : None,
'data' : None,
'default_speed': 100.0,
'delegate' : None,
'failfunc' : ,
'failure_callback': None,
'ftp_disable_epsv': False,
'ftp_headers'  : None,
'half_life': 2592000,
'http_headers' : None,
'interrupt_callback': None,
'ip_resolve'   : None,
'keepalive': 1,
'libproxy' : False,
'max_connections': 5,
'max_header_size': 2097152,
'minrate'  : None,
'mirror_group' : None,
'multi_progress_obj': None,
'no_cache' : False,
'opener'   : None,
'password' : None,
'prefix'   : None,
'progress_obj' : None,
'proxies'  : None,
'proxy': None,
'quote': None,
'range': None,
'reget': None,
'retry': None,
'retry_no_cache': False,
'retrycodes'   : [-1, 2, 4, 5, 6, 7],
'size' : None,
'ssl_ca_cert'  : None,
'ssl_cert' : None,
'ssl_cert_type': 'PEM',
'ssl_context'  : None,
'ssl_key'  : None,
'ssl_key_pass' : None,
'ssl_key_type' : 'PEM',
'ssl_verify_host': True,
'ssl_verify_peer': True,
'text' : None,
'throttle' : 1.0,
'timedhosts'   : None,
'timeout'  : 300,
'urlparser': ,
'user_agent'   : 'urlgrabber/3.10 yum/3.4.3',
'username' : None,
}
  }
2019-08-29 16:27:08,392 attempt 1/None: file:///etc/yum.conf
* Closing connection 0
2019-08-29 16:27:08,392 success

[big snip]

2019-08-29 16:27:08,460 combined options: {
  'delegate' : {
'async': None,
'bandwidth': 0,
'cache_openers': True,
'checkfunc': None,
'close_connection': 0,
'copy_local'   : 0,
'curl_obj' : None,
'data' : None,
'default_speed': 100.0,
'delegate' : None,
'failfunc' : ,
'failure_callback': None,
'ftp_disable_epsv': False,
'ftp_headers'  : None,
'half_life': 2592000,
'http_headers' : None,
'interrupt_callback': None,
'ip_resolve'   : None,
'keepalive': 1,
'libproxy' : False,
'max_connections': 5,
'max_header_size': 2097152,
'minrate'  : None,
'mirror_group' : None,
'multi_progress_obj': None,
'no_cache' : False,
'opener'   : None,
'password' : None,
'prefix'   : None,
'progress_obj' : None,
'proxies'  : None,
'proxy': None,
'quote': None,
'range': None,
'reget': None,
'retry': None,
'retry_no_cache': False,
'retrycodes'   : [-1, 2, 4, 5, 6, 7],
'size' : None,
'ssl_ca_cert'  : None,
'ssl_cert' : None,
'ssl_cert_type': 'PEM',
'ssl_context'  : None,
'ssl_key'  : None,
'ssl_key_pass' : None,
'ssl_key_type' : 'PEM',
'ssl_verify_host': True,
'ssl_verify_peer': True,
'text' : None,
'throttle' : 1.0,
'timedhosts'   : '/var/cache/yum/x86_64/7/timedhosts',
'timeout'  : 300,
'urlparser': ,
'user_agent'   : 'urlgrabber/3.10 yum/3.4.3',
'username' : None,
}
  }
2019-08-29 16:27:08,460 attempt 1/None: file:///etc/yum.repos.d/remi.repo
* Closing connection 28
2019-08-29 16:27:08,460 success


Error getting repository data for webtatic, repository not found
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Alexander Dalloz

Am 2019-08-29 16:51, schrieb Gary Stainburn:

On Thursday 29 August 2019 15:45:44 Gordon Messmer wrote:

On 8/29/19 3:03 AM, Gary Stainburn wrote:
> https://us-east.repo.webtatic.com/yum/el7/x86_64/repodata/repomd.xml: [Errno 14] 
curl#60 - "Peer's Certificate issuer is not recognized."


What do you see when you run:

     openssl s_client -showcerts -connect 
us-east.repo.webtatic.com:443


That seems to work fine on the faulty server.

[root@stan2 ~]# openssl s_client -showcerts -connect
us-east.repo.webtatic.com:443
CONNECTED(0003)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return:1
depth=0 CN = webtatic.com
verify return:1


[ ... ]


Verify return code: 0 (ok)




Hi,

yum uses libcurl behind the scenes and thus NSS and not OpenSSL.

