Broken APT-Cacher Update

My system configuration

  • debian-12-minimal (freshly installed)
  • using apt-cacher
  • double checked all apt-cacher configurations

It worked fine before, I don’t know what I did but every apt update ends with the following error message now.

sudo apt update
Hit:1 http://HTTPS///deb.debian.org/debian bookworm InRelease
Get:2 http://HTTPS///deb.debian.org/debian-security bookworm-security InRelease [48.0 kB]
Hit:3 http://HTTPS///deb.qubes-os.org/r4.2/vm bookworm InRelease
Err:2 http://HTTPS///deb.debian.org/debian-security bookworm-security InRelease
  The following signatures were invalid: BADSIG 54404762BBB6E853 Debian Security Archive Automatic Signing Key (11/bullseye) <ftpmaster@debian.org>
Fetched 48.0 kB in 0s (105 kB/s)
Reading package lists... Done
W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://HTTPS///deb.debian.org/debian-security bookworm-security InRelease: The following signatures were invalid: BADSIG 54404762BBB6E853 Debian Security Archive Automatic Signing Key (11/bullseye) <ftpmaster@debian.org>
E: Failed to fetch http://HTTPS///deb.debian.org/debian-security/dists/bookworm-security/InRelease  The following signatures were invalid: BADSIG 54404762BBB6E853 Debian Security Archive Automatic Signing Key (11/bullseye) <ftpmaster@debian.org>
E: Some index files failed to download. They have been ignored, or old ones used instead.

It points to an issue related to bullseye (Debian 11)?

I checked the trusted keys:

ls /etc/apt/trusted.gpg.d/
total size of directory: 88K	.
drwxr-xr-x. 2 root root 4.0K 2024-09-07 10:10 .
drwxr-xr-x. 8 root root 4.0K 2025-01-05 10:53 ..
-rw-r--r--. 1 root root  12K 2023-07-30 21:30 debian-archive-bookworm-automatic.asc
-rw-r--r--. 1 root root  12K 2023-07-30 21:30 debian-archive-bookworm-security-automatic.asc
-rw-r--r--. 1 root root  461 2023-07-30 21:30 debian-archive-bookworm-stable.asc
-rw-r--r--. 1 root root  12K 2023-07-30 21:30 debian-archive-bullseye-automatic.asc
-rw-r--r--. 1 root root  12K 2023-07-30 21:30 debian-archive-bullseye-security-automatic.asc
-rw-r--r--. 1 root root 3.4K 2023-07-30 21:30 debian-archive-bullseye-stable.asc
-rw-r--r--. 1 root root  11K 2023-07-30 21:30 debian-archive-buster-automatic.asc
-rw-r--r--. 1 root root  11K 2023-07-30 21:30 debian-archive-buster-security-automatic.asc
-rw-r--r--. 1 root root 1.7K 2023-07-30 21:30 debian-archive-buster-stable.asc
cat /etc/apt/sources.list
deb http://HTTPS///deb.debian.org/debian bookworm main contrib non-free-firmware
#deb-src http://HTTPS///deb.debian.org/debian bookworm main contrib non-free-firmware

deb http://HTTPS///deb.debian.org/debian-security bookworm-security main contrib non-free-firmware
#deb-src http://HTTPS///deb.debian.org/debian-security bookworm-security main contrib non-free-firmware
1 Like

Anyone can help here?
… if not I need to do a re-installation.

1 Like

Not a apt-cacher user here.

I believe you could temporarily change http://HTTPS/// and replace it with https:// in /etc/apt/sources.list file. This should allow you to update as usual but you will lose caching. Then wait for unman or others who are apt-cacher expert to advise.

2 Likes

Confirmed, switching back to non-apt-cacher configuration, fixed the key issue.
Thank you!

Still wondering what causes this bullseye key issue (with the apt-cacher).

2 Likes

… I wouldn’t label it solution but I need it fixed quickly.
Therefore, I used the hammer approach*: removed and recreated the apt-cacher.
It fixed the bullseye key issue.

* Thanks to my automated script, apt-cacher creation and 30+ templateVM reconfiguration and update was done in a few minutes :smiling_face_with_three_hearts:.

2 Likes