picodotdev / alis

Arch Linux Install Script (or alis, also known as the Arch Linux executable installation guide and wiki) installs an unattended, automated and customized Arch Linux system.
https://picodotdev.github.io/alis/
GNU General Public License v3.0
823 stars 319 forks source link

cannot download `master.zip` #213

Closed tkna91 closed 2 years ago

tkna91 commented 2 years ago

Thanks for your cool project.

Sorry if I am doing something wrong. I cannot download master.zip with the following condition. What should I do?

# curl -sL https://raw.githubusercontent.com/picodotdev/alis/master/download.sh | bash -x
+ set -eu
+ GITHUB_USER=picodotdev
+ BRANCH=master
+ getopts b:h:u: arg
+ set -o xtrace
+ '[' -n '' ']'
+ curl -sL -o alis-master.zip https://github.com/picodotdev/alis/archive/refs/heads/master.zip
# 
stevleibelt commented 2 years ago

Hey @tkna91,

In general, things are working on all my machines. So lets have a quick session to debug things.

Can you please execute the following two lines and post the output here?

curl --verbose -sL https://raw.githubusercontent.com/picodotdev/alis/master/download.sh;
echo $?
tkna91 commented 2 years ago

@stevleibelt Thank you

Here are the results ``` # curl --verbose -sL https://raw.githubusercontent.com/picodotdev/alis/master/download.sh; * Trying 2606:50c0:8002::154:443... * Connected to raw.githubusercontent.com (2606:50c0:8002::154) port 443 (#0) * ALPN: offers http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: none * TLSv1.3 (OUT), TLS handshake, Client hello (1): * TLSv1.3 (IN), TLS handshake, Server hello (2): * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): * TLSv1.3 (IN), TLS handshake, Certificate (11): * TLSv1.3 (IN), TLS handshake, CERT verify (15): * TLSv1.3 (IN), TLS handshake, Finished (20): * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): * TLSv1.3 (OUT), TLS handshake, Finished (20): * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN: server accepted h2 * Server certificate: * subject: C=US; ST=California; L=San Francisco; O=GitHub, Inc.; CN=*.github.com * start date: Apr 7 00:00:00 2022 GMT * expire date: Apr 7 23:59:59 2023 GMT * subjectAltName: host "raw.githubusercontent.com" matched cert's "*.githubusercontent.com" * issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS RSA SHA256 2020 CA1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * h2h3 [:method: GET] * h2h3 [:path: /picodotdev/alis/master/download.sh] * h2h3 [:scheme: https] * h2h3 [:authority: raw.githubusercontent.com] * h2h3 [user-agent: curl/7.83.1] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x55c29c15c1a0) > GET /picodotdev/alis/master/download.sh HTTP/2 > Host: raw.githubusercontent.com > user-agent: curl/7.83.1 > accept: */* > * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): < HTTP/2 200 < cache-control: max-age=300 < content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox < content-type: text/plain; charset=utf-8 < etag: "d54f06c68e5e28c1e16d32fa9c574630df8a22d76503867f05659d4e0d0d49b3" < strict-transport-security: max-age=31536000 < x-content-type-options: nosniff < x-frame-options: deny < x-xss-protection: 1; mode=block < x-github-request-id: 4524:56B1:6F79E:DD049:62BD8481 < accept-ranges: bytes < date: Thu, 30 Jun 2022 11:20:05 GMT < via: 1.1 varnish < x-served-by: cache-tyo11981-TYO < x-cache: MISS < x-cache-hits: 0 < x-timer: S1656588006.798949,VS0,VE199 < vary: Authorization,Accept-Encoding,Origin < access-control-allow-origin: * < x-fastly-request-id: 501c07e0676099e573debf00d776f18bae2b8552 < expires: Thu, 30 Jun 2022 11:25:05 GMT < source-age: 0 < content-length: 978 < #!/usr/bin/env bash set -eu # Arch Linux Install Script (alis) installs unattended, automated # and customized Arch Linux system. # Copyright (C) 2022 picodotdev GITHUB_USER="picodotdev" BRANCH="master" HASH="" while getopts "b:h:u:" arg; do case ${arg} in b) BRANCH="${OPTARG}" ;; h) HASH="${OPTARG}" ;; u) GITHUB_USER=${OPTARG} ;; ?) echo "Invalid option: -${OPTARG}." exit 1 ;; esac done set -o xtrace if [ -n "$HASH" ]; then curl -sL -o "alis-$HASH.zip" https://github.com/$GITHUB_USER/alis/archive/$HASH.zip bsdtar -x -f "alis-$HASH.zip" cp -R alis-$HASH/*.sh alis-$HASH/*.conf alis-$HASH/files/ alis-$HASH/configs/ ./ else curl -sL -o "alis-$BRANCH.zip" https://github.com/$GITHUB_USER/alis/archive/refs/heads/$BRANCH.zip bsdtar -x -f "alis-$BRANCH.zip" cp -R alis-$BRANCH/*.sh alis-$BRANCH/*.conf alis-$BRANCH/files/ alis-$BRANCH/configs/ ./ fi chmod +x configs/*.sh chmod +x *.sh * Connection #0 to host raw.githubusercontent.com left intact # echo $? 0 # ```
stevleibelt commented 2 years ago

