httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 37244] - Apache 1.3.33 : binary characters in HTTP header - buffer overflow during HTTP transactions??
Date Wed, 26 Oct 2005 14:04:55 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=37244>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=37244





------- Additional Comments From iamroshan@gmail.com  2005-10-26 16:04 -------
(In reply to comment #2)
> SSL on Apache 1.x is well known to be complex and leave a lot of scope for 
> incompatibility with (other) modules.  A term to google for is EAPI.  Since 
> it's been obsolete for three and a half years, usual advice is to upgrade. 
>  
> Have you tried disabling keepalives as a workaround? 

This issue is observed only after the migration from 1.3.28 to 1.3.33, and the 
SSL is not handled by apache but taken care by SSL h/w accelerators.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message