NSS-3.94
Introduction to NSS
The Network Security Services (NSS) package is
a set of libraries designed to support cross-platform development of
security-enabled client and server applications. Applications built with
NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12,
S/MIME, X.509 v3 certificates, and other security standards. This is
useful for implementing SSL and S/MIME or other Internet security
standards into an application.
Note
Development versions of BLFS may not build or run
some packages properly if LFS or dependencies have been updated
since the most recent stable versions of the books.
Package Information
Additional Downloads
NSS Dependencies
Required
NSPR-4.35
Recommended
SQLite-3.44.2 and
p11-kit-0.25.3 (runtime)
Editor Notes: https://wiki.linuxfromscratch.org/blfs/wiki/nss
Installation of NSS
Install NSS by running the following commands:
patch -Np1 -i ../nss-3.94-standalone-1.patch &&
cd nss &&
make BUILD_OPT=1 \
NSPR_INCLUDE_DIR=/usr/include/nspr \
USE_SYSTEM_ZLIB=1 \
ZLIB_LIBS=-lz \
NSS_ENABLE_WERROR=0 \
$([ $(uname -m) = x86_64 ] && echo USE_64=1) \
$([ -f /usr/include/sqlite3.h ] && echo NSS_USE_SYSTEM_SQLITE=1)
To run the tests, execute the following commands:
cd tests &&
HOST=localhost DOMSUF=localdomain ./all.sh
cd ../
Note
Some information about the tests:
HOST=localhost and DOMSUF=localdomain are required.
Without these variables, a FQDN is
required to be specified and this generic way should work for
everyone, provided localhost.localdomain
is defined
by the myhostname
NSS module, as specified in
the LFS book.
The tests take a long time to run. If desired there is
information in the all.sh script about running subsets of the
total test suite.
When interrupting the tests, the test suite
fails to spin down test servers that are run. This leads to an
infinite loop in the tests where the test suite tries to kill a server
that doesn't exist anymore because it pulls the wrong PID.
Test suite results (in HTML format!) can be found at
../../test_results/security/localhost.1/results.html
A few tests might fail on some Intel machines for unknown reasons.
Now, as the root
user:
cd ../dist &&
install -v -m755 Linux*/lib/*.so /usr/lib &&
install -v -m644 Linux*/lib/{*.chk,libcrmf.a} /usr/lib &&
install -v -m755 -d /usr/include/nss &&
cp -v -RL {public,private}/nss/* /usr/include/nss &&
install -v -m755 Linux*/bin/{certutil,nss-config,pk12util} /usr/bin &&
install -v -m644 Linux*/lib/pkgconfig/nss.pc /usr/lib/pkgconfig
Command Explanations
BUILD_OPT=1
: This option is passed to
make so that the build is performed with no debugging
symbols built into the binaries and the default compiler optimizations are
used.
NSPR_INCLUDE_DIR=/usr/include/nspr
: This option
sets the location of the nspr headers.
USE_SYSTEM_ZLIB=1
: This option is passed to
make to ensure that the
libssl3.so
library is linked to
the system installed zlib instead of the
in-tree version.
ZLIB_LIBS=-lz
: This option provides the
linker flags needed to link to the system zlib.
$([ $(uname -m) = x86_64 ] && echo USE_64=1):
The USE_64=1
option is required on
x86_64, otherwise make will try (and fail)
to create 32-bit objects. The [ $(uname -m) = x86_64 ] test ensures it
has no effect on a 32 bit system.
([ -f /usr/include/sqlite3.h ] && echo
NSS_USE_SYSTEM_SQLITE=1): This tests if
sqlite is installed and if so it
echos the option NSS_USE_SYSTEM_SQLITE=1 to
make so that
libsoftokn3.so
will link against
the system version of sqlite.
NSS_DISABLE_GTESTS=1
: If you don't need to run
NSS test suite, append this option to make command,
to prevent the compilation of tests and save some build time.
Configuring NSS
If p11-kit-0.25.3 is installed, the
p11-kit trust module
(/usr/lib/pkcs11/p11-kit-trust.so
) can be used as a
drop-in replacement for /usr/lib/libnssckbi.so
to
transparently make the system CAs available to
NSS aware applications, rather than the static
list provided by /usr/lib/libnssckbi.so
. As the
root
user, execute the following
command:
ln -sfv ./pkcs11/p11-kit-trust.so /usr/lib/libnssckbi.so
Additionally, for dependent applications that do not use the internal
database (/usr/lib/libnssckbi.so
), the
/usr/sbin/make-ca
script included on the
make-ca-1.13 page can generate a system wide NSS DB with the
-n
switch, or by modifying the
/etc/make-ca/make-ca.conf
file.
Contents
Installed Programs:
certutil, nss-config, and pk12util
Installed Libraries:
libcrmf.a, libfreebl3.so, libfreeblpriv3.so,
libnss3.so, libnssckbi.so, libnssckbi-testlib.so,
libnssdbm3.so, libnsssysinit.so, libnssutil3.so,
libpkcs11testmodule.so, libsmime3.so, libsoftokn3.so,
and libssl3.so
Installed Directories:
/usr/include/nss
Short Descriptions
certutil |
is the Mozilla Certificate Database Tool. It is a command-line
utility that can create and modify the Netscape Communicator
cert8.db and key3.db database files. It can also list, generate,
modify, or delete certificates within the cert8.db file and create
or change the password, generate new public and private key pairs,
display the contents of the key database, or delete key pairs within
the key3.db file
|
nss-config |
is used to determine the NSS library settings of the installed NSS
libraries
|
pk12util |
is a tool for importing certificates and keys from pkcs #12 files
into NSS or exporting them. It can also list certificates and keys
in such files
|