Labels

Android (1) Apache (1) bash (2) boost (2) C (34) C++ (2) cheatsheet (2) CLion (6) css (3) Debian (33) DL (17) Docker (2) Dreamweaver (2) Eclipse (3) fail2ban (5) git (6) GitHub (5) Hacking (3) html (8) http (1) iOS (1) iPad (1) IRC (1) Java (33) javascript (3) Linux (174) Mac (20) Machine Learning (1) mySQL (51) Netbeans (5) Networking (1) Nexus (1) OpenVMS (6) Oracle (2) Pandas (3) php (17) Postgresql (8) Python (9) raid (1) RedHat (14) Samba (2) Slackware (50) SQL (14) svn (1) tar (1) ThinkPad (1) Virtualbox (3) Visual Basic (2) Visual Studio (1) Windows (2)

Monday, 25 November 2024

Issue with slackpkg and gpg key

I found an issue while using slackpkg where the following error presented itself:

ERROR: Verification of the  gpg signature on CHECKSUMS.md5
               failed! This could mean that the file is out of date
               or has been tampered with. If you use mirrors.slackware.com
               as your mirror, this could also mean that the mirror to
               which you got redirected is not yet updated with the most
               recent changes in the Slackware tree.

Tuesday, 19 November 2024

An alternative way to use wget

Normally wget works as expected but every now and then, you page is forbidden or similar, so the below is an alternative approach;

Monday, 4 November 2024

Import certificate into Java keystore

The below example involves importing a Zscaler root CA certificate into the java keystore on my Slackware installation.

1) General installation.

The certificate can be acquired from here and should be placed in /etc/ssl/certs/Zscaler-Dalzell.crt and also in /usr/local/share/ca-certificates/Zscaler-Dalzell.crt

then do sudo update-ca-certificates which regenerates /etc/ssl/certs/ca-certificates.crt

NOTE: It is important that the extension is crt and not cer as update-ca-certificates only uses crt.

To verify, run: openssl verify -CAfile /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/Zscaler-Dalzell.crt
which should look like: /etc/ssl/certs/Zscaler-Dalzell.crt: OK

Update: 17-Feb-2026

I've found that the combined certificate seems to work better, while adding the Zscaler-Dalzell.cer to /etc/ssl/certs/Zscaler-Dalzell.cer seems to allow browsing to an extent and the use of my check4updates, it does not for example, allow for the installation of the Zoho unattended access daemon. The combined file is in my GISTS and should be placed in /usr/local/share/ca-certificates/Zscaler-Dalzell.crt (note the CRT extension), then run update-ca-certificates

2) Java Specific

sudo keytool -import -trustcacerts -alias zscaler -file /etc/ssl/certs/Zscaler-Dalzell.crt -keystore /opt/jdk1.8.0_341/jre/lib/security/cacerts

Note: The destination, in this case '/opt/jdk1.8.0_341/jre/lib/security/cacerts' could quite equally point to a local installation, such as '/home/some_user//some_application/jre/lib/security/cacerts'