@tkna91 So this is looking well. DNS is working and with the output starting at # Arch, you get the content.

Now step two, execute the following command. curl -v -sL -o alis-master.zip https://github.com/picodotdev/alis/archive/refs/heads/master.zip

This is my verbose output, as example ```bash * Trying 140.82.121.3:443... * Connected to github.com (140.82.121.3) port 443 (#0) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: none } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2459 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [78 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN: server accepted h2 * Server certificate: * subject: C=US; ST=California; L=San Francisco; O=GitHub, Inc.; CN=github.com * start date: Mar 15 00:00:00 2022 GMT * expire date: Mar 15 23:59:59 2023 GMT * subjectAltName: host "github.com" matched cert's "github.com" * issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 } [5 bytes data] * h2h3 [:method: GET] * h2h3 [:path: /picodotdev/alis/archive/refs/heads/master.zip] * h2h3 [:scheme: https] * h2h3 [:authority: github.com] * h2h3 [user-agent: curl/7.83.1] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x562e2829ed70) } [5 bytes data] > GET /picodotdev/alis/archive/refs/heads/master.zip HTTP/2 > Host: github.com > user-agent: curl/7.83.1 > accept: */* > { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/2 302 < server: GitHub.com < date: Thu, 30 Jun 2022 21:27:35 GMT < content-type: text/html; charset=utf-8 < vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With < permissions-policy: interest-cohort=() < location: https://codeload.github.com/picodotdev/alis/zip/refs/heads/master < cache-control: max-age=0, private < strict-transport-security: max-age=31536000; includeSubdomains; preload < x-frame-options: deny < x-content-type-options: nosniff < x-xss-protection: 0 < referrer-policy: no-referrer-when-downgrade < expect-ct: max-age=2592000, report-uri="https://api.github.com/_private/browser/errors" < content-security-policy: default-src 'none'; base-uri 'self'; block-all-mixed-content; child-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com objects-origin.githubusercontent.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com cdn.optimizely.com logx.optimizely.com/v1/events *.actions.githubusercontent.com wss://*.actions.githubusercontent.com online.visualstudio.com/api/v1/locations github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src render.githubusercontent.com viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: github.githubassets.com identicons.github.com github-cloud.s3.amazonaws.com secured-user-images.githubusercontent.com/ github-production-user-asset-6210df.s3.amazonaws.