Do you get something indicative when running:

URLGRABBER_DEBUG=1 yum --disablerepo=\* --enablerepo=webtatic 
check-update


Alexander
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Gary Stainburn
On Thursday 29 August 2019 15:45:44 Gordon Messmer wrote:
> On 8/29/19 3:03 AM, Gary Stainburn wrote:
> > https://us-east.repo.webtatic.com/yum/el7/x86_64/repodata/repomd.xml: 
> > [Errno 14] curl#60 - "Peer's Certificate issuer is not recognized."
> 
> 
> What do you see when you run:
> 
>      openssl s_client -showcerts -connect us-east.repo.webtatic.com:443

That seems to work fine on the faulty server.

[root@stan2 ~]# openssl s_client -showcerts -connect 
us-east.repo.webtatic.com:443
CONNECTED(0003)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return:1
depth=0 CN = webtatic.com
verify return:1
---
Certificate chain
 0 s:/CN=webtatic.com
   i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
-BEGIN CERTIFICATE-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 
SIb3DQEBCwUAA4IBAQBy/d3y+sAM9iEE6pZkcbCONdbWeh8/g6o4VsFJ8c0K7MxR
 
WAtiMgLK96SwhGHYrclvu9SMdi9B7umQtvxFRJq+jaFCANpddKcWegOlRwXhrMDs
 
tOQhcMDnSZLJGjsFzwsYaluZlM1UI+xqnPR+fBoaLt3RaBQLowrsXpL4FMs+cJ0o
/8ECkkIdZ2yJKzbt/XRc5Xj8cVo0lJXrZhqRJ3v0dJFLD4Sv+JQ9P91wlx8277Tk
umcaa8fUOArtsaSxcnRkieJYainVv0b0YuZUZ1z0e94NPFAdY29hINBYfQQl6+wr
zcQZke1Uc4S3edwPjZHX4M3KvEKFokRhlyaqSoTw
-END CERTIFICATE-
 1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
   i:/O=Digital Signature Trust Co./CN=DST Root CA X3
-BEGIN CERTIFICATE-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-END CERTIFICATE-
---
Server certificate
subject

Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Gordon Messmer

On 8/29/19 3:03 AM, Gary Stainburn wrote:

https://us-east.repo.webtatic.com/yum/el7/x86_64/repodata/repomd.xml: [Errno 14] curl#60 
- "Peer's Certificate issuer is not recognized."



What do you see when you run:

    openssl s_client -showcerts -connect us-east.repo.webtatic.com:443


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Gary Stainburn
Interestingly, if I try a yum update on one of my other boxes I get similar 
errors. However, it then proceeds to complete the yum update successfully

[root@ollie2 ~]# yum update
Loaded plugins: fastestmirror, langpacks
Determining fastest mirrors
Could not get metalink 
https://mirrors.fedoraproject.org/metalink?repo=epel-7&arch=x86_64 error was
14: curl#60 - "Peer's Certificate issuer is not recognized."
Could not retrieve mirrorlist 
https://mirror.webtatic.com/yum/el7/x86_64/mirrorlist error was
14: curl#60 - "Peer's Certificate issuer is not recognized."
 * base: mirror.as29550.net
 * epel: ftp-stud.hs-esslingen.de
 * extras: mozart.ee.ic.ac.uk
 * updates: mirror.vorboss.net
 * webtatic: uk.repo.webtatic.com
base
  | 3.6 kB  00:00:00 
http://download.owncloud.org/download/repositories/10.0/CentOS_7/repodata/repomd.xml:
 [Errno 14] HTTPS Error 302 - Found
Trying other mirror.
extras  
  | 3.4 kB  00:00:00 
google-chrome   
  | 1.3 kB  00:00:00 
https://rpm.nodesource.com/pub_6.x/el/7/x86_64/repodata/repomd.xml: [Errno 14] 
curl#60 - "Peer's Certificate issuer is not recognized."
Trying other mirror.
It was impossible to connect to the CentOS servers.
This could mean a connectivity issue in your environment, such as the 
requirement to configure a proxy,
or a transparent proxy that tampers with TLS security, or an incorrect system 
clock.
You can try to solve this issue by using the instructions on 
https://wiki.centos.org/yum-errors
If above article doesn't help to resolve this issue please use 
https://bugs.centos.org/.

