[ / / / / / / / / / / / / / ] [ dir / dox / flags / sapphic ]

/slackware/ - Slackware Linux

#slackware@irc.rizon.net

Catalog

Winner of the 39th Attention-Hungry Games
/vg/ - Generally vidya but no longer only vidya generals
Name
Email
Subject
Comment *
File *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


File: 5be47f5cf7f28af⋯.png (14.4 KB, 109x108, 109:108, slackware.png)

 No.1[Reply]

This is a board for #slackware@irc.rizon.net

That is an IRC Channel hosted by Rizon. You can connect to it with an IRC Client, such as BitchX, HexChat, Pidgin, AdiIRC, WeeChat, Irssi, EPIC or mIRC (Windows).

The IRC Server is Rizon (irc.rizon.net) and the channel is #slackware (once connected, /join #slackware).

More details here: https://wiki.rizon.net/index.php?title=Servers

Post last edited at


File: 56d0bda2528dd2f⋯.png (87.03 KB, 640x480, 4:3, umatrix.png)

 No.14[Reply]

I use the Pale Moon Browser, and some time after updating to version 27.9.1 I got a warning about NoScript. I should have taken a screenshot, but now NoScript has been uninstalled. You can read more information here: https://forum.palemoon.org/viewtopic.php?f=46&t=17619&sid=c7f6d33ac4abb02a3344d2b17b5bfbb5

So keeping just uBlock Origin + hosts file (https://pgl.yoyo.org/adservers/) internet filtering wasn't enough for me. Javascript is a real pain, not as much as Adobe Flash (I know they're different), but I dislike both because of security issues.

I decided to look around and I found uMatrix (http://addons.palemoon.org/incompatible/ recommends version 1.1.4) from the same developer of uBlock Origin, and it is awesome.

Check this tutorial: https://www.electricmonk.nl/docs/umatrix_tutorial/umatrix_tutorial.html

uMatrix Wiki: https://github.com/gorhill/uMatrix/wiki

Various Links:

https://github.com/gorhill/uMatrix

https://addons.mozilla.org/en-US/firefox/addon/umatrix/

https://www.ghacks.net/2017/11/28/a-umatrix-guide-for-firefox/

It might take some time to get used to it, but it's worth learning.

The gHacks guide above recommends disabliPost too long. Click here to view the full text.



File: e459887426a4d27⋯.png (69.61 KB, 1920x1057, 1920:1057, slackpkg.png)

 No.13[Reply]

There are two commands that I use to update Slackware 14.2 packages on Stable.

First: $ sudo /usr/sbin/slackpkg update

Second: $ sudo /usr/sbin/slackpkg upgrade-all

The "update" will download the latest package lists from a Slackware mirror selected in /etc/slackpkg/mirrors.

The "upgrade-all" will prompt which packages will be updated, and the user can select/deselect at will.

This method will not install non existent packages, neither will it upgrade your installation to Current. Check slackpkg's man page for more information.

A few important things to notice:

1. To use sudo, you need to add your username to /etc/sudoers like this (you have to edit as root):

##

## User privilege specification

##

root ALL=(ALL) ALL

myusername ALL=(ALL) ALL

If you don't know your username, try: $ id

2. Read the files in /etc/slackpkg. They contain important information on how to configure slackpkg, selecting a mirror (you need only one) and blacklisting packages.

Post last edited at


File: 2e9c0305dc5f5fb⋯.png (162.25 KB, 807x799, 807:799, mkinitrd.png)

 No.12[Reply]

I'll explain here how I upgrade my kernel, using the official upgrade packages for Slackware 14.2. I used to upgrade my monolithic kernel using the ones provided by kernel.org, but some things always broke in one way or another, so I've been using only the official Slackware kernel upgrades now.

Before I begin, a few important things to consider:

I'll be focusing on an initrd kernel here. If you want a monolithic one, don't make an initrd, create the symbolic links to the proper *huge* kernel in /boot, edit /etc/lilo.conf properly and don't forget to run lilo.

