Skip to content
This repository has been archived by the owner on Jan 12, 2018. It is now read-only.

Look for a proper way to handle NSS_STRICT_NOFORK #2

Closed
tiran opened this issue Dec 15, 2016 · 3 comments
Closed

Look for a proper way to handle NSS_STRICT_NOFORK #2

tiran opened this issue Dec 15, 2016 · 3 comments

Comments

@tiran
Copy link
Member

tiran commented Dec 15, 2016

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Reference/NSS_environment_variables

It is an error to try to use a PKCS#11 crypto module in a process before it has been initialized in that process, even if the module was initialized in the parent process. Beginning in NSS 3.12.3, Softoken will detect this error. This environment variable controls Softoken's response to that error.

    If set to to "1" or unset, Softoken will trigger an assertion failure in debug builds, and will report an error in non-DEBUG builds.
    If set  to "DISABLED", Softoken will ignore forks, and behave as it did in older versions.
    If set to any other non-empty value, Softoken will report an error in both DEBUG and non-DEBUG builds.

Perhaps python-nss has a way to init the crypto module again?

@tiran
Copy link
Member Author

tiran commented Jan 20, 2017

I created https://fedorahosted.org/freeipa/ticket/6563 a while ago

@tiran
Copy link
Member Author

tiran commented Mar 23, 2017

FreeIPA 4.5 no longer uses NSS for TLS/SSL and key wrapping.

@tiran
Copy link
Member Author

tiran commented Apr 28, 2017

Let's keep the NSS_STRICT_NOFORK for legacy support and remove it once we remove support for FreeIPA 4.4.

@tiran tiran closed this as completed Apr 28, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant