-
-
Notifications
You must be signed in to change notification settings - Fork 423
Description
Currently NUT OpenSSL builds allow the NUT upsd data server to certify itself with a PEM certificate+chain+key file, and NUT clients using the libupsclient to initiate STARTTLS and essentially trust anyone. With additional setup in client code (as currently only done in upsmon, see more at issue #3329), the trusted server range can be constrained to a directory with a list of PEM files.
With Mozilla NSS, the server and clients (currently only upsmon again) can use the specified trust database locations, with certificates uploaded there. Clients can present themselves with a certificate, and server can be configured to only talk to clients that present a certificate (any, or those validated by the server database). Clients can also be configured to require that a particular server should respond with a particular certificate subject name.
While the original difference to support the two libraries was largely due to licensing, they now also incur different capabilities and setup for the server and for the (remote) client depending on the build.
This issue is about trying to level the field, and having OpenSSL builds able to do all the same tricks as NSS builds (so the only practical difference is about cert/key setup).