Google appears to update it’s SSL cert nightly which breaks my fetch mail script nightly as well. Here’s a simple python script in case this happens to you!
addr = 'imap.gmail.com'
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
wrappedSocket = ssl.wrap_socket(sock)
response = False
der_cert_bin = wrappedSocket.getpeercert(True)
pem_cert = ssl.DER_cert_to_PEM_cert(wrappedSocket.getpeercert(True))
thumb_md5 = hashlib.md5(der_cert_bin).hexdigest()
#print("MD5: " + thumb_md5)
cnt = 0
thumb_md5_d = ''
for letter in thumb_md5:
if cnt%2 == 0 and cnt!=0:
thumb_md5_d += ':'
thumb_md5_d += letter
cnt += 1
thumb_md5_d = thumb_md5_d.upper()
infile = "//home//user//fetchmailrc.tmp"
text = open(infile)
outfile = open('/etc/fetchmailrc', 'w')
textToSearch = 'GOOGLE_FINGERPRINT'
for line in text:
if textToSearch in line:
line = line.replace( textToSearch, thumb_md5_d )
Where fetchmailrc.tmp is this (in addition to whatever else in your fetchmailrc):
poll imap.gmail.com protocol IMAP user "firstname.lastname@example.org" there with password "password" is email@example.com here nofetchall ssl sslfingerprint 'GOOGLE_FINGERPRINT'
Then you setup a cron job to run it nightly and now you’ve got up to date Google fingerprints!
I just serve to repost Economist articles perhaps. Here’s one about the recent amazing cabinet meeting, comparisons to King Leer, and how this really is so pathetic compared to Shakespearean tragedy. Nice quote at the end:
The fact that Mr Trump is a smaller, shallower figure than most Shakespearean heroes (or villains, come to that) makes the craven behaviour of his cabinet secretaries and other Republican enablers even harder to explain. Unlike courtiers in a Jacobean tragedy, they risk neither execution nor banishment. No invading army or witches’ curse impels so many members of Team Trump to sell their reputations and dignity cheap: merely ambition, and the comforting fiction that they are indispensable. Serving Mr Trump is a modest test of character, by Shakespearean standards. It is one which too many underlings are failing.
I just find this quote interesting – horses used to be much more respected and appreciated. After the Battle of Waterloo some survivor horses were brought to retirement and the king’s surgeon saw this:
“One morning…the surgeon saw the 12 horses form a line, shoulder to shoulder, then, without a cue, charge forward at a gallop. After a few strides they spun and retreated as formally as in a drill.” Each day, he watched as “his old cavalry horses, flecked white where their coats had grown back over their scars, enacted this enigmatic ritual and went to war together once more in the cool green parkland of the Home Counties.”
From the Economist article about 2 horse books which is an interesting read as well. We toss many a thing off. The article even gets a quick in if, with AI/robots, we’re now making ourselves as obsolete as we made horses.
Somehow a Debian update broke bfs and I was getting this issue:
The ZFS modules are not loaded.
Try running '/sbin/modprobe zfs' as root to load them.
To reinstall ZFS this worked for me – a compilation of many suggestions so not sure all were necessary but it worked:
apt-get purge zfs* --get rid of everything ZFS
apt-get remove spl dkms spl-dkms --get rid of more ZFS
apt-get install -t jessie-backports zfsutils-linux --change to whatever your distribution uses
--these commands recompile the libraries if they are still having issues
dkms remove -m zfs -v 0.6.5.9 --all
dkms remove -m spl -v 0.6.5.9 --all
dkms add -m spl -v 0.6.5.9
dkms add -m zfs -v 0.6.5.9
dkms install -m spl -v 0.6.5.9
dkms install -m zfs -v 0.6.5.9
A couple of handy sites for getting that setup:
Your own IPSEC VPN in about 3 minutes using Digital Ocean
And this debian one for support.
Couple of notes that the script didn’t cover:
- Instead of openswan had to use strongswan.
- Had to add a shared secret to /etc/ipsec.secrets
- To use a proxy you just point the proxy to listen on 172.16.1.1 and point the computer to that proxy’s port
The script he had is the key so it’s here for posterity:
apt-get install -y openswan xl2tpd ppp
apt-get install -y lsof
iptables --table nat --append POSTROUTING --jump MASQUERADE
echo "net.ipv4.ip_forward = 1" | tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.accept_redirects = 0" | tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.send_redirects = 0" | tee -a /etc/sysctl.conf
for vpn in /proc/sys/net/ipv4/conf/*; do echo 0 > $vpn/accept_redirects; echo 0 > $vpn/send_redirects; done
echo "for vpn in /proc/sys/net/ipv4/conf/*; do echo 0 > $vpn/accept_redirects; echo 0 > $vpn/send_redirects; done" | tee -a /etc/rc.local
echo "iptables --table nat --append POSTROUTING --jump MASQUERADE" | tee -a /etc/rc.local
echo "config setup
#in what directory should things started by setup (notably the Pluto daemon) be allowed to dump core?
#whether to accept/offer to support NAT (NAPT, also known as "IP Masqurade") workaround for IPsec
#contains the networks that are allowed as subnet= for the remote client. In other words, the address ranges that may live behind a NAT router through which a client connects.
#decide which protocol stack is going to be used.
#shared secret. Use rsasig for certificates.
#start at boot
#Only negotiate a conn. 3 times.
#because we use l2tp as tunnel protocol
#fill in server IP above
rightprotoport=17/%any" > /etc/ipsec.conf
ipsec saref = yes
ip range = 172.16.1.30-172.16.1.100
local ip = 172.16.1.1
refuse pap = yes
require authentication = yes
ppp debug = yes
pppoptfile = /etc/ppp/options.xl2tpd
length bit = yes" > /etc/xl2tpd/xl2tpd.conf
lcp-echo-failure 4" > /etc/ppp/options.xl2tpd
echo "# username l2tpd password *" >> /etc/ppp/chap-secrets
echo "To Do:"
echo "- Add users: /etc/ppp/chap-secrets"
echo "Restart the software: /etc/init.d/ipsec restart; /etc/init.d/xl2tpd restart"