NSS SSL Only Works In Debug Mode

Bug #1576584 reported by solardudesf
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
nut (Ubuntu)
New
Undecided
Unassigned

Bug Description

This bug still exists on my Ubuntu 16.04 system.
Please see https://github.com/networkupstools/nut/issues/190 for more information. I have included the text description from there below. Looks like the issue was fixed back in April of 2015 in 2.7.3.
16.04 packages nu version:
ii nut-server 2.7.2-4ubuntu1 amd64 network UPS tools - core system

From the github page:
Client SSL connections do not complete when connecting to upsd running as a daemon when linked to NSS. Running upsd in the foreground (upsd -D) works fine.

Originally identified on Ubuntu 14.04, which compiles NUT 2.7.1 against NSS (libnss3):

$ dpkg-query -W nut-server libnss3 libnspr4
libnspr4:i386 2:4.10.7-0ubuntu0.14.04.1
libnss3:i386 2:3.17.4-0ubuntu0.14.04.1
nut-server 2.7.1-1ubuntu1
Verified with NUT 2.7.2.6+ (git master @ 197eafa) on Linux Mint (also based on Ubuntu 14.04).

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: nut 2.7.2-4ubuntu1
ProcVersionSignature: Ubuntu 4.4.0-21.37-generic 4.4.6
Uname: Linux 4.4.0-21-generic x86_64
NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
ApportVersion: 2.20.1-0ubuntu2
Architecture: amd64
Date: Fri Apr 29 01:36:38 2016
JournalErrors:
 Error: command ['journalctl', '-b', '--priority=warning', '--lines=1000'] failed with exit code 1: Hint: You are currently not seeing messages from other users and the system.
       Users in the 'systemd-journal' group can see all messages. Pass -q to
       turn off this notice.
 No journal files were opened due to insufficient permissions.
KernelVersion: Linux rex 4.4.0-21-generic #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
PackageArchitecture: all
SourcePackage: nut
UpgradeStatus: Upgraded to xenial on 2016-04-21 (7 days ago)

Revision history for this message
solardudesf (solardudesf) wrote :
information type: Private Security → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.