Scheduled Maintenance: We are aware of an issue with Google, AOL, and Yahoo services as email providers which are blocking new registrations. We are trying to fix the issue and we have several internal and external support tickets in process to resolve the issue. Please see: viewtopic.php?t=158230
You're wrong to think of this as a version upgrade. It's just part of a continuous process of serious bug fixing and security updates. I've been using Stretch since about 2 weeks before its official release, and I've never used dist-upgrade. Whenever the update notifier informs me that updates are available I use 'apt update' and 'apt upgrade', and it now reports itself as version 9.2.
russel@NUC-G:~$ inxi -r
Repos: Active apt sources in file: /etc/apt/sources.list
deb http://deb.debian.org/debian/ stretch main
deb http://deb.debian.org/debian/ stretch-updates main
deb http://security.debian.org/ stretch/updates main
As a special case for this point release, those using the "apt-get" tool
to perform the upgrade will need to ensure that the "dist-upgrade"
command is used, in order to update to the latest kernel packages. Users
of other tools such as "apt" and "aptitude" should use the "upgrade"
command.
Miscellaneous Bugfixes
----------------------
Due to an oversight while preparing the point release, the usual
update to the "base-files" package to reflect the new version was
unfortunately not included. An updated package will be made available
via "stretch-updates" in the near future.
This has been fixed according to another post in this forum. Just upgrade (or dist-upgrade if using apt-get) again.
“ computer users can be divided into 2 categories:
Those who have lost data
...and those who have not lost data YET ”Remember toBACKUP!
$ inxi -r
Repos: Active apt sources in file: /etc/apt/sources.list
deb http://ftp.ca.debian.org/debian stretch main contrib non-free
deb-src http://ftp.ca.debian.org/debian stretch main contrib non-free
deb http://security.debian.org/debian-security stretch/updates main contrib non-free
deb-src http://security.debian.org/debian-security stretch/updates main contrib non-free
deb http://ftp.debian.org/debian stretch-backports main
deb http://ftp.ca.debian.org/debian stretch-updates main contrib non-free
deb src http://ftp.ca.debian.org/debian stretch-updates main contrib non-free
Preparing to unpack .../base-files_9.9+deb9u2_amd64.deb ...
Unpacking base-files (9.9+deb9u2) over (9.9+deb9u1) ...
Setting up base-files (9.9+deb9u2) ...
Installing new version of config file /etc/debian_version ...
Processing triggers for install-info (6.3.0.dfsg.1-1+b2) ...
What worked for me was this:
apt-get -t stretch-updates update && apt-get -t stretch-updates dist-upgrade
Two packages, "base-files" and "tzdata", were then listed to upgrade.
If instead I typed:
apt-get -t stretch-updates update && apt-get -t stretch-updates dist-upgrade base-files
only "base-files" would be upgraded, which changes version 9.1 to 9.2.
"base-files" selected (9.9+deb9u2) over (9.9+deb9u1)
cat /etc/debian_version
9.2
I have both "stretch-updates" and "stretch-backports" listed separately in the searches.list
file. Also in the Security section I list "stretch/updates" to make sure they are always updated.
Looks like with this upgrade "base-files" was not part of security packages??