So I'll go through proxy
But an error occurs
Same error?
[root@Centos ~]# yum update
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
YumRepo Error: All mirror URLs are not using ftp, http or file.
Eg. $releasever is not a valid and current release or hasnt been released yet/
removing mirrorlist with no valid mirrors: /var/cache/yum/x86_64/$releasever/base/mirrorlist.txt
Error: Cannot find a valid baseurl for repo: base
Can you try to disable fastestmirror?
[main]
enabled=0
verbose=0
always_print_best_host = true
socket_timeout=3
# Relative paths are relative to the cachedir (and so works for users as well
# as root).
hostfilepath=timedhosts.txt
maxhostfileage=10
maxthreads=15
#exclude=.gov, facebook
#include_only=.nl,.de,.uk,.ie
~
yum update
YumRepo Error: All mirror URLs are not using ftp, http or file.
Eg. $releasever is not a valid and current release or hasnt been released yet/
removing mirrorlist with no valid mirrors: /var/cache/yum/x86_64/$releasever/base/mirrorlist.txt
Error: Cannot retrieve repository metadata (repomd.xml) for repository: base. Please verify its path and try again
Thanks very much for guide
problem solved
The problem was DVD!...
Is there a way to password to be entered in the proxy encryption ?
Hey mnnn,
van you explain the problem with the DVD?
As I know there is no security measure for that.
Maybe protect the yum.conf for read by all others.
Regards,
xabbu
Hi xabbu
Yes . But when another place with other dvd centos . This problem didnt occurre
That realy noway to protect password in this file?!
If there noway everyone see the monitor the read the user & password proxy
Hi mnnn,
no there is no other way to protect the file.
But yum is running as root so no one else need to read the file.
protect it with
chmod 640 /etc/yum.conf
chown root:root /etc/yum.conf
So only root and members of the group root are able to read the file.
and yum is working.
If you use
sudo
for running yum so you can also protect it, so that the normal user with sudo rights is not able to read the yum.conf.
I think it is not a security problem.
We are using in our company and no normal user is able to read it.
Regards,
xabbu