root@opnsense:~ # ps ax | grep fetch78483 - S 0:00.28 /bin/sh /usr/local/sbin/opnsense-fetch -a -w 1 -T 30 -q -o /var/cache/opnsense-update/65511/packages-24.1-amd64.tar https://pkg.opnsense.org/FreeBSD:13:amd64/23.7/sets/packages-24.1-amd64.tar79651 - Is 0:00.00 daemon: fetch[80174] (daemon)80174 - I 0:01.27 fetch -a -w 1 -T 30 -q -o /var/cache/opnsense-update/65511/packages-24.1-amd64.tar https://pkg.opnsense.org/FreeBSD:13:amd64/23.7/sets/packages-24.1-amd64.tar
root@opnsense:~ # ll /var/cache/opnsense-update/65511/total 283981-rw-r----- 1 root wheel 290586624 Feb 14 20:48 packages-24.1-amd64.tar-rw-r----- 1 root wheel 1332 Jan 31 05:46 packages-24.1-amd64.tar.sigroot@opnsense:~ #
After 3.5 hours it finally gave ".................. failed, signature invalid".Can anyone suggest a way to manually do the upgrade?Thanks.
subject=CN = pkg.opnsense.orgissuer=C = BE, O = GlobalSign nv-sa, CN = GlobalSign GCC R3 DV TLS CA 2020---No client certificate CA names sentPeer signing digest: SHA256Peer signature type: RSA-PSSServer Temp Key: X25519, 253 bits---SSL handshake has read 2171 bytes and written 398 bytesVerification error: unable to verify the first certificate---New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384Server public key is 2048 bitSecure Renegotiation IS NOT supportedCompression: NONEExpansion: NONENo ALPN negotiatedEarly data was not sentVerify return code: 21 (unable to verify the first certificate)
subject=CN = pkg.opnsense.orgissuer=C = BE, O = GlobalSign nv-sa, CN = GlobalSign GCC R3 DV TLS CA 2020---No client certificate CA names sentPeer signing digest: SHA256Peer signature type: RSA-PSSServer Temp Key: X25519, 253 bits---SSL handshake has read 5865 bytes and written 398 bytesVerification: OK---New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384Server public key is 2048 bitSecure Renegotiation IS NOT supportedCompression: NONEExpansion: NONENo ALPN negotiatedEarly data was not sentVerify return code: 0 (ok)