pkgmir.geo.freebsd.org ... forbidden?

Code:
mm3# pkg repos


FreeBSD-ports: { 
    url             : "pkg+[URL]https://pkg.freebsd.org/FreeBSD:15:amd64/latest[/URL]",
    enabled         : yes,
    priority        : 0,
    mirror_type     : "SRV",
    signature_type  : "FINGERPRINTS",
    fingerprints    : "/usr/share/keys/pkg"
  }


FreeBSD-ports-kmods: { 
    url             : "pkg+[URL]https://pkg.freebsd.org/FreeBSD:15:amd64/kmods_latest_0[/URL]",
    enabled         : yes,
    priority        : 0,
    mirror_type     : "SRV",
    signature_type  : "FINGERPRINTS",
    fingerprints    : "/usr/share/keys/pkg"
  }

FreeBSD-base: { 
    url             : "pkg+[URL]https://pkg.freebsd.org/FreeBSD:15:amd64/base_release_0[/URL]",
    enabled         : yes,
    priority        : 0,
    mirror_type     : "SRV",
    signature_type  : "FINGERPRINTS",
    fingerprints    : "/usr/share/keys/pkgbase-15"
  }
 
Alright, cool, it's the default 'pkg.freebsd.org'. That's good. What's not so good is that you appear to be redirected to a broken mirror.
 
looks like cloudfront (aws). here's "fetch -v" on that URL:

requesting https://pkgmir.geo.freebsd.org/Free.../Hashed/FreeBSD-src-sys-15.0p5~0c0f30544b.pkg
302 redirect to https://cloudfront.aws.pkgbase.free.../Hashed/FreeBSD-src-sys-15.0p5~0c0f30544b.pkg
resolving server address: cloudfront.aws.pkgbase.freebsd.org:443
SSL options: 82004850
Peer verification enabled
Using OpenSSL default CA cert file and path
Verify hostname
TLSv1.3 connection established using TLS_AES_128_GCM_SHA256
Certificate subject: /CN=cloudfront.aws.pkgbase.freebsd.org
Certificate issuer: /C=US/O=Amazon/CN=Amazon RSA 2048 M04
requesting https://cloudfront.aws.pkgbase.free.../Hashed/FreeBSD-src-sys-15.0p5~0c0f30544b.pkg
AccessDeniedAccess Denied
fetch: https://pkgmir.geo.freebsd.org/Free.../Hashed/FreeBSD-src-sys-15.0p5~0c0f30544b.pkg: Forbidden
 
Back
Top