Do not upgrade your kernel if you're unable to reboot as soon as possible, unless you're running a monolithic (non initrd) kernel. The reason for this is that once you upgrade, the old kernel modules are gone and a initrd kernel (loaded in memory) might request them and they won't be found, because you upgraded to a newer version. That breaks things, so unless you're using a monolithic kernel, reboot the new kernel once the upgrade procedures are done.

It's recommended that you use an initrd instead of a monolithic kernel. You can read more here: https://www.distributednetworks.com/configure-key-linux-components/module2/modular-monolithic-kernels.php

Make sure you haven't blacklisted the kernel packages in /etc/slackpkg/blacklist. If you have, slackpkg will not upgrade the kernel packages at all.

# /usr/share/mkinitrd/mkinitrd_command_generator.sh –longhelp, because it has useful information.

Also read /usr/doc/mkinitrd-1.4.10/README.initrd

I'll be using lilo, not grub.

Let's begin:Post too long. Click here to view the full text.

Post last edited at


File: 21a0a08a936a090⋯.png (36.35 KB, 556x555, 556:555, current_changelog.png)

 No.3[Reply]

There has been a massive ChangeLog.txt update for Slackware Current.

Patrick explains the changes there.

Have fun!

http://slackware.mirrors.tds.net/slackware/slackware-current/ChangeLog.txt

 No.4

I can smell 15.0.


 No.5

>>4

I hope it's close.


 No.11

Slack 15 pls pls pls




File: 73e1e39e1ddb76f⋯.png (5.97 KB, 599x108, 599:108, iptables.png)

 No.10[Reply]

As promised, here is the IPTables script that I use.

It's designed to block internet connections while the VPN is disabled.

I've made some modifications of my own.

In /etc/rc.d/rc.inet2 there is a section left for rc.firewall where you can enable it.

I hid the –dport on purpose.

There is also /usr/doc/openvpn-2.4.6/sample-config-files/firewall.sh, for those that have upgraded to OpenVPN 2.4.6 and want a sample IPTables that's specific for OpenVPN.

Source: https://linuxconfig.org/how-to-create-a-vpn-killswitch-using-iptables-on-linux

$ cat /etc/rc.d/rc.firewall

#!/bin/sh

# Base Rules

# Before you configure iptables to allow any traffic you need to switch its default to disallow all traffic. Add these three rules to drop all traffic by default.

/usr/sbin/iptables -P INPUT DROP

/usr/sbin/iptables -P FORWARD DROP

/usr/sbin/iptables -P OUTPUT DROP

# Input

# It's most secure to only allow inbound traffic from established or related connections. Set that up next.

/usr/sbin/iptables -A INPUT -m conntrack –ctstate RELATED,ESTABLISHED -j ACCEPT

# Loopback and Ping

# Next, allow the loopback interface and ping.

# This assumes that your VPN connection is on tun0. Check that with ip a, if you're not sure.

/usr/sbin/iptables -A OUTPUT -o lo -j ACCEPT

/usr/sbin/iptables -A OUTPUT -o -tun0 -p icmp -j ACCEPT

#Post too long. Click here to view the full text.

Post last edited at


File: 59b3deeb67b3c01⋯.png (12.87 KB, 693x189, 11:3, openvpn.png)

 No.9[Reply]

Slackware Current and Stable OpenVPN packages have been upgraded to version 2.4.6.

This has brought issues not because of OpenVPN itself, but /etc/rc.d/rc.openvpn has changed and I had to adapt.

After the upgrade, I noticed that the OpenVPN process was closing somehow, and I would be "disconnected" from the internet. "Disconnected" because I have IPTables rules in place that only allow access to the internet through the VPN.

