Alien Pastures

My thoughts on Slackware, life and everything

OpenJDK updates (Slackware packages)

Last weekend I uploaded updates for OpenJDK based Java versions 8, 11 and 17, and added a new version 21 to the repository.
Specifically, my repository now offers:

  • openjdk (version 8): updated to 8u482_b08 for Slackware 15.0 and newer, using the icedtea 3.38.0 framework.
    Note: for OpenJDK 8, you need to install either the JDK or the JRE, not both (the JDK contains the JRE).
  • openjdk11: updated to 11.0.30_7.
  • openjdk17: updated to 17.0.18_8.
  • openjdk21: added 21.0.10_7.

All packages are for Slackware 15.0 and newer. Both 32bit and 64bit variants are offered.
Only install one version of Java!

Put your application inside a VPN jail

The premise

Note; political rant with European bias follows. If you don’t want to be exposed to my political views but still want to read the technical content of this article, simply skip the “Premise” and scroll down to “My data under my control”.

Looking at the rapidly deteriorating situation in the United States of America with disgust and shock, my prediction is that the soft approach to opposing Donald Trump’s hostile take-over of the country is going to fail horribly, and will result in the next fascist dictatorship within two years (mark my words).
Therefore I am withdrawing my data from the US based companies as much and as fast as I can. If you live outside the United States, the possibility that US-based companies may just cut-off access to your Cloud data when the Orange Clown instructs them to, is all to real.
It’s not just me; there is a real and irreversible push in the European Union to put an end to the imbalance and invest in a European open-source based Cloud infrastructure to rival the US companies that have gladly received our money for years and still can’t make hard commitments that they won’t apply the kill-switch when the Fascist-in-Chief demands it.

My data under my control

The desire to have more control over your own data is not new of course. Discussions about what that means on a wider scale are simply accelerated by current events.
You can already access a lot of detailed information on how to become independent of the big tech companies via my own series of blog articles called “Slackware Cloud Server“. I am researching two additional installments to that series: one about how to setup Joplin Server as an alternative to OneNote (Joplin can actually import OneNote files easily), and another one about how to setup a cheap-ish remote storage to make safe backups of all your locally stored data. Data to be stored inside Europe of course. More on that in due time.

A necessary step to move away from Google and friends was purchasing a Proton family account. The realization hit me a long while ago of course, that free services like GMail are only free because Google harvests, uses and sells your data that you store on their platform.
Proton on the other hand is a Swiss-based company with a focus on privacy. It costs money to use their services, yes, but the data you store with Proton will be secure and safe from those prying eyes.
If  you have not yet implemented my Slackware Cloud Server, then you are most likely subscribed to one or more Cloud-based streaming services like Netflix, HBO, AppleTV, Disney+ and so on – you pay when you determine you get your money’s worth. So I pay to get my data off Google, Microsoft and Dropbox servers.

VPN as a privacy tool

Looking at the services that come with a Proton account, I noticed that they offer a VPN service as part of the package. This reminded me of the importance to have a proper VPN installed. People who already live inside a dictatorship know that a VPN can be a lifeline to the free world, and my American friends: you will need that VPN too, soon!

I am not in favor of free VPN’s. Speeds are never great and you have no certainty or guarantee that the free VPN provider is not actually harvesting and selling your personal data.
Unless you yourself run the VPN server. At home I implemented an actual Virtual Private Network using Wireguard. WireGuard is a VPN protocol which is part of the Linux kernel and the user-space is a simple binary, controlled by simple configuration files. It connects my family’s laptops, phones and also the network infrastructure of our camper van to our home, combining all devices into a single network with one exit point towards the Internet which is here, at home.
This kind of VPN server is not meant to prevent other parties spying on you. Instead it is the type of VPN that securely connects devices (one server and many roaming clients) into a single ‘local’ network; the traditional interpretation of VPN. All devices inside the network can communicate with each other; this is how I can access my home automation even when I am out of the country in my camper van.