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; worker-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/ < content-length: 0 < x-github-request-id: A6F8:93A7:101D931:11496BD:62BE155E < { [0 bytes data] * Connection #0 to host github.com left intact * Issue another request to this URL: 'https://codeload.github.com/picodotdev/alis/zip/refs/heads/master' * Trying 140.82.121.9:443... * Connected to codeload.github.com (140.82.121.9) port 443 (#1) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: none } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2456 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [79 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN: server accepted h2 * Server certificate: * subject: C=US; ST=California; L=San Francisco; O=GitHub, Inc.; CN=*.github.com * start date: Mar 16 00:00:00 2022 GMT * expire date: Mar 16 23:59:59 2023 GMT * subjectAltName: host "codeload.github.com" matched cert's "*.github.com" * issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 } [5 bytes data] * h2h3 [:method: GET] * h2h3 [:path: /picodotdev/alis/zip/refs/heads/master] * h2h3 [:scheme: https] * h2h3 [:authority: codeload.github.com] * h2h3 [user-agent: curl/7.83.1] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x562e2829ed70) } [5 bytes data] > GET /picodotdev/alis/zip/refs/heads/master HTTP/2 > Host: codeload.github.com > user-agent: curl/7.83.1 > accept: */* > { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/2 200 < access-control-allow-origin: https://render.githubusercontent.com < content-disposition: attachment; filename=alis-master.zip < content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox < content-type: application/zip < etag: "ba5f16ff7b5fab74631e84f924ef9d2514a0920d9b77ac524e33e3dcfc6c05a5" < strict-transport-security: max-age=31536000 < vary: Authorization,Accept-Encoding,Origin < x-content-type-options: nosniff < x-frame-options: deny < x-xss-protection: 1; mode=block < date: Thu, 30 Jun 2022 21:27:58 GMT < x-github-request-id: 1759:F2A3:14B33F:1AB6F9:62BE155E < { [883 bytes data] * Connection #1 to host codeload.github.com left intact ```
tkna91 commented 2 years ago
# curl -v -sL -o alis-master.zip https://github.com/picodotdev/alis/archive/refs/heads/master.zip
*   Trying 52.192.72.89:443...
* Immediate connect fail for 52.192.72.89: Network is unreachable
* Closing connection 0
# 
whois 52.192.72.89: ``` $ whois 52.192.72.89 # # ARIN WHOIS data and services are subject to the Terms of Use # available at: https://www.arin.net/resources/registry/whois/tou/ # # If you see inaccuracies in the results, please report at # https://www.arin.net/resources/registry/whois/inaccuracy_reporting/ # # Copyright 1997-2022, American Registry for Internet Numbers, Ltd. # # start NetRange: 52.192.0.0 - 52.223.191.255 CIDR: 52.208.0.0/13, 52.216.0.0/14, 52.222.0.0/16, 52.223.0.0/17, 52.223.128.0/18, 52.192.0.0/12, 52.220.0.0/15 NetName: AT-88-Z NetHandle: NET-52-192-0-0-1 Parent: NET52 (NET-52-0-0-0-0) NetType: Direct Allocation OriginAS: Organization: Amazon Technologies Inc. (AT-88-Z) RegDate: 2015-09-02 Updated: 2020-09-24 Ref: https://rdap.arin.net/registry/ip/52.192.0.0 OrgName: Amazon Technologies Inc. OrgId: AT-88-Z Address: 410 Terry Ave N. City: Seattle StateProv: WA PostalCode: 98109 Country: US RegDate: 2011-12-08 Updated: 2021-07-28 Comment: All abuse reports MUST include: Comment: * src IP Comment: * dest IP (your IP) Comment: * dest port Comment: * Accurate date/timestamp and timezone of activity Comment: * Intensity/frequency (short log extracts) Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time. Ref: https://rdap.arin.net/registry/entity/AT-88-Z OrgTechHandle: ANO24-ARIN OrgTechName: Amazon EC2 Network Operations OrgTechPhone: +1-206-266-4064 OrgTechEmail: amzn-noc-contact@amazon.com OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN OrgRoutingHandle: IPROU3-ARIN OrgRoutingName: IP Routing OrgRoutingPhone: +1-206-266-4064 OrgRoutingEmail: aws-routing-poc@amazon.com OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN OrgNOCHandle: AANO1-ARIN OrgNOCName: Amazon AWS Network Operations OrgNOCPhone: +1-206-266-4064 OrgNOCEmail: amzn-noc-contact@amazon.com OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN OrgAbuseHandle: AEA8-ARIN OrgAbuseName: Amazon EC2 Abuse OrgAbusePhone: +1-206-266-4064 OrgAbuseEmail: abuse@amazonaws.com OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN OrgRoutingHandle: ARMP-ARIN OrgRoutingName: AWS RPKI Management POC OrgRoutingPhone: +1-206-266-4064 OrgRoutingEmail: aws-rpki-routing-poc@amazon.com OrgRoutingRef: https://rdap.arin.net/registry/entity/ARMP-ARIN # end # start NetRange: 52.192.0.0 - 52.193.255.255 CIDR: 52.192.0.0/15 NetName: AMAZON-NRT NetHandle: NET-52-192-0-0-2 Parent: AT-88-Z (NET-52-192-0-0-1) NetType: Reallocated OriginAS: AS16509 Organization: Amazon Data Services Japan (AMAZO-49) RegDate: 2015-10-20 Updated: 2015-10-20 Ref: https://rdap.arin.net/registry/ip/52.192.0.0 OrgName: Amazon Data Services Japan OrgId: AMAZO-49 Address: 11F Shibuya Cross Tower Address: 2-15-1, Shibuya-ku Shibuya City: Tokyo StateProv: PostalCode: 150-0002 Country: JP RegDate: 2012-08-01 Updated: 2014-07-01 Comment: The activity you have detected originates from a dynamic hosting environment. Comment: For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse Comment: For more information regarding EC2 see: Comment: http://ec2.amazonaws.com/ Comment: All reports MUST include: Comment: * src IP Comment: * dest IP (your IP) Comment: * dest port Comment: * Accurate date/timestamp and timezone of activity Comment: * Intensity/frequency (short log extracts) Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time. Ref: https://rdap.arin.net/registry/entity/AMAZO-49 OrgAbuseHandle: AEA8-ARIN OrgAbuseName: Amazon EC2 Abuse OrgAbusePhone: +1-206-266-4064 OrgAbuseEmail: abuse@amazonaws.com OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN OrgNOCHandle: AANO1-ARIN OrgNOCName: Amazon AWS Network Operations OrgNOCPhone: +1-206-266-4064 OrgNOCEmail: amzn-noc-contact@amazon.com OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN OrgTechHandle: ANO24-ARIN OrgTechName: Amazon EC2 Network Operations OrgTechPhone: +1-206-266-4064 OrgTechEmail: amzn-noc-contact@amazon.com OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN # end # # ARIN WHOIS data and services are subject to the Terms of Use # available at: https://www.arin.net/resources/registry/whois/tou/ # # If you see inaccuracies in the results, please report at # https://www.arin.net/resources/registry/whois/inaccuracy_reporting/ # # Copyright 1997-2022, American Registry for Internet Numbers, Ltd. # $ ```

