Solved

Archive contains obsolescent base-64 headers AND This does not look like a tar archive...

Posted on 2004-08-10
3
2,808 Views
Last Modified: 2011-09-20
Hello.  

I tried to extract a set of binaries:

       wget http://www.vips.ecs.soton.ac.uk/vips-7.6/vips-7.6.5-x86-linux-glibc2.1.tar.gz
       tar -xvf vips-7.6.5-x86-linux-glibc2.1.tar.gz

The wget part worked but the extraction gave me the following errors:

     tar: This does not look like a tar archive
     tar: Skipping to next header
     tar: Archive contains obsolescent base-64 headers
     tar: Error exit delayed from previous errors

Am I doing something wrong or is there a problem with the file I downloaded with wget?

Is there anything I can do?  I really want the binaries!

Thanks
0
Comment
Question by:hankknight
3 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 400 total points
ID: 11769571
Try 'tar xvzof vips-7.6.5-x86-linux-glibc2.1.tar.gz' or 'zcat vips-7.6.5-x86-linux-glibc2.1.tar.gz | tar xvof -'. You've downloaded a gzipped tar archive and it must be uncompressed before or during the tar extract.

Also note that one almost always wants to include the "o" option when unpacking a tar archive. That causes the ownership of the files extract to be that of the user invoking tar rather than the ownership recorded in the archive.
0
 
LVL 11

Expert Comment

by:avizit
ID: 11769879
instead of tar -xvf vips-7.6.5-x86-linux-glibc2.1.tar.gz

try tar -xvzf  vips-7.6.5-x86-linux-glibc2.1.tar.gz

the 'z' option should be there to unzip

or if you want to you can do it as a two step process

gunzip vips-7.6.5-x86-linux-glibc2.1.tar.gz
tar -xvf vips-7.6.5-x86-linux-glibc2.1.tar

/abhijit/
0
 
LVL 16

Author Comment

by:hankknight
ID: 11771482
Useful to know about the -o option.  I have run into trouble before with ownership issues after moving tarred files between servers.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
how to rebuild XFS volume from LV 19 62
Rate limit for DNS queries 7 72
cannot rename datastore 3 44
number in printf 13 27
Over the last ten+ years I have seen Linux configuration tools come and go. In the early days there was the tried-and-true, all-powerful linuxconf that many thought would remain the one and only Linux configuration tool until the end of times. Well,…
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now