{"id":6639,"date":"2016-01-21T17:54:09","date_gmt":"2016-01-21T16:54:09","guid":{"rendered":"http:\/\/blog.wenzlaff.de\/?p=6639"},"modified":"2021-11-22T17:14:19","modified_gmt":"2021-11-22T16:14:19","slug":"was-ist-zu-tun-wenn-auf-einem-raspberry-pi-bei-apt-get-update-der-folgende-fehler-erscheint-gpg-error-httprepo-mutability-co-uk-wheezy-release-the-following-signatures-were-invalid-keyexpire","status":"publish","type":"post","link":"http:\/\/blog.wenzlaff.de\/?p=6639","title":{"rendered":"Was ist zu tun, wenn auf einem Raspberry Pi bei apt-get update der folgende Fehler erscheint: &#8222;GPG error: http:\/\/repo.mutability.co.uk wheezy Release: The following signatures were invalid: KEYEXPIRED&#8220;"},"content":{"rendered":"<p>Was ist zu tun, wenn auf einem Raspberry Pi bei einem <\/p>\n<pre class=\"lang:default decode:true \" >sudo apt-get update <\/pre>\n<p>der folgende Fehler erscheint: <\/p>\n<p>&#8222;GPG error: http:\/\/repo.mutability.co.uk wheezy Release: The following signatures were invalid: KEYEXPIRED&#8220;<\/p>\n<p><a href=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2016\/01\/Bildschirmfoto-2016-01-21-um-17.31.04.png\" rel=\"attachment wp-att-6641\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2016\/01\/Bildschirmfoto-2016-01-21-um-17.31.04-1024x202.png\" alt=\"gpg error\" width=\"640\" height=\"126\" class=\"aligncenter size-large wp-image-6641\" srcset=\"http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2016\/01\/Bildschirmfoto-2016-01-21-um-17.31.04-1024x202.png 1024w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2016\/01\/Bildschirmfoto-2016-01-21-um-17.31.04-300x59.png 300w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2016\/01\/Bildschirmfoto-2016-01-21-um-17.31.04-768x151.png 768w, http:\/\/blog.wenzlaff.de\/wp-content\/uploads\/2016\/01\/Bildschirmfoto-2016-01-21-um-17.31.04.png 1320w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Da ist ein GPG Key abgelaufen. Der Key kann wie folgt aktualisiert werden:<!--more--><\/p>\n<pre class=\"lang:default decode:true \" >\r\n# erst einmal alle Keys anschauen mit\r\nsudo apt-key list\r\n# ua. diese Ausgabe, ok der Key ist abgelaufen\r\n#\/etc\/apt\/trusted.gpg.d\/\/mutability.gpg\r\n#--------------------------------------\r\n#pub   2048R\/4D731812 2014-12-28 [expired: 2015-12-28]\r\n#uid                  Oliver Jowett (repo.mutability.co.uk archive signing key) &lt;oliver@mutability.co.uk&gt;\r\n\r\n# schauen welche Keys abgelaufen ist\r\nsudo apt-key list | grep expired\r\n\r\n# Liefert z.B.\r\n# pub   2048R\/4D731812 2014-12-28 [expired: 2015-12-28]\r\n# Key updaten\r\nsudo apt-key adv --recv-keys --keyserver keys.gnupg.net 4D731812\r\n\r\n# alle Key nun anschauen mit\r\nsudo apt-key list\r\n# und siehe da, der Key ist aktuallisiert worden\r\n#\/etc\/apt\/trusted.gpg.d\/\/mutability.gpg\r\n#--------------------------------------\r\n#pub   2048R\/4D731812 2014-12-28 [expires: 2017-05-25]\r\n#uid                  Oliver Jowett (repo.mutability.co.uk archive signing key) &lt;oliver@mutability.co.uk&gt;\r\n#sub   2048R\/2748F48D 2014-12-28 [expires: 2017-05-25]\r\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Was ist zu tun, wenn auf einem Raspberry Pi bei einem sudo apt-get update der folgende Fehler erscheint: &#8222;GPG error: http:\/\/repo.mutability.co.uk wheezy Release: The following signatures were invalid: KEYEXPIRED&#8220; Da ist ein GPG Key abgelaufen. Der Key kann wie folgt aktualisiert werden:<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[220,2173,808,1023,1101],"tags":[2402,1793,2403,255,819,2404,2401],"class_list":["post-6639","post","type-post","status-publish","format-standard","hentry","category-anleitung","category-debian","category-linux-2","category-raspberry-pi","category-reisen","tag-abgelaufen","tag-dump1090","tag-error","tag-gpg","tag-key","tag-mutability","tag-signatur"],"_links":{"self":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts\/6639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6639"}],"version-history":[{"count":0,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=\/wp\/v2\/posts\/6639\/revisions"}],"wp:attachment":[{"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6639"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.wenzlaff.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}