The above is the machine that has already been booted with ARCHISO, which is the target of this new installation, but there seems to be no problem on the local main machine on the same network.

local main machine: ``` $ curl -v -sL -o alis-master.zip https://github.com/picodotdev/alis/archive/refs/heads/master.zip * Trying 52.192.72.89:443... * Connected to github.com (52.192.72.89) port 443 (#0) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: none } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2459 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [79 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN: server accepted h2 * Server certificate: * subject: C=US; ST=California; L=San Francisco; O=GitHub, Inc.; CN=github.com * start date: Mar 15 00:00:00 2022 GMT * expire date: Mar 15 23:59:59 2023 GMT * subjectAltName: host "github.com" matched cert's "github.com" * issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 } [5 bytes data] * h2h3 [:method: GET] * h2h3 [:path: /picodotdev/alis/archive/refs/heads/master.zip] * h2h3 [:scheme: https] * h2h3 [:authority: github.com] * h2h3 [user-agent: curl/7.84.0] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x5571b6e1ff60) } [5 bytes data] > GET /picodotdev/alis/archive/refs/heads/master.zip HTTP/2 > Host: github.com > user-agent: curl/7.84.0 > accept: */* > { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/2 302 < server: GitHub.com < date: Fri, 01 Jul 2022 08:38:35 GMT < content-type: text/html; charset=utf-8 < vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With < permissions-policy: interest-cohort=() < location: https://codeload.github.com/picodotdev/alis/zip/refs/heads/master < cache-control: max-age=0, private < strict-transport-security: max-age=31536000; includeSubdomains; preload < x-frame-options: deny < x-content-type-options: nosniff < x-xss-protection: 0 < referrer-policy: no-referrer-when-downgrade < expect-ct: max-age=2592000, report-uri="https://api.github.com/_private/browser/errors" < content-security-policy: default-src 'none'; base-uri 'self'; block-all-mixed-content; child-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com objects-origin.githubusercontent.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com cdn.optimizely.com logx.optimizely.com/v1/events *.actions.githubusercontent.com wss://*.actions.githubusercontent.com online.visualstudio.com/api/v1/locations github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src render.githubusercontent.com viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: github.githubassets.com identicons.github.com github-cloud.s3.amazonaws.com secured-user-images.githubusercontent.com/ github-production-user-asset-6210df.s3.amazonaws.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; worker-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/ < content-length: 0 < x-github-request-id: 4B46:2AB2:1CFD1D:21368C:62BEB2E7 < { [0 bytes data] * Connection #0 to host github.com left intact * Issue another request to this URL: 'https://codeload.github.com/picodotdev/alis/zip/refs/heads/master' * Trying 52.68.31.213:443... * Connected to codeload.github.com (52.68.31.213) port 443 (#1) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: none } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2456 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [79 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN: server accepted h2 * Server certificate: * subject: C=US; ST=California; L=San Francisco; O=GitHub, Inc.; CN=*.github.com * start date: Mar 16 00:00:00 2022 GMT * expire date: Mar 16 23:59:59 2023 GMT * subjectAltName: host "codeload.github.com" matched cert's "*.github.com" * issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 } [5 bytes data] * h2h3 [:method: GET] * h2h3 [:path: /picodotdev/alis/zip/refs/heads/master] * h2h3 [:scheme: https] * h2h3 [:authority: codeload.github.com] * h2h3 [user-agent: curl/7.84.0] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x5571b6e1ff60) } [5 bytes data] > GET /picodotdev/alis/zip/refs/heads/master HTTP/2 > Host: codeload.github.com > user-agent: curl/7.84.0 > accept: */* > { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing { [5 bytes data] < HTTP/2 200 < access-control-allow-origin: https://render.githubusercontent.com < content-disposition: attachment; filename=alis-master.zip < content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox < content-type: application/zip < etag: "ba5f16ff7b5fab74631e84f924ef9d2514a0920d9b77ac524e33e3dcfc6c05a5" < strict-transport-security: max-age=31536000 < vary: Authorization,Accept-Encoding,Origin < x-content-type-options: nosniff < x-frame-options: deny < x-xss-protection: 1; mode=block < date: Fri, 01 Jul 2022 08:40:07 GMT < x-github-request-id: 3B4A:6B93:8806:13B21:62BEB2E7 < { [886 bytes data] * Connection #1 to host codeload.github.com left intact $ ```
tkna91 commented 2 years ago

Is it because ipv4 in ARCHISO is not enabled?

ip a: ``` # ip a 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp2s0: mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether xx:xx:xx:xx:xx:xx brd ff:ff:ff:ff:ff:ff inet6 xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxx/64 scope global temporary dynamic valid_lft 596536sec preferred_lft 77786sec inet6 xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/64 scope global temporary deprecated dynamic valid_lft 510488sec preferred_lft 0sec inet6 xxxx:xxxx:xxxx:xxxx:xxxx:xxx:xxxx:xxxx/64 scope global dynamic mngtmpaddr noprefixroute valid_lft 2591812sec preferred_lft 604612sec inet6 xxxx::xxxx:xxx:xxxx:xxxx/64 scope link valid_lft forever preferred_lft forever 4: wlan0: mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether xx:xx:xx:xx:xx:xx brd ff:ff:ff:ff:ff:ff inet6 xxxx::xxxx:xxxx:xxxx:xxxx/64 scope link valid_lft forever preferred_lft forever # ```
stevleibelt commented 2 years ago

The diff is pretty small between my logging and your logging is pretty small.