I triple checked the VPN .conf files and nothing worked. Next thing was to check if anything appeared in /var/log/, and indeed /var/log/syslog gave some clues:

Apr 28 00:01:29 compass openvpn[17181]: Error opening 'Auth' auth file: /etc/openvpn/credentials.txt: Permission denied (errno=13)

Apr 28 00:01:29 compass openvpn[17181]: ERROR: Linux route delete command failed: external program exited with error status: 2

Apr 28 00:01:29 compass last message repeated 3 times

Apr 28 00:01:29 compass openvpn[17181]: Linux ip addr del failed: external program exited with error status: 2

Apr 28 07:24:14 compass openvpn[15891]: WARNING: file '/etc/openvpn/credentials.txt' is group or others accessible

Apr 28 07:24:14 compass openvpn[15892]: WARNING: you are using user/group/chroot/setcon without persist-tun – this may cause restarts to fail

Apr 28 07:24:14 compass openvpn[15892]: WARNING: you are using user/group/chroot/setcon without persist-key – this may cause restarts to fail

Apr 28 07:24:15 compass openvpn[15892]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1570'

Apr 28 07:24:15 compass openvpn[15892]: WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-128-CBC'

Apr 28 07:24:15 compass openvpn[15892]: WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA256'

Apr 28 07:24:15 compass openvpn[15892]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize Post too long. Click here to view the full text.

Post last edited at


File: 206344302a8582e⋯.png (31.21 KB, 558x608, 279:304, pulseaudio.png)

 No.8[Reply]

So Patrick has decided to create extra/pure-alsa-system for those who have issues with PulseAudio, and prefer alsa instead.

Check the Slackware Current ChangeLog.txt below for more, but the screenshot is complete.

http://slackware.mirrors.tds.net/slackware/slackware-current/ChangeLog.txt



File: d449b4e5d2623b6⋯.png (25.91 KB, 1920x1057, 1920:1057, screen.png)

 No.7[Reply]

This is the .screenrc I currently use for GNU Screen.

With it you can change windows by using the Function Keys on your keyboard (F1, F2 and so on).

To use it, just place the file in your $HOME and you're set. If you already have a $HOME/.screenrc, make a backup first just in case.

The screenshot differs from the .screenrc by the way.

OK, this is stupid. 8ch is maybe parsing the text and eating characters along the way. Use the link below.

https://pastebin.ca/4018383

Post last edited at


File: c9817ddf79f2587⋯.png (6.92 KB, 1732x76, 433:19, xterm_man_page.png)

 No.6[Reply]

Here is how to copy/paste text to and from xterm.

First you need to enable "Select to Clipboard" in the VT Options menu. You can do so by holding Ctrl + Middle Mouse/Scroll button inside xterm. If you don't have the Middle Mouse/Scroll button but have it emulated by pressing both the Left + Right mouse buttons simultaneously, it should also work.

Once that is done, you can paste text you just copied (from Firefox for example) to xterm using Shift + Insert.

To paste text from xterm to Firefox, all you need to do is to select the text in xterm (use the Left Mouse button) and then paste (Ctrl + v) as you normally would in Firefox.

You can also use the Middle Mouse/Scroll button to paste text that you copied from xterm to itself. So you could copy text in xterm (select the text using the Left Mouse button) then paste using the Middle Mouse/Scroll button, or use Shift + Insert.

Don't forget to check the other xterm options, by holding Ctrl then using either the Left/Right/Middle Mouse buttons. There are quite a lot of options to the different menus.

Post last edited at


File: 49f804095b24b88⋯.png (15.01 KB, 1916x65, 1916:65, ps1.png)

 No.2[Reply]

My PS1.

To set it, do in a console/terminal:

1. Make a backup of your current PS1: echo $PS1

Save the text somewhere, or just open a new terminal emulator and do it there. It won't be saved.

2. export PS1='\[\e[m\n\e[1;30m\][$$:$PPID \j:\!\[\e[1;30m\]]\[\e[0;36m\] \[\e[1;30m\][\e[0;36m\]\@ \d\[\e[1;30m] \[\e[1;30m\][\[\e[1;34m\]\u@\H\[\e[1;30m\]:\[\e[0;37m\]${SSH_TTY} \[\e[0;32m\]+${SHLVL}\[\e[1;30m\]] \[\e[1;37m\]\w\[\e[0;37m\] \n($SHLVL:\!)\$ '

Feel free to also share yours!



Delete Post [ ]
[]
Previous [1] Next | Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / dox / flags / sapphic ]