The VPN solution I want to discuss here, is of the other kind: the one that hides your activities from prying eyes. A privacy-enhancing tool.
This kind of VPN connection creates a tunnel between your local computer and one of many remote servers operated by a VPN provider. You can get a subscription from companies like NordVPN, PIA to name a few, or in my case: ProtonVPN. The VPN allows you to ‘go anonymous’ with the click of a button. Whatever information you access on the Internet through a VPN tunnel can never be traced back to you personally because your IP address is effectively hidden and replaced by the IP address of the VPN access point.

Installing the VPN client offered by any of these providers is trivial, applications offered for Linux, Windows, Android and iOS. The standard usage is also well-documented. It becomes more interesting when your use-case is more un-common.

This article shows how you can install a VPN (WireGuard in this case), place the VPN network interface inside a jail so that your Slackware computer does not even know it is there, and then add programs to that jail. The programs inside that network jail will be forced to access the internet through the VPN tunnel, they cannot circumvent the jail and therefore do not have access to your regular network connection. Your privacy-sensitive information will not be able leak out of your regular network connection. These jailed applications will still be able to communicate with local applications and services via the loopback interface.

Intrigued? Read on!

Put the VPN in a network jail

As a Slackware Linux user, text-based configuration files are always preferred over Graphical Users Interfaces, right 🙂

Obtain a WireGuard configuration

I downloaded the WireGuard configuration file that allows me to connect to the Proton VPN service from my own account’s dashboard. There’s documentation on how to do that.
The contents of this configuration file are really simple. All they describe are the characteristics of the two endpoints: yours (using a private key for encryption) and the remote server (identified by a public key and an IP address or hostname). The remote server in turn has a copy of your public key so that they can validate your identity:

PrivateKey = 2QLYsfx89Lpc24iBtZmygieXYwq1WZwPok8joqB/Fys=
Address = 10.2.0.2/32
DNS = 10.2.0.1

[Peer]
PublicKey = dOJQd38biobpWxq4wpF7mk2oUiJnjHZlDZ7s8X/z+xs=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = XXX.XXX.XXX.XXX:51820

The two key values are of course bogus. The “XXX.XXX.XXX.XXX” will be the IP address of the VPN server at the other end of the connection.

Move the Wireguard configuration file to ‘/etc/wireguard/proton0.conf‘.  You could now run the command “wg-quick up proton0” to activate the VPN interface but that has a potentially unwanted side effect if your computer is also a server. The ‘wg-quick‘ command installs a new default route forcing all your external traffic through the VPN tunnel.
If you run network services on that computer then your clients will be in for a world of hurt.

How to prevent that the ‘proton0‘ interface forces itself as the default route?

Tame the beast

To prevent ‘wg-quick‘ from overriding your default route and instead keep your physical network interface as your primary gateway always, you must modify the WireGuard configuration file that you just installed.
By default, wg-quick interprets the line “AllowedIPs = 0.0.0.0/0” as a trigger to automatically install a new default route through the VPN interface.

Modify the Configuration File

Open your configuration file  /etc/wireguard/proton0.conf and add the following line into the [Interface] section. This instructs wg-quick to bring up the interface and set the IP, but not touch the system routing table:

Table = off # This prevents the default route override

Save the file and now bring up the interface (using the name of the configuration file “proton0“as argument, this will also determine the name of the VPN interface):

# wg-quick up proton0

Verify your default route is still going via your physical interface:

# ip route show | grep default

You should see a line like this: default via <your_gateway_ip> dev eth0

Verify the ‘proton0‘ interface is active:

# wg show

And finally, verify that all other services that are running on your computer are still accessible.

Routing traffic through the VPN

Since we have disabled automatic routing, no traffic will go through the VPN by default. The question remains of course… how should I access and use this new VPN network interface?
There are as many ways as there are use-cases, but for the sake of this article we focus on a single use-case.
We want to route specific traffic through the ‘proton0‘ network interface while keeping ‘eth0‘ (or whatever your default network interface is named) as the default for everything else. More specifically, I want to be able to determine which application(s) should access the Internet exclusively via the VPN interface. We can do this and at the same time leave the main system completely untouched; no ‘iptables‘ or ‘fwmark‘ rules are required to create this separation. How?

We are going to use Network Namespaces (netns).

A Network Namespace gives us the power to place the VPN interface into a “jail.” Basically it creates a separate network stack which is isolated from the computer’s regular network stack. Applications launched inside this jail use the VPN, while everything else on your system continues to use the default gateway. Here are the steps to do just that.

