Re: security mirror out of date: 128.101.240.212

2007-05-15 Thread Tomas Nykung
On Mon, May 14, 2007 at 11:19:32PM +0200, Martin Zobel-Helas wrote:
 
 no. Bad karma.

I like this explanation the most :)
This would explain a lot...

Funny thing is that today when i run host security.debian.org i get
alternating results exactly as it should be, so today it looks like
rerunning apt-get update a few times would have worked, even if it
didn't yesterday or the day before that.
Oh well, bad karma it was ;)


Most likely my ISP's DNS cached the IP and gave me the same IP for
security.debian.org every time i did rerun apt-get update. Maybe
someone hit it with a cluebat in the meantime, because it works as
it should now.

Thanks to everyone that answered, both here and privately.


Tomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-15 Thread Philip Hands
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Philip Hands wrote:
 Tomas Nykung wrote:
 On Mon, May 14, 2007 at 10:04:46AM +0200, martin f krafft wrote:
 FYI:

  weinholt one of the security.debian.org mirrors is out of date.
 128.101.240.212 has a /debian-security/dists/etch/updates/Release
 file dated 10 May 2007
 
 Right, it seems that /org on saens was full.
 
 I've removed saens from the debian-security.debian.org DNS round-robin, and
  removed a few directories in the security to free up enough space to be
 able to sync the main debian archive.
 
 That allowed a load of old stuff to be deleted, resulting in about 2.5 GB
 of free space on /org, so I've now synced the security mirror and we still
 have ~560MB spare, so I'll put saens back in the DNS for the moment.

sadly, that's not enough to deal with the overhead involved in deleting at
the end of rsync runs, so it filled again -- looks like seans will have to
be dropped from the security.d.o for now.

Cheers, Phil.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGShXhYgOKS92bmRARAk4bAKCcv7ddS8B8c5C7G2BLtlFcOZOwUgCfX8za
0kr+kQ44Bqacgkv8LB54zTM=
=cNaR
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-14 Thread Tomas Nykung
On Mon, May 14, 2007 at 10:04:46AM +0200, martin f krafft wrote:
 FYI:
 
  weinholt one of the security.debian.org mirrors is out of date.
 128.101.240.212 has a /debian-security/dists/etch/updates/Release
 file dated 10 May 2007


Is this related to the problems I'm having over here with upgrading
the kernel to the latest 2.6.18.dfsg.1-12etch2 version?
It did work on one computer, but two other doesn't get the update.

On the one where it worked apt-cache policy says:
apt-cache policy linux-image-2.6.18-4-486
linux-image-2.6.18-4-486:
  Installed: 2.6.18.dfsg.1-12etch2
  Candidate: 2.6.18.dfsg.1-12etch2
  Version table:
 *** 2.6.18.dfsg.1-12etch2 0
500 http://security.debian.org etch/updates/main Packages
100 /var/lib/dpkg/status
 2.6.18.dfsg.1-12 0
500 http://ftp.fi.debian.org etch/main Packages

On the two others the Candidate is still 2.6.18.dfsg.1-12etch1 no
matter what I do (aptitude update, apt-get update, dselect update...)
so I had to wget the kernel (k7 version) from
ftp://ftp.debian.org/debian-security/pool/updates/main/l/linux-2.6/
and install it by hand with dpkg -i.

Those computers are all on the same network, sharing the same
connection to the internet.

Anyone else seeing this problem?


Tomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-14 Thread Dominic Hargreaves
[CC to debian-admin and security@ removed]

On Mon, May 14, 2007 at 04:17:16PM +0300, Tomas Nykung wrote:

   weinholt one of the security.debian.org mirrors is out of date.
  128.101.240.212 has a /debian-security/dists/etch/updates/Release
  file dated 10 May 2007
 
 
 Is this related to the problems I'm having over here with upgrading
 the kernel to the latest 2.6.18.dfsg.1-12etch2 version?
 It did work on one computer, but two other doesn't get the update.
 
 On the one where it worked apt-cache policy says:
 apt-cache policy linux-image-2.6.18-4-486
 linux-image-2.6.18-4-486:
   Installed: 2.6.18.dfsg.1-12etch2
   Candidate: 2.6.18.dfsg.1-12etch2
   Version table:
  *** 2.6.18.dfsg.1-12etch2 0
 500 http://security.debian.org etch/updates/main Packages
 100 /var/lib/dpkg/status
  2.6.18.dfsg.1-12 0
 500 http://ftp.fi.debian.org etch/main Packages
 
 On the two others the Candidate is still 2.6.18.dfsg.1-12etch1 no
 matter what I do (aptitude update, apt-get update, dselect update...)
 so I had to wget the kernel (k7 version) from
 ftp://ftp.debian.org/debian-security/pool/updates/main/l/linux-2.6/
 and install it by hand with dpkg -i.
 
