PostgreSQL, OpenSSL, and the GPL
PostgreSQL, OpenSSL, and the GPL
Posted Feb 16, 2011 19:21 UTC (Wed) by madscientist (subscriber, #16861)Parent article: PostgreSQL, OpenSSL, and the GPL
NSS has one other very significant advantage over GnuTLS and OpenSSL not mentioned in this article: NSS has been blessed as the standard SSL library for LSB. So it will be available on all LSB-compliant installations.
Posted Feb 16, 2011 20:07 UTC (Wed)
by foom (subscriber, #14868)
[Link] (3 responses)
Posted Feb 16, 2011 20:39 UTC (Wed)
by madscientist (subscriber, #16861)
[Link] (2 responses)
Numerically maybe not so impressive but there are some pretty high-profile users there.
The main point, though, is not how many applications use it but the fact that it's (a) correctly backward compatible, and (b) guaranteed to be available on all LSB systems. LSB has a bad rep but it IS a useful baseline that's very nice to rely on, for what it contains, and virtually every serious Linux distro supports it now.
Posted Feb 17, 2011 2:11 UTC (Thu)
by jamesh (guest, #1159)
[Link] (1 responses)
The main issue is whether the API it provides makes it as easy to integrate into applications as the OpenSSL API does.
Posted Feb 17, 2011 15:54 UTC (Thu)
by lkundrak (subscriber, #43452)
[Link]
Posted Feb 16, 2011 20:35 UTC (Wed)
by jengelh (guest, #33263)
[Link] (3 responses)
Being part of some standard won't magically proliferate it.
$ for i in mozilla-nss libgnutls26 libopenssl1_0_0; do rpm --test -e "$i" 2>&1 | pcregrep -o '(?<=\(installed\) )\S+' | sort -u | wc -l; done
..I still wait for the day until a "beautiful" API comes around. One that does not hide pointers behind, or use, typedefs, but rather ptrs to <incomplete> structs, does so in lower-case, and also has a prefix of sorts. No library fulfills all of these atm.
Posted Feb 16, 2011 21:18 UTC (Wed)
by madscientist (subscriber, #16861)
[Link]
Posted Feb 17, 2011 15:59 UTC (Thu)
by lkundrak (subscriber, #43452)
[Link] (1 responses)
Posted Feb 18, 2011 1:23 UTC (Fri)
by vonbrand (subscriber, #4458)
[Link]
This is obviously only applicable to your specific packages installed
Posted Feb 17, 2011 2:56 UTC (Thu)
by ringerc (subscriber, #3071)
[Link] (8 responses)
Unlike OpenSSL and GnuTLS, which are crypto and SSL libraries, NSS is a more complete system with key management support, PKCS#11 support, etc. Rather than apps having to implement all their own key storage and management, they just use the existing libnss database and tools. Best of all, you can have a shared per-user key database, so you can FINALLY avoid having to install your X.509 client certificate manually into every app you use individually.
Key management in Linux is a shrieking nightmare for administrators and no fun for users either. I'd love to see libNSS more widely adopted as it'd really help address that.
Posted Feb 17, 2011 3:14 UTC (Thu)
by foom (subscriber, #14868)
[Link] (7 responses)
Posted Feb 17, 2011 3:26 UTC (Thu)
by ringerc (subscriber, #3071)
[Link] (6 responses)
LibNSS supports a shared SQLite database but nobody wants to agree on where to keep it or whether to use it at all. They all want to stick to how they used to do it. Evolution uses gnutls and its own key management; ff and tbird use private libnss keystores; ssh doesn't even use x.509 certs at all (argh!).
You can enable the shared keystore with one line of code, but nobody's shipping FF and tbird configured that way, let alone adopting it for other apps. Very frustrating. Because few devs use X.509 client certificate infrastructure, it doesn't seem to get much attention/interest.
Posted Feb 17, 2011 5:58 UTC (Thu)
by djao (guest, #4263)
[Link] (4 responses)
The problem with the shared database is that it breaks backward compatibility. My keys are already in the right configuration file, and the current version of the program that I have already installed expects the key to be in that file. I don't want to be forced to move my keys somewhere else, much less an opaque database. A real UNIX admin prefers flat human-readable text configuration files for any number of reasons. There appears to be no sane way to simultaneously support both in-database keys and configuration-file keys in NSS.
I recently ran into this problem in Fedora's version of openswan, which uses NSS for key storage instead of flat text files like the openswan in every other Linux distribution. This makes key management in Fedora's openswan a huge hassle (you cannot just copy over keys in files). If openswan supported both key databases and keys in files, then there would be no problem. But it doesn't.
Posted Feb 17, 2011 7:10 UTC (Thu)
by ringerc (subscriber, #3071)
[Link]
NSS may be used to load keys from files pointed to by a config file, just as OpenSSL and GnuTLS may. It adds the _option_ of a keystore if you want to use it, but doesn't force it. The issue you ran into sounds like a heavy-handed conversion to nss done by the Fedora folks, rather than an issue inherent to NSS its self.
Posted May 27, 2013 21:10 UTC (Mon)
by Jehreg (guest, #91153)
[Link] (2 responses)
Xelerance will be issuing a new version (2.6.39) in the next few weeks, and LIBNSS will still not be forced. If Fedora decides to be idiots and force LIBNSS then they will have to answer to their clients, as Xelerance will recommend running other distributions to their clients and partners.
Patrick Naubert
Posted May 27, 2013 21:31 UTC (Mon)
by rahulsundaram (subscriber, #21946)
[Link]
Posted May 27, 2013 22:27 UTC (Mon)
by nix (subscriber, #2304)
[Link]
Posted Feb 17, 2011 7:16 UTC (Thu)
by corsac (subscriber, #49696)
[Link]
PostgreSQL, OpenSSL, and the GPL
PostgreSQL, OpenSSL, and the GPL
PostgreSQL, OpenSSL, and the GPL
PostgreSQL, OpenSSL, and the GPL
PostgreSQL, OpenSSL, and the GPL
7
9
63
PostgreSQL, OpenSSL, and the GPL
PostgreSQL, OpenSSL, and the GPL
[lkundrak@potwor ~]$ rpm -q --whatrequires libcrypto.so.10 |wc -l
63
[lkundrak@potwor ~]$ rpm -q --whatrequires libnss3.so |wc -l
23
PostgreSQL, OpenSSL, and the GPL
LibNSS advantages
LibNSS advantages
LibNSS advantages
LibNSS advantages
LibNSS supports a shared SQLite database but nobody wants to agree on where to keep it or whether to use it at all. They all want to stick to how they used to do it.
LibNSS advantages
LibNSS advantages
Xelerance Corp.
LibNSS advantages
LibNSS advantages
LibNSS advantages