  • Configure WireGuard to handle network isolation.
    The only manual modification that we need to make to ‘/etc/wireguard/proton0.conf‘ in order to prevent it from updating the computer’s routing table has already been shown higher up in the article: Add the line
    Table = off
    to the [Interface] section of the configuration file.
  • Create a boot script (since this is Slackware we call it a “rc script”) to create the VPN jail every time the computer boots.
    Save the following bash script as “/etc/rc.d/rc.protonvpn-jail” and make it executable via the command
    chmod +x /etc/rc.d/rc.protonvpn-jail
# --- 8< ---
#!/bin/bash
# Configuration of a VPN "jail"
NS_NAME="vpn_jail"
WG_CONF_PATH="/etc/wireguard/proton0.conf"
WG_IF="proton0"

if [[ $EUID -ne 0 ]]; then
  echo ">> This script must be run as root!"
  exit 1
fi

case "$1" in
  start)
    # Automatically find the IP address assigned by Proton
    echo "Extracting IP from $WG_CONF_PATH..."
    VPN_IP=$(grep -Po '(?<=^Address = )[^, \n]+' "$WG_CONF_PATH")
    echo "Extracting DNS resolver from $WG_CONF_PATH..."
    DNS_IP=$(grep -Po '(?<=^DNS = )[^, \n]+' "$WG_CONF_PATH")

    if [ -z "$VPN_IP" ]; then
      echo ">> Error: Could not find Address in $WG_CONF_PATH"
      exit 1
    fi

    echo "Starting VPN Jail for IP $VPN_IP..."

    # Create the network namespace
    ip netns add $NS_NAME

    # Setup a Kill-Switch (using nftables)
    ip netns exec $NS_NAME nft flush ruleset
    ip netns exec $NS_NAME nft add table inet filter
    ip netns exec $NS_NAME nft add chain inet filter output \
      { type filter hook output priority 0 \; policy drop \; }
    ip netns exec $NS_NAME nft add rule inet filter output oifname "lo" accept
    ip netns exec $NS_NAME nft add rule inet filter output oifname "$WG_IF" accept

    # Bring up WireGuard in the default namespace
    wg-quick up proton0

    # Move the interface into the jail and re-assign the IP (which was lost during move)
    ip link set $WG_IF netns $NS_NAME
    ip netns exec $NS_NAME ip addr add $VPN_IP dev $WG_IF

    # Bring the network link up (don't forget loopback!)
    # and configure the default route inside the jail
    ip netns exec $NS_NAME ip link set lo up
    ip netns exec $NS_NAME ip link set $WG_IF up
    ip netns exec $NS_NAME ip route add default dev $WG_IF

    # Configure a working DNS for the jail namespace
    mkdir -p /etc/netns/$NS_NAME
    echo "nameserver $DNS_IP" > /etc/netns/$NS_NAME/resolv.conf

    echo "VPN Jail is READY. IP: $VPN_IP"
    ;;

  stop)
    echo "Cleaning up VPN Jail..."
    ip netns del $NS_NAME
    # The interface moves back to default namespace on netns delete; shut it down
    wg-quick down proton0 2>/dev/null
    rm -rf /etc/netns/$NS_NAME
    echo "VPN Jail removed."
    ;;

  *)
    echo "Usage: $0 {start|stop}"
    exit 1
    ;;
esac
# --- 8< ---

Let’s quickly run through the script’s “start” section.

