GPG error: http://downloads.linux.hpe.com jessie/current Release: The following signatures

Posted by David Guillermo on Monday, February 19, 2018

Vamos a corregir el error de HP, que por alguna razón no pueden poner las firmas como es debido y tenemos que bajarla de una web.

root@albergue:~# apt-get update
Ign http://ftp.de.debian.org jessie InRelease
Hit http://ftp.de.debian.org jessie-updates InRelease
Ign http://downloads.linux.hpe.com jessie/current InRelease
Hit http://ftp.de.debian.org jessie Release.gpg
Get:1 http://downloads.linux.hpe.com jessie/current Release.gpg [490 B]
Get:2 http://ftp.de.debian.org jessie-updates/main amd64 Packages/DiffIndex [10.9 kB]
Get:3 http://ftp.de.debian.org jessie-updates/main Translation-en/DiffIndex [3,688 B]
Hit http://ftp.de.debian.org jessie Release
Get:4 http://downloads.linux.hpe.com jessie/current Release [6,049 B]
Err http://downloads.linux.hpe.com jessie/current Release
Hit http://ftp.de.debian.org jessie-updates/main Sources
Hit https://minergate.com stable InRelease
Hit http://security.debian.org jessie/updates InRelease
Hit http://ftp.de.debian.org jessie/main Sources
Hit http://ftp.de.debian.org jessie/main amd64 Packages
Hit http://ftp.de.debian.org jessie/main Translation-en
Get:5 https://minergate.com stable/non-free Translation-en_US [178 B]
Hit http://security.debian.org jessie/updates/main Sources
Hit http://security.debian.org jessie/updates/main amd64 Packages
Hit http://security.debian.org jessie/updates/main Translation-en
Fetched 21.1 kB in 4s (4,783 B/s)
Reading package lists... Done

W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://downloads.linux.hpe.com jessie/current Release: The following signatures couldnt be verified because the public key is not available: NO_PUBKEY C208ADDE26C2B797

W: Failed to fetch http://downloads.linux.hpe.com/SDR/repo/mcp/dists/jessie/current/Release
W: Some index files failed to download. They have been ignored, or old ones used instead.

accedemos a https://downloads.linux.hpe.com/SDR/keys.html nos bajamos las firmas y firmamos, según nuestra distro.

curl http://downloads.linux.hpe.com/SDR/hpPublicKey1024.pub | apt-key add -
curl http://downloads.linux.hpe.com/SDR/hpPublicKey2048.pub | apt-key add -
curl http://downloads.linux.hpe.com/SDR/hpPublicKey2048_key1.pub | apt-key add -
curl http://downloads.linux.hpe.com/SDR/hpePublicKey2048_key1.pub | apt-key add -

Ahora al realizar el update, no tendremos problemas.

root@albergue:~# apt-get update
Hit http://security.debian.org jessie/updates InRelease
Ign http://ftp.de.debian.org jessie InRelease
Hit http://ftp.de.debian.org jessie-updates InRelease
Ign http://downloads.linux.hpe.com jessie/current InRelease
Hit http://ftp.de.debian.org jessie Release.gpg
Get:1 http://downloads.linux.hpe.com jessie/current Release.gpg [490 B]
Get:2 http://ftp.de.debian.org jessie-updates/main amd64 Packages/DiffIndex [10.9 kB]
Hit http://security.debian.org jessie/updates/main Sources
Get:3 http://ftp.de.debian.org jessie-updates/main Translation-en/DiffIndex [3,688 B]
Hit http://security.debian.org jessie/updates/main amd64 Packages
Hit http://ftp.de.debian.org jessie Release
Hit http://security.debian.org jessie/updates/main Translation-en
Get:4 http://downloads.linux.hpe.com jessie/current Release [6,049 B]
Hit http://ftp.de.debian.org jessie-updates/main Sources
Get:5 http://downloads.linux.hpe.com jessie/current/non-free amd64 Packages [3,255 B]
Hit http://ftp.de.debian.org jessie/main Sources
Hit http://ftp.de.debian.org jessie/main amd64 Packages
Hit http://ftp.de.debian.org jessie/main Translation-en
Ign http://downloads.linux.hpe.com jessie/current/non-free Translation-en_US
Ign http://downloads.linux.hpe.com jessie/current/non-free Translation-en
Fetched 24.3 kB in 4s (5,296 B/s)
Reading package lists... Done

Quitando el error E: The method driver /usr/lib/apt/methods/https could not be found. que teníamos antes podremos seguir realizando nuestras tareas como siempre en el servidor y mantener actualizados los parches de seguridad, necesarios.