httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 37244] - Apache 1.3.33 : binary characters in HTTP header - buffer overflow during HTTP transactions??
Date Wed, 26 Oct 2005 14:24:40 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=37244>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=37244





------- Additional Comments From iamroshan@gmail.com  2005-10-26 16:24 -------
(In reply to comment #4)
> (In reply to comment #2)
> > SSL on Apache 1.x is well known to be complex and leave a lot of scope for 
> > incompatibility with (other) modules.  A term to google for is EAPI.  
Since 
> > it's been obsolete for three and a half years, usual advice is to upgrade. 
> >  
> > Have you tried disabling keepalives as a workaround? 
> This issue is observed only after the migration from 1.3.28 to 1.3.33, and 
the 
> SSL is not handled by apache but taken care by SSL h/w accelerators.

Thanks for your suggestion. This issue does not show up on the dev 
environments, hence keepalives was ruled out as a solution. I would like to 
understand the problem in greater detail before any action is taken.


-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message