  • The script greps for the “Address =” line in our WireGuard configuration which makes it resistant against a future change in VPN provider or when Proton updates your local VPN endpoint IP address.
  • The IP address of the DNS resolver for the VPN connection is parsed in a similar fashion.
  • A new network namespace is created to serve as our VPN jail.
  • When you choose to run an application behind a VPN, you certainly need a “killswitch“.
    The script uses nftables to ensure that you regular network interface is firewalled from the applications that will run inside the jail. All traffic from the application to Internet will be cut as soon as the VPN interface goes down, so that the application is not suddenly exposing your regular Internet IP address to the whole world.
    How the Kill-Switch Works – A nftables rule sets a default “drop” policy for the output chain inside the jail. Then another nftables rule  only allows network traffic to leave either via the loopback interface (lo: for local inter-application communication) or the WireGuard interface (proton0). If the proton0 interface goes down or is deleted, there is no “accept” rule for any other path. Since the jail doesn’t even “see” your physical interface, the application will simply lose connectivity rather than falling back to your real IP.
  • The WireGuard interface is created and then moved into the jail.
  • After the move to the new namespace we re-associate the IP address of the interface that was stripped by the kernel. Moving an interface to a new namespace is like unplugging it from one stack and plugging it into another; the new namespace has no record of what the previous namespace had configured for the interface.
  • Then the script ensures that the interface is up even if it was previously down.
  • A DNS resolver is configured. We create the “resolv.conf” file in a subdirectory called “/etc/netns/vpn_jail“, because the Linux kernel will automatically bind that directory to /etc/ whenever commands are run inside the “vpn_jail” namespace. This ensures that your DNS queries inside the VPN jail are also routed through Proton VPN, preventing DNS leaks on your primary connection. It cannot get safer!

Add the boot script to Slackware

Add these lines to /etc/rc.d/rc.local :

if [ -x /etc/rc.d/rc.protonvpn-jail ]; then
  echo "Starting Proton VPN jail: /etc/rc.d/rc.protonvpn-jail start"
  /etc/rc.d/rc.protonvpn-jail start
fi

And add these following lines to /etc/rc.d/rc.local_shutdown (if that file does not exist yet, just create it and make it executable):

if [ -x /etc/rc.d/rc.protonvpn-jail ]; then
  echo "Stopping Proton VPN jail: /etc/rc.d/rc.protonvpn-jail stop"
  /etc/rc.d/rc.protonvpn-jail stop
fi

Configuring sudo

Our regular user account will be executing the “ip” command to run applications inside the VPN jail. Since usage of the Linux “ip” command is by default restricted to the root user, we need to create  a “sudoers” rule to allow your regular user account to execute it.

And to be able to launch graphical applications from a desktop shortcut without a prompt popping up to ask for your password, we will arrange for passwordless execution.
The danger when doing this carelessly is that the user can gain access to a root shell by abusing the “sudo” privilege elevation. Therefore we implement a secure wrapper that prevents a user from gaining root access via /sbin/ip netns exec.
As root, create a script that explicitly forces the transition back to the original user once inside the namespace. Call the script “/usr/local/bin/netns-proton” and give it the following content:

#!/bin/bash
# Usage: sudo netns-proton [args...]

NAMESPACE="vpn_jail"
COMMAND="$1"

if [ -z "$COMMAND" ]; then
  echo "Usage: $0   [args...]"
  exit 1
fi

# Remove command from argument list,
# leaving only the extra arguments
shift 1

# Execute inside the namespace,
# forcing a drop to the calling user.
# "$SUDO_USER" is an environment variable set by sudo.
/sbin/ip netns exec "$NAMESPACE" /usr/bin/sudo -u "$SUDO_USER" "$COMMAND" "$@"

Then make that script executable while ensuring that only root can edit it:

# chmod 755 /usr/local/bin/netns-proton

Next, configure sudo. Create a new file named “/etc/sudoers.d/vpn_jail” and add the following line (replace your_username with your actual username):

your_username ALL=(ALL) NOPASSWD: /usr/local/bin/netns-proton *
Using the wildcard * allows you to launch any command inside the namespace without a password. You should replace “your_username” with your own login name of course.

And it is safe: if you run “sudo /usr/local/bin/netns-proton bash“, the resulting shell will be restricted to your regular user permissions, even though it is inside the namespace. Your usage of sudo to enter a namespace is restricted to only the “vpn_jail”.

Quick Verification

You could reboot now, but you can also manually run

# /etc/rc.d/rc.protonvpn-jail start

as root, to create the VPN interface and the associated network jail. Then run the following command as your regular user to show the assigned IP inside the jail:

$ sudo /usr/local/bin/netns-proton ip addr show proton0

And finally, verify that the outside world sees a different IP address coming out of the VPN jail than your regular Internet IP address:

$ sudo /usr/local/bin/netns-proton curl http://myip.slackware.nl

Some trivial usage scenarios

You can now manually launch any application inside the VPN jail by prefixing it with the “sudo /usr/local/bin/netns-proton” command.