https://download.postgresql.org/pub/repos/yum/9.6/redhat/rhel-7-x86_64/repodata/repomd.xml:
 [Errno 14] curl#60 - "Peer's Certificate issuer is not recognized."
Trying other mirror.
updates 
  | 3.4 kB  00:00:00 
https://uk.repo.webtatic.com/yum/el7/x86_64/repodata/repomd.xml: [Errno 14] 
curl#60 - "Peer's Certificate issuer is not recognized."
Trying other mirror.
https://us-east.repo.webtatic.com/yum/el7/x86_64/repodata/repomd.xml: [Errno 
14] curl#60 - "Peer's Certificate issuer is not recognized."
Trying other mirror.
(1/3): google-chrome/primary
  | 1.7 kB  00:00:00 
(2/3): extras/7/x86_64/primary_db   
  | 215 kB  00:00:00 
(3/3): updates/7/x86_64/primary_db  
  | 7.4 MB  00:00:05 
google-chrome   
 3/3
Resolving Dependencies
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-29 Thread Gary Stainburn
On Wednesday 28 August 2019 22:41:24 Jonathan Billings wrote:
> If it’s really out of date, you might need to update the ca-certificates 
> package, but that’d have to be a really old system.
> 
> I’d suggest by checking to make sure the clock on your computer isn’t really 
> out of date.  If its right, I’d double-check with ‘curl’ to see if you aren’t 
> getting a MitM response, where your HTTPS calls are being intercepted and 
> resigned by a CA that isn’t in your CA trust.  If that’s the case, you need 
> be very suspicious of your network.

It isn't that out of date. The server is less than a year old, and the last yum 
update was probably only done about 2 months ago.

I checked the system time and it was only a few minutes out. A quick rdate to 
my local time server sorted that.

I ran a yum check which took ages but didn't report any problems. 

[root@stan2 ~]# yum check
Loaded plugins: fastestmirror, langpacks
check all
[root@stan2 ~]#

However, running yum update afterwards came up with the same problem.

[root@stan2 ~]# yum update
Loaded plugins: fastestmirror, langpacks
Determining fastest mirrors


 One of the configured repositories failed (Unknown),
 and yum doesn't have enough cached data to continue. At this point the only
 safe thing yum can do is fail. There are a few ways to work "fix" this:

 1. Contact the upstream for the repository and get them to fix the problem.

 2. Reconfigure the baseurl/etc. for the repository, to point to a working
upstream. This is most often useful if you are using a newer
distribution release than is supported by the repository (and the
packages for the previous distribution release still work).

 3. Run the command with the repository temporarily disabled
yum --disablerepo= ...

 4. Disable the repository permanently, so yum won't use it by default. Yum
will then just ignore the repository until you permanently enable it
again or use --enablerepo for temporary usage:

yum-config-manager --disable 
or
subscription-manager repos --disable=

 5. Configure the failing repository to be skipped, if it is unavailable.
Note that yum will try to contact the repo. when it runs most commands,
so will have to try and fail each time (and thus. yum will be be much
slower). If it is a very temporary problem though, this is often a nice
compromise:

yum-config-manager --save --setopt=.skip_if_unavailable=true

Cannot retrieve metalink for repository: epel/x86_64. Please verify its path 
and try again
[root@stan2 ~]# cat /etc/yum.repos.d/epel.repo 
[epel]
name=Extra Packages for Enterprise Linux 7 - $basearch
#baseurl=http://download.fedoraproject.org/pub/epel/7/$basearch
metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-7&arch=$basearch
failovermethod=priority
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-7

[epel-debuginfo]
name=Extra Packages for Enterprise Linux 7 - $basearch - Debug
#baseurl=http://download.fedoraproject.org/pub/epel/7/$basearch/debug
metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-debug-7&arch=$basearch
failovermethod=priority
enabled=0
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-7
gpgcheck=1

[epel-source]
name=Extra Packages for Enterprise Linux 7 - $basearch - Source
#baseurl=http://download.fedoraproject.org/pub/epel/7/SRPMS
metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-source-7&arch=$basearch
failovermethod=priority
enabled=0
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-7
gpgcheck=1
[root@stan2 ~]# 
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] I broke "yum update" - C7

2019-08-28 Thread Jonathan Billings
On Aug 28, 2019, at 4:36 PM, Gary Stainburn  
wrote:
> Anyone got any suggestions?


If it’s really out of date, you might need to update the ca-certificates 
package, but that’d have to be a really old system.

I’d suggest by checking to make sure the clock on your computer isn’t really 
out of date.  If its right, I’d double-check with ‘curl’ to see if you aren’t 
getting a MitM response, where your HTTPS calls are being intercepted and 
resigned by a CA that isn’t in your CA trust.  If that’s the case, you need be 
very suspicious of your network.

--
Jonathan Billings 


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos