

- #Download master debian install
- #Download master debian zip file
- #Download master debian update
- #Download master debian archive
- #Download master debian upgrade
You can use either the command line tool "Github" (which is installed by default) or the GUI client "SourceTree".
#Download master debian zip file
The following steps will help you download a tarball of your choice from −ĭownload Git repository as a tar or zip file I said "Y".Github is an online source code repository and hosting service for open-source projects, which provides the ability to host, version control, review, fork, and submit changes to any project hosted there. It said that buster "changed its Version value from '' to '10.13'" and "its 'Suite' value from 'testing' to 'oldstable'". It said that my package "will be DOWNGRADED".
#Download master debian install
Run apt-get install debian-archive-keyring/stretch to install stretch's keyring.
#Download master debian update
Run apt update to scan stretch's sources. It would also work to copy buster's lines and change buster to stretch.) (I had lines for stretch, so I uncommented them.
#Download master debian archive
I had the key for Debian 9 "stretch", the next key before "buster" in Debian's Archive Signing Keys.Įdit /etc/apt/sources.list to add stretch.
#Download master debian upgrade
I needed to upgrade it in 2022, but I was missing buster's release key. I had an install of Debian 10 "buster" from 2018, when it was "testing", and before it released in 2019. You might need to do this if your install was Debian "testing". If you got no key because your debian-archive-keyring is too old, you can securely upgrade it by adding an earlier release of Debian to /etc/apt/sources.list, and installing a new keyring signed by the old key. That way, you will key the keys installed before they are used for signing things, and you won't have this problem in the future. That is one package, that you really want to keep up-to-date. The effort involved would not be trivial.ĭebian generally does a pretty good job adding keys that will be used to sign the packages in the future to the debian-archive-keyring package. Then they would have to rebuild some packages to force you to install something evil onto your system. Once they did that, they would have to build their own custom debian-archive-keyring package including their evil key in addition to the standard keys. It would take a lot of effort for someone to setup a MITM between you and the some random. mirror. If you are not extremely paranoid, or in a high security environment, then just let apt-get install debian-archive-keyring install, and ignore the warning. If you are really paranoid, you might have to grab a copy of the archive, and have someone else grab a copy from another mirror on a different computer over a different network. You basically just have to find a way to get a copy of debian-archive-keyring, or the current key from system that you trust, and the install it onto your system. The problem of course is that the cert for is signed by ca., which is not distributed with the most common web browsers. That wiki link you provided links off to which has provides a copy of the keys you can download over SSL. There are many places you can download the public keys for the various archives, but frequently they are not provided over HTTPS, and any checksum files are delivered from the same location. You are basically just experiencing the standard bootstrapping problem for public key cryptography. Note: my /etc/apt/sources.list is: deb lenny main contrib non-freeĭeb lenny-backports main contrib non-free Gives me: WARNING: The following packages cannot be authenticated!Īnd the solution for that is to do an apt-get update

OK, but perversely: apt-get install debian-archive-keyring and once the system is fed the new key (by upgrading the debian-archive-keyring package), the warning will go away" W: GPG error: lenny Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY AED4B06F473041FAĪt it notes the NO_PUBKEY issue "means the archive has begun to be signed by a new key, which your system does not know about. W: GPG error: stable Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY AED4B06F473041FA

W: GPG error: lenny-backports Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY AED4B06F473041FA I have a catch 22 trying to: # apt-get update