To run a web browser:

$ sudo /usr/local/bin/netns-proton firefox

To run a bash prompt inside the VPN jail:

$ sudo /usr/local/bin/netns-proton bash

A more complex usage scenario

A typical application you would want to put inside this VPN jail is a torrenting application. We’ll create a desktop shortcut for a VPN-jailed qBittorrent.
You can of course apply the below to any program but a torrent client can be used to demonstrate that the VPN connection actually works.

  • Copy the regular desktop file into your $HOME:
    $ cp -ia /usr/share/applications/org.qbittorrent.qBittorrent.desktop ~/.local/share/applications/
    and create a shortcut to this on your desktop backdrop. Name it “qBittorrent via VPN”. We will edit the copy, not the original:

    • Open the copied desktop file in an ascii editor and change the “Exec =” line into:
      Exec=sudo /usr/local/bin/netns-proton qbittorrent %U
  • Alternatively create a new file on your desktop directly.  Call it “qBittorrent via VPN”. This will create a file “~/.local/share/applications/qBittorrent via VPN.desktop” – then paste the following content into it:
[Desktop Entry]
Categories=Network;FileTransfer;P2P;Qt;
Comment=Launch qBittorrent inside the VPN Jail
# This uses sudo (permitted by the NOPASSWD rule) to exec in the jail
Exec=sudo /usr/local/bin/netns-proton qbittorrent %U
GenericName=BitTorrent client
Comment=Download and share files over BitTorrent
Icon=qbittorrent
MimeType=application/x-bittorrent;x-scheme-handler/magnet;
Name=qBittorrent
Terminal=false
Type=Application
StartupNotify=false
StartupWMClass=qbittorrent
Keywords=bittorrent;torrent;magnet;download;p2p;
SingleMainWindow=true

Depending on the Desktop Environment , you make have to make this desktop file executable to allow for application-startup via a double-click.

Double-clicking the icon will launch the qBittorrent application inside the isolated network namespace. It’s usage is safe because it will communicate through the VPN and is secured by the built-in “kill-switch” against any accidental exposure.

You can verify that your Torrent client accesses the internet via your VPN:
Open https://ipleak.net/ in your browser (no VPN needed), scroll down to “Torrent Address Detection”, copy the Magnet link that appears there into your qBittorrent application and watch the ipleak page for connection confirmation.
Then bring the VPN down via:

# /etc/rc.d/rc.protonvpn-jail stop

and you should see an immediate loss of connectivity for the qBittorrent program.

Summarizing

I hope this helps keeping you safe 🙂

Ktown updates: KDE Frameworks and Gear (PIM & Applications)

Today KDE Frameworks 6.22.0 were released, and yesterday we already saw new KDE Gear 25.12.1 tarballs.
Note – in ‘ktown’ you will find that KDE Gear packages are split over ‘kdepim’ and ‘applications’.

I built new packages for those new sources and now you can get the packages for 32bit and 64bit Slackware from the original server: https://slackware.nl/alien-kde/current/testing/ or else from one of its mirrors.
For US folk, this one already has all the new packages: https://us.slackware.nl/alien-kde/current/testing/ .

You can download the sources from https://slackware.nl/alien-kde/source/testing/ and if you want to track the changes in git, go visit https://git.slackware.nl/ktown/log/?h=6_26.01

Have fun! Eric

KDE Plasma 6_25.12 for Slackware-current

A couple of days ago, I promised to use my holiday to come up with packages for KDE Plasma6.
Today I finished compiling packages for 32bit and 64bit Slackware-current and uploaded a fresh package repository to my ‘ktown‘. The name seems to stick with people, even when it has not seen activity for two years, so I will keep calling it ‘ktown‘.

You will find these packages at the origin location: https://slackware.nl/alien-kde/current/testing/ together with an expansive README which will help you remove KDE Plasma5 from your Slackware-current computer and install the ‘ktown‘ version of KDE Plasma6 instead.

I just went through the process and this is the first time that I am actually running and using KDE Plasma6 on my production laptop:

I did not have to remove any kind of configuration from $HOME and merely had to delete a couple of obsoleted system tray elements.

