Hide Forgot
Description of problem: trying to run any commands on sigul from a fedora 24 client results in an error On the client side I get NSS_HASH_ALG_SUPPORT=+MD5 sigul new-key --key-admin ausil --name-real "Fedora Secondary" --name-comment 25 --name-email fedora-23-secondary fedora-25-secondary Administrator's password: Passphrase for the new key: Passphrase for the new key (again): 2016-03-31 13:35:22,481 WARNING: (child) Exception in child Traceback (most recent call last): File "/usr/share/sigul/double_tls.py", line 777, in __child _ForwardingBuffer.forward_two_way(buf_1, buf_2) File "/usr/share/sigul/double_tls.py", line 177, in forward_two_way buf_1._receive(poll_descs) File "/usr/share/sigul/double_tls.py", line 335, in _receive r1 = self.__receive_inner(poll_descs) File "/usr/share/sigul/double_tls.py", line 277, in __receive_inner data = self.__inner_src.recv(self._BUFFER_LEN - len(self.__buffer)) ValueError: I/O operation on closed socket while on the bridge 2016-03-31 18:35:40,341 INFO: Client with CN 'ausil' connected 2016-03-31 18:35:40,406 INFO: Unexpected EOF: EOFError('Unexpected EOF on _DoubleTLS',) 2016-03-31 18:35:40,407 DEBUG: Request handling finished Version-Release number of selected component (if applicable): sigul-0.102-3.fc24.noarch How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
This package has changed ownership in the Fedora Package Database. Reassigning to the new owner of this component.
This is caused by a bug in python-nss 1.0 and up. Downgrading python-nss to 0.16.0 will work around the issue for now. *** This bug has been marked as a duplicate of bug 1367216 ***