 Those computers are all on the same network, sharing the same
 connection to the internet.
 
 Anyone else seeing this problem?

Yes, this is precisely the problem.

FWIW, another workaround is to rerun the apt-get update until you do get
the correct file back; as the mirror is selected randomly from a DNS
round-robin, you should find the updated Packages file gets to you after
a few tries.

You may find a similar error - 404 when downloading the package, for the
same reason. In that case, simply retry the apt-get upgrade until it
works.

Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-14 Thread Philip Hands
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Tomas Nykung wrote:
 On Mon, May 14, 2007 at 10:04:46AM +0200, martin f krafft wrote:
 FYI:

  weinholt one of the security.debian.org mirrors is out of date.
 128.101.240.212 has a /debian-security/dists/etch/updates/Release
 file dated 10 May 2007

Right, it seems that /org on saens was full.

I've removed saens from the debian-security.debian.org DNS round-robin, and
 removed a few directories in the security to free up enough space to be
able to sync the main debian archive.

That allowed a load of old stuff to be deleted, resulting in about 2.5 GB
of free space on /org, so I've now synced the security mirror and we still
have ~560MB spare, so I'll put saens back in the DNS for the moment.

Clearly this needs attention in the near future though.

Cheers, Phil.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGSLU+YgOKS92bmRARAoE7AJ92Q27ScDEt9fqukQ8kKgwtZh8hyQCeP7u8
/dk33/WOVwdcJoq4zqeMg8k=
=8Uwl
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-14 Thread Tomas Nykung
On Mon, May 14, 2007 at 08:15:11PM +0100, Philip Hands wrote:
 
 Right, it seems that /org on saens was full.
 
 I've removed saens from the debian-security.debian.org DNS round-robin, and
  removed a few directories in the security to free up enough space to be
 able to sync the main debian archive.
 
 That allowed a load of old stuff to be deleted, resulting in about 2.5 GB
 of free space on /org, so I've now synced the security mirror and we still
 have ~560MB spare, so I'll put saens back in the DNS for the moment.


Thanks, this fixed the problem.


PS
What I don't understand is why I always got the bad mirror, regardless
how many times I tried to rerun aptitude/apt-get update both yesterday
and today (and on two computers while the first one I upgraded did get
the upgrade without any problem).

The only way I could get the upgraded kernel version was to wget it
and install i by hand.

Not that I will lose any sleep because of this ;) but if someone have
time to shed some light on this I would be grateful.
DS


Tomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-14 Thread Jim Popovitch
On Tue, 2007-05-15 at 00:14 +0300, Tomas Nykung wrote:
 What I don't understand is why I always got the bad mirror, regardless
 how many times I tried to rerun aptitude/apt-get update both yesterday
 and today (and on two computers while the first one I upgraded did get
 the upgrade without any problem).
 
 The only way I could get the upgraded kernel version was to wget it
 and install i by hand.
 
 Not that I will lose any sleep because of this ;) but if someone have
 time to shed some light on this I would be grateful.

it's pre-defined in /etc/hosts?

local (or upstream) cache is stale?

random luck?

-Jim P.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-14 Thread Martin Zobel-Helas
Hi, 

On Mon May 14, 2007 at 17:17:13 -0400, Jim Popovitch wrote:
 On Tue, 2007-05-15 at 00:14 +0300, Tomas Nykung wrote:
  What I don't understand is why I always got the bad mirror, regardless
  how many times I tried to rerun aptitude/apt-get update both yesterday
  and today (and on two computers while the first one I upgraded did get
  the upgrade without any problem).
  
  The only way I could get the upgraded kernel version was to wget it
  and install i by hand.
  
  Not that I will lose any sleep because of this ;) but if someone have
  time to shed some light on this I would be grateful.
 
 it's pre-defined in /etc/hosts?
 
 local (or upstream) cache is stale?
 
 random luck?

no. Bad karma.

-- 
[EMAIL PROTECTED] /root]# man real-life
No manual entry for real-life


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: security mirror out of date: 128.101.240.212

2007-05-14 Thread Michael Loftis



--On May 15, 2007 12:14:28 AM +0300 Tomas Nykung [EMAIL PROTECTED] wrote:



PS
What I don't understand is why I always got the bad mirror, regardless
how many times I tried to rerun aptitude/apt-get update both yesterday
and today (and on two computers while the first one I upgraded did get
the upgrade without any problem).

The only way I could get the upgraded kernel version was to wget it
and install i by hand.

Not that I will lose any sleep because of this ;) but if someone have
time to shed some light on this I would be grateful.
DS


Random luck, or, probably as, or more likely, bad caching resolver that 
doesn't round-robin it's cached replies.


--
Michael Loftis
Modwest Operations Manager
Powerful, Affordable Web Hosting


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]