I also switched to Wayland instead of X11 and to be honest, that is working better than expected and even better than the good old X11 session. For instance, suddenly I can play 4K video in VLC without stuttering. And the laptop’s  Synaptics touchpad was not found at all in the X11 session (must be a bug because I had been using it for 9 years in Slackware KDE)… while it works perfectly in the Wayland session.
The thing that I miss is the Latte Dock which was dropped from KDE Plasma. Having these MacOS-like ballooning application launcher icons floating at the bottom of my screen always impressed my friends, but it was also extremely powerful in the way I could manage my favorite applications. In Plasma6 I created an auto-hiding QuickLaunch panel at the bottom of the screen but it looks dull compared with the Latte Dock. Shame.

My intention is to keep this new Plasma6 package repository in a ‘testing‘ state as reflected in the repository URL. I expect that there’s stuff that does not work as it should and I would like you all to help in testing and stabilizing the packages. When KDE Gear 26.04 releases in April 2026 I expect that the few remaining Qt5 based KDE applications will finally have been ported to Qt6. By that time, I want to promote the repository from ‘testing‘ to ‘latest‘ and that will then reflect in the repository URL.

If you would look at the content behind the ‘latest‘ repository right now (https://slackware.nl/alien-kde/current/latest/) you will see that it is pointing to a single left-over package for KDE Plasma5 (Slackware 15.0): ‘phonon-vlc‘, a backend for Phonon that requires VLC media player. By the way, I renamed that package to ‘phonon-backend-vlc‘ for Plasma6 to be in line with the Slackware naming convention for these backends.
In April 2026 that repository will get a new  ‘stable’ URL to reflect that it is meant for the stable release of Slackware.

If you want to peek at the source code management, I track everything in a git repository. You will find the 6_25.12 branch at: https://git.slackware.nl/ktown/
A word of thanks to LuckyCyborg who maintained a fork of my ‘ktown‘ during 2024/2025. He never contacted me about this but I was made aware of his activities. I checked out his scripts last week and there were some improvements he came up with that I have incorporated into my own sources. See the git commit message for more details.

I suggest that you try these Plasma6 packages out yourselves! Please leave your feedback in the comments section below.

Enjoy the end-of-year festivities and all the best for 2026! Let’s hope that Slackware merges Plasma6 before the end of 2026.
Cheers, Eric

Enjoy the holidays!

We’re at that unique time of the year that I can work on something that is not trivial and requires long-term focus to succeed.
The festive season is upon us all, which means (not counting family diners and birthday parties) that I have two weeks to revisit all those ideas and plans I cooked up in 2025 and finish as many of them as possible. Otherwise it’s simply waiting for the next Christmas holiday to continue.

 

So what’s brewing in December 2025? To start with, a lot of paint jobs here in the house that are waiting since May when we finished going through a home renovation.

But I am also working on the resurrection of KDE Plasma6 for Slackware-current. Two years ago after releasing a Beta version of Plasma6 as a live ISO image, life took another turn and Plasma6 moved to the TODO list. I wrote about that period on some occasions.
But I think (or at least hope) that having a Plasma6 ktown out in the open and available for testing, will nudge Patrick into merging this into Slackware-current eventually. I’d rather have him focus on the other stuff that blocks a release, since I’ve shown and proven that I can maintain a ‘ktown’ out-of-tree.
Patrick and I discussed it, he sounds interested, not saying it is going to happen, but no risk, no reward, right? I promised that I would maintain a Plasma6 ktown during 2026 but not after. I got burnt with Plasma5 years ago, not going to repeat that. Ideally i’ll keep it going until that time that Plasma6 replaces the ageing Plasma5 in -current in 2026. And if it does not happen, someone else can copy my ‘ktown’ sources and continue from there.

I have a working Plasma6 and I’m now fine-tuning the scripts (I want everything to be built correctly, using the right dependencies) and will update my server’s ‘ktown’ package and source repository and also the git repository on https://git.slackware.nl/ktown once I am satisfied with the results.

Until that time, all you get is a screenshot.

Enjoy the holidays! Be safe and be there for your family and friends.

Eric

« Older posts

© 2026 Alien Pastures

Theme by Anders NorenUp ↑