The curl version should not make any differences. Since the handshake does work, the timedate on your machine should work well too.
I've expected, that the ip address of github.com differs for us, thanks to load balancing features.
The transferred bytes is something I can not explain. But the zip file itself is around 6.8 MiB in size.

Currently, I am out of ideas :-(.

Diff of our two logs ```bash diff my_log.txt his_log.txt 1,2c1,2 < * Trying 140.82.121.3:443... < * Connected to github.com (140.82.121.3) port 443 (#0) --- > * Trying 52.192.72.89:443... > * Connected to github.com (52.192.72.89) port 443 (#0) 17c17 < { [78 bytes data] --- > { [79 bytes data] 40c40 < * h2h3 [user-agent: curl/7.83.1] --- > * h2h3 [user-agent: curl/7.84.0] 42c42 < * Using Stream ID: 1 (easy handle 0x562e2829ed70) --- > * Using Stream ID: 1 (easy handle 0x5571b6e1ff60) 46c46 < > user-agent: curl/7.83.1 --- > > user-agent: curl/7.84.0 48c48 < > --- > > 56c56 < < HTTP/2 302 --- > < HTTP/2 302 58c58 < < date: Thu, 30 Jun 2022 21:27:35 GMT --- > < date: Fri, 01 Jul 2022 08:38:35 GMT 72,73c72,73 < < x-github-request-id: A6F8:93A7:101D931:11496BD:62BE155E < < --- > < x-github-request-id: 4B46:2AB2:1CFD1D:21368C:62BEB2E7 > < 77,78c77,78 < * Trying 140.82.121.9:443... < * Connected to codeload.github.com (140.82.121.9) port 443 (#1) --- > * Trying 52.68.31.213:443... > * Connected to codeload.github.com (52.68.31.213) port 443 (#1) 116c116 < * h2h3 [user-agent: curl/7.83.1] --- > * h2h3 [user-agent: curl/7.84.0] 118c118 < * Using Stream ID: 1 (easy handle 0x562e2829ed70) --- > * Using Stream ID: 1 (easy handle 0x5571b6e1ff60) 122c122 < > user-agent: curl/7.83.1 --- > > user-agent: curl/7.84.0 124c124 < > --- > > 132c132 < < HTTP/2 200 --- > < HTTP/2 200 143,146c143,146 < < date: Thu, 30 Jun 2022 21:27:58 GMT < < x-github-request-id: 1759:F2A3:14B33F:1AB6F9:62BE155E < < < { [883 bytes data] --- > < date: Fri, 01 Jul 2022 08:40:07 GMT > < x-github-request-id: 3B4A:6B93:8806:13B21:62BEB2E7 > < > { [886 bytes data] ```

Edit

Ups sorry, I've compared the diffs of your working machine. Now I've found the Network is unreachable which could point to your IPv6 only mode.

stevleibelt commented 2 years ago

@tkna91 for your IPv4-Question, there is at least chance. Give IPv4 a try. I must admit, I don't use IPv6.

tkna91 commented 2 years ago

I deactivated the ipv4 fixed DHCP function on my home router, rebooted, and now ARCHISO's ipv4 is enabled and solved! @stevleibelt Thank you👍

# curl --verbose -sL https://raw.githubusercontent.com/picodotdev/alis/master/download.sh | bash
# echo $?
0
# ls -1
alis.conf
alis.sh
alis-asciinema.sh
..
#
stevleibelt commented 2 years ago

@tkna91, this is a great news!

It was a pleasure to take this journey with you. Have a great weekend!