Opkg update - failed to download

Now have problem with opkg update:

curl performs SSL certificate verification by default, using a “bundle”
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn’t adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you’d like to turn off curl’s verification of the certificate, use
the -k (or --insecure) option.
Signature check failed.
Remove wrong Signature file.
Collected errors:

also getting cert error on api.turris.cz

Ditto!
Probably a missing signing key in the keyring.

Check the time on your router. If the time is way off in the future (say, the year 2036), the certs will be expired and you will get this error. You can set the time in LuCI if you have enabled the advanced administration password. Log into LuCi and go to: https://192.168.1.1/cgi-bin/luci/admin/system/system (and replace 192.168.1.1 with your router IP). On that LuCi page, you can click “Sync with browser” to sync your time with browser, and I recommend clicking “Enable NTP client” and then clicking ‘Save and Apply’

Hmm. Actually, just check my router, and it has the current time, but still has the cert issues described above.

Same Problem here, but the Fact that the Signing CA reads “Turris Emergency CA” i suspect that there is some sort of missconfiguration on their end. Guess the best thing would be to wait for them to fix the Repo.

1 Like

Také mám stejný problém

Hi,

seems to me, that there’s smth. wrong with the certificate chain, maybe some misconfiguration of the webserver.
Time will tell :wink:

B

Hello

We had this CA prepared for any unforeseen problems for some time, and updater accepts it. And with all the mayhem around StartCom we decided that it is easier and safer to use our own CA for automatic updates than relying on a third-party one. The downside is it shows the warning in a browser, but api.turris.cz isn’t meant to be opened in a browser anyway (if you want to browse the packages, you can go to repo.turris.cz).

Obviously, there was one more place we forgot to update before switching the CA. Wait awhile, I’ll try to think of a solution and either roll back to the old cert temporarily or post some kind of workaround for now, before we propagate the configuration change.

OK, I returned it back for now, next attempt to switch after we propagate that missing configuration change.

Same problem here:
Got this error today from my router (email):

Error notifications

Updater failed:
unreachable: https://api.turris.cz/updater-defs/3.5.1/omnia/base.lua: curl: (60) SSL certificate problem: CRL has expired More details here: https://curl.haxx.se/docs/sslcerts.html

curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn’t adequate, you can specify an alternate file using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL).
If you’d like to turn off curl’s verification of the certificate, use the -k (or --insecure) option.

Same here. It has been almost 2 weeks since your post @the-s-a-m. Did you solve it (and if so how?). Is this something we (us users) should act upon - client sided or is this something that has to be solved on by turris.cz?

##### Error notifications #####
Updater failed:
unreachable: https://api.turris.cz/updater-defs/3.5.2/omnia/base.lua: curl: (60) SSL certificate problem: CRL has expired
More details here: https://curl.haxx.se/docs/sslcerts.html
...

This worked for me, try remove/rename this file /tmp/crl.pem

1 Like

Thanks for the pointers @Weafyr! I renamed tmp/crl.pem but how to:

Of course I could reboot the Omnia but that feels like shooting at a mosquito with a bazooka! :smirk:

Should be fairly easy though… let me see… hmmm…

Yea its written fairly confusing, to “restart” updater.sh you have to just write & enter updater.sh into SSH terminal

Ow… lol, I just did:

$ /etc/init.d/updater restart

EDIT:

Output showed:

WARN:Script revision-specific not found, but ignoring its absence as requested
WARN:Script serial-specific not found, but ignoring its absence as requested
WARN:Multiple candidates from same repository with same version for package shairport-sync-openssl
WARN:Lock on //var/lock/opkg.lock released by garbage collector
  • Are those warnings to be expected?

I additionally followed up on your remark and executed an additional:

$ updater.sh

I do see a new /tmp/crl.pem (already after my first command) but;

  • how to check if the regular updates are run?

Any idea’s anyone?

Hi, I need your help

I encounter the same problem.
When using opkg update :

root@turris:~# opkg update
Downloading https://api.turris.cz/openwrt-repo/omnia/packages//base/Packages.gz.
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:–:-- --:–:-- --:–:-- 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: https://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a “bundle”
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn’t adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you’d like to turn off curl’s verification of the certificate, use
the -k (or --insecure) option.
[…]
Signature check failed.
Remove wrong Signature file.
Collected errors:

I tried to :

  1. Check the time on my router [OK]
  2. Delete /tmp/crl.pem [OK]
  3. Launch updater.sh [NOK] message : unreachable: https://api.turris.cz/openwrt-repo/omnia/packages/printing/hplip_3.16.11-1_mvebu.ipk: curl: (28) Operation timed out after 180000 milliseconds with 12910592 out of 15665115 bytes received
  4. Disable DNSSEC temporary [OK]
  5. Reboot Turris Omnia [OK]

But it doesn’t change, don’t work.

There is problem with certificate, try this URL in browser on your PC:
https://api.turris.cz/openwrt-repo/omnia/packages/printing/hplip_3.16.11-1_mvebu.ipk

Ok, this night Turris have an update :

Restart is needed

The OS kernel has been updated to version 4.4.39+4-1-80079e1c1e5f9ca7ad734044462a761a-4. Please reboot the device.

The device will be restarted automatically on Sunday, February 26 at 03:30 AM.

News announcements

• wget: making sure busybox wget doesn’t override the real one
• openssl: fix various security issues
• libpcap: fix various security issues
• tcpdump: fix various security issuse, dropped mini variant

And this morning everything works, opkg update does not get me out of certificate errors, it seems that this update has solved my problem.

I am still unable to update packages either using opkg update or through LuCI. Even after I disabled signature verification by commenting option check_signature 1 in LuCI opkg configuration page, I still have curl errors when trying to download packages.

My current /etc/turris-version is 3.5