From owner-freebsd-questions@FreeBSD.ORG Wed Mar 18 07:48:51 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 5AC8CC67 for ; Wed, 18 Mar 2015 07:48:51 +0000 (UTC) Received: from smtp.infracaninophile.co.uk (smtp6.infracaninophile.co.uk [IPv6:2001:8b0:151:1:3cd3:cd67:fafa:3d78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "smtp.infracaninophile.co.uk", Issuer "ca.infracaninophile.co.uk" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id BABB2ADC for ; Wed, 18 Mar 2015 07:48:50 +0000 (UTC) Received: from seedling.local ([192.168.100.2]) (authenticated bits=0) by smtp.infracaninophile.co.uk (8.15.1/8.15.1) with ESMTPSA id t2I7mfOc065876 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for ; Wed, 18 Mar 2015 07:48:42 GMT (envelope-from matthew@FreeBSD.org) Authentication-Results: smtp.infracaninophile.co.uk; dmarc=none header.from=FreeBSD.org DKIM-Filter: OpenDKIM Filter v2.9.2 smtp.infracaninophile.co.uk t2I7mfOc065876 Authentication-Results: smtp.infracaninophile.co.uk/t2I7mfOc065876; dkim=none reason="no signature"; dkim-adsp=none; dkim-atps=neutral X-Authentication-Warning: lucid-nonsense.infracaninophile.co.uk: Host [192.168.100.2] claimed to be seedling.local Message-ID: <55092DC9.5030900@FreeBSD.org> Date: Wed, 18 Mar 2015 07:48:25 +0000 From: Matthew Seaman User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.5.0 MIME-Version: 1.0 To: freebsd-questions@freebsd.org Subject: Re: Fetching public key from update.freebsd.org... failed. References: <2113109231.280296.1426639945063.JavaMail.yahoo@mail.yahoo.com> In-Reply-To: <2113109231.280296.1426639945063.JavaMail.yahoo@mail.yahoo.com> Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="OV0bdr3nKCRoHi2kCPcg1cp7R4krt2EuX" X-Virus-Scanned: clamav-milter 0.98.6 at lucid-nonsense.infracaninophile.co.uk X-Virus-Status: Clean X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lucid-nonsense.infracaninophile.co.uk X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Mar 2015 07:48:51 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --OV0bdr3nKCRoHi2kCPcg1cp7R4krt2EuX Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On 18/03/2015 00:52, Laszlo Danielisz via freebsd-questions wrote: > No matter which server I use it keeps giving me the public key error. > I can't understand what is happening, the network is fine.=20 > root@owncloud:/usr/home/beastie # uname -aFreeBSD owncloud > 10.1-STABLE FreeBSD 10.1-STABLE #0 r279796: Mon Mar 9 16:15:17 UTC > 2015 root@releng1.nyi.freebsd.org:/usr/obj/usr/src/sys/GENERIC > amd64 What am I missing?Thanks!Laszlo You can't use freebsd-update with 10-STABLE. It only works with *release* versions. If you want to switch to 10.1-RELEASE you should be able to d something like: # freebsd-update -r 10.1-RELEASE upgrade # freebsd-update install (... and then follow the instructions freebsd-update gives you. You will end up running 'freebsd-update install' three times.) Otherwise, if you stick with 10-STABLE then you will need to compile your own world to update. Cheers, Matthew --=20 Dr Matthew J Seaman MA, D.Phil. PGP: http://www.infracaninophile.co.uk/pgpkey --OV0bdr3nKCRoHi2kCPcg1cp7R4krt2EuX Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.20 (Darwin) iQJ8BAEBCgBmBQJVCS3ZXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2NTNBNjhCOTEzQTRFNkNGM0UxRTEzMjZC QjIzQUY1MThFMUE0MDEzAAoJELsjr1GOGkATYMkQAItYv0v+DUgwiomS9Fsbmibm M6+mRAvUH1SissXoNYmBjlnEEdsZsjMRdYSzqDcsAU6EvFSNU9nUCLLTb/1Zr9DJ skwKd3ViebDXNhS8UHiG1I3ew7fB3iLFP9mqscAsSELPsN3iurjKl9YhvqfSUDA4 0JA+yFxrf4IzOI7oONPV5FSEzfzSxv57YK1lyF4SNop3zmK/aw+xGFQ70XxC5Tga WiRRPmtrnuy/v5YMr8McVVzi0nCB9yhsni+I6NZ7Wlp4d6zibSFKxfL61oH2wv8z tiv+2HBoCNgPfmSJV3OVUKUr4jKifWSyfFA8LZM/UwV6pjg02AUZ+OAQapOfy50N pUooDqYAvNi4NeVVCbQ/LGqx2lvYMSCh93bSsUYKEcImiq0kuu41hDdpcQH2hsZR DXYjKgV9BZlGiHCcauLGvcxq2cueKX7ekRmWqiUHbQCZBURvaLxbQ0SrlGM+gx1F 6Fcut5r5ddCwsBzR1+ETMZwdjMyIpq8buxJFxNRHDWDB+I11iW9PrYeazpJUWqI8 9roJ+CFXtonkwdyBvVfiU+Yh8BU/btkmAWNHiFCF0Yy9juKdZ7qM+UV4rCugAX0n nL/TcQWx4Q5u7kh+/B/ZF8ml2yxq9BCYHRfUboFr8kl598mUdJ5upfRRWLH5U4Sf 3glxWus2K4JZwCwQr/Uj =V2+r -----END PGP SIGNATURE----- --OV0bdr3nKCRoHi2kCPcg1cp7R4krt2EuX--