The repository 'https://enterprise.proxmox.com/debian/pve buster Release' no longer has a Release file

Nov 1, 2019
5
1
43
www.axians.nl
Hi,

When we do apt update or use the Update/Refresh button we get the output seen below (error).
We have an active subscription....

Code:
starting apt-get update
Hit:1 http://ftp.nl.debian.org/debian buster InRelease
Hit:2 http://ftp.nl.debian.org/debian buster-updates InRelease
Hit:3 http://security.debian.org buster/updates InRelease
Hit:4 http://download.proxmox.com/debian/ceph-octopus buster InRelease
Ign:5 https://enterprise.proxmox.com/debian/pve buster InRelease
Err:6 https://enterprise.proxmox.com/debian/pve buster Release
  Certificate verification failed: The certificate is NOT trusted. The certificate issuer is unknown.  Could not handshake: Error in the certificate verification. [IP: 212.224.123.70 443]
Reading package lists...
E: The repository 'https://enterprise.proxmox.com/debian/pve buster Release' no longer has a Release file.
TASK ERROR: command 'apt-get update' failed: exit code 100

Output of the pveversion --verbose
Code:
proxmox-ve: 6.3-1 (running kernel: 5.4.78-2-pve)
pve-manager: 6.3-3 (running version: 6.3-3/eee5f901)
pve-kernel-5.4: 6.3-3
pve-kernel-helper: 6.3-3
pve-kernel-5.4.78-2-pve: 5.4.78-2
pve-kernel-5.4.73-1-pve: 5.4.73-1
pve-kernel-5.4.65-1-pve: 5.4.65-1
pve-kernel-5.4.34-1-pve: 5.4.34-2
ceph: 15.2.8-pve2
ceph-fuse: 15.2.8-pve2
corosync: 3.0.4-pve1
criu: 3.11-3
glusterfs-client: 5.5-3
ifupdown: 0.8.35+pve1
ksm-control-daemon: 1.3-1
libjs-extjs: 6.0.1-10
libknet1: 1.16-pve1
libproxmox-acme-perl: 1.0.7
libproxmox-backup-qemu0: 1.0.2-1
libpve-access-control: 6.1-3
libpve-apiclient-perl: 3.1-3
libpve-common-perl: 6.3-2
libpve-guest-common-perl: 3.1-3
libpve-http-server-perl: 3.1-1
libpve-storage-perl: 6.3-3
libqb0: 1.0.5-1
libspice-server1: 0.14.2-4~pve6+1
lvm2: 2.03.02-pve4
lxc-pve: 4.0.3-1
lxcfs: 4.0.3-pve3
novnc-pve: 1.1.0-1
openvswitch-switch: 2.12.0-1
proxmox-backup-client: 1.0.6-1
proxmox-mini-journalreader: 1.1-1
proxmox-widget-toolkit: 2.4-3
pve-cluster: 6.2-1
pve-container: 3.3-2
pve-docs: 6.3-1
pve-edk2-firmware: 2.20200531-1
pve-firewall: 4.1-3
pve-firmware: 3.1-3
pve-ha-manager: 3.1-1
pve-i18n: 2.2-2
pve-qemu-kvm: 5.1.0-7
pve-xtermjs: 4.7.0-3
qemu-server: 6.3-2
smartmontools: 7.1-pve2
spiceterm: 3.1-1
vncterm: 1.6-2
zfsutils-linux: 0.8.5-pve1
 
ist das paket ca-certificates installiert?
 
Yes it is installed:

apt list | grep ca-certificates
Code:
WARNING: apt does not have a stable CLI interface. Use with caution in scripts.
ca-certificates-java/oldstable 20190405 all
ca-certificates-mono/oldstable 5.18.0.240+dfsg-3 all
ca-certificates/oldstable,oldstable-updates,now 20200601~deb10u2 all [installed]

cat /etc/apt/sources.list
Code:
deb http://ftp.nl.debian.org/debian buster main contrib

deb http://ftp.nl.debian.org/debian buster-updates main contrib

# security updates
deb http://security.debian.org buster/updates main contrib

cat /etc/apt/sources.list.d/pve-enterprise.list
Code:
deb https://enterprise.proxmox.com/debian/pve buster pve-enterprise
 
do you have some proxy configured (either on your host, or automatically on your network)? does curl -v https://enterprise.proxmox.com work?
 
Hi,

It seems the issue is with our central firewall. Some https site work, and some not.
I will let you know when I talked to our firewall guy...

nmap -p 443 --script ssl-cert enterprise.proxmox.com
Code:
Starting Nmap 7.70 ( https://nmap.org ) at 2021-10-01 13:09 CEST
Nmap scan report for enterprise.proxmox.com (212.224.123.70)
Host is up (0.0034s latency).
Other addresses for enterprise.proxmox.com (not scanned): 2a01:7e0:0:424::249
rDNS record for 212.224.123.70: de.cdn.proxmox.com

PORT    STATE SERVICE
443/tcp open  https
| ssl-cert: Subject: commonName=enterprise.proxmox.com
| Subject Alternative Name: DNS:de.cdn.proxmox.com, DNS:enterprise.proxmox.com, DNS:fr.cdn.proxmox.com, DNS:na.cdn.proxmox.com, DNS:sg.cdn.proxmox.com
| Issuer: commonName=FGT80ETK18015214/organizationName=Fortinet/stateOrProvinceName=California/countryName=US
| Public Key type: rsa
| Public Key bits: 4096
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2021-09-09T04:04:14
| Not valid after:  2021-12-08T04:04:13
| MD5:   132e eedf 7ff7 2179 873a 5a0b 6816 9dd2
|_SHA-1: 0151 ed1b 3f0f 99d6 83e8 091b 79cf 76f0 13ce f722

Nmap done: 1 IP address (1 host up) scanned in 4.22 seconds
 
  • Like
Reactions: fabian