httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 46952] New: ssl renegotiation hangs with long ca list
Date Wed, 01 Apr 2009 19:48:20 GMT
https://issues.apache.org/bugzilla/show_bug.cgi?id=46952

           Summary: ssl renegotiation hangs with long ca list
           Product: Apache httpd-2
           Version: 2.2.11
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: blocker
          Priority: P2
         Component: mod_ssl
        AssignedTo: bugs@httpd.apache.org
        ReportedBy: lassi.tuura@cern.ch


Created an attachment (id=23434)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=23434)
extra debugging for mod_ssl

Using apache 2.2.11 with openssl 0.9.7d, a location-specific SSLVerifyClient
optional (or require), and a long list of CA certificates, the SSL session
re-negotiation hangs.  Shrinking the "CA" list works around the problem.

There is bug in mod_ssl / openssl such that mod_ssl buffers the data, openssl
thinks it issues a flush while working through the renegotiation state machine,
but mod_ssl never flushes the data out. The web client hangs waiting for more
data from the server, and the server hangs waiting for the client to send
certificate, thinking it's sent the data out already.

The client hang occurs at least with firefox (3.0.x), curl and openssl
s_client.  Safari does not hang.  We have had mixed reports about Konqueror.

For example I use the following command to connect to the server:

  curl --cert mycert.pem --key mykey.pem --cacert ca-list.pem \
     -L -v -1 -o - https://myserver.domain:443/test/testme

The detailed SSL debug output in (A) is from:

  openssl s_client -state -debug -connect myserver.domain:443 \
     -key mykey.pem -cert mycert.pem -CAfile ca-list.pem

Once in the interactive mode, type in the URL which is protected with
"SSLVerifyClient require":

  GET /test/testme HTTP/1.1
  Host: myserver.domain
  (enter for empty line)

The client side output from the hang is in (A), excluding wire bytes.

The server side debug output is in (B), starting from the processing of the
HTTP request which forces renegotiation, again excluding actual wire bytes.

I added considerably more logging to ssl_engine_io.c, and the crux of the issue
appears to be that once the SSL re-negotiation begins it hangs in the stack
trace in (C).

This is around line 612 in my version of ssl_hook_Access() in
ssl_engine_kernel.c, in the "renegotiate" part but not "renegotiate_quick".  If
CA list is long (our server responds with 4096+4096+4148 bytes for server hello
+ server cert + key exchange + cert request with list of 85 CAs) such that the
last block is > 4096 bytes, the third and last data segment is cached into
bio_filter_out_ctx_t.buffer, and the last flush from "Loop: SSLv3 flush data"
never actually calls bio_filter_out_ctrl() and issues a flush to send the data
out.  If we shrink the CA list so that the last third segment is <4096 bytes,
everything is flushed out fine and there is no hang.

I added logging to bio_filter_out_flush(), bio_filter_out_write() and
bio_filter_out_ctrl(), and even though the "Loop: SSLv3 flush data" is output,
there is _no_ call to bio_filter_out_ctrl() to flush the data if the CA list is
too long.  If the list is shorter, it does come.  I couldn't quite work out
from openssl / mod_ssl interaction how that was possible.  The actual sequence
of calls resulting in a hang is in (D).  The sequence of calls for a successful
server response is in (E).  The patch that adds the logging is attached.


(A)

Enter pass phrase for mykey.pem:
CONNECTED(0000000E)
SSL_connect:before/connect initialization
write to 0x455bf0 [0xef000] (89 bytes => 89 (0x59))
SSL_connect:SSLv3 write client hello A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (74 bytes => 74 (0x4A))
SSL_connect:SSLv3 read server hello A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (4257 bytes => 4257 (0x10A1))
depth=2 /.../CN=...
verify return:1
depth=1 /.../CN=...
verify return:1
depth=0 /.../CN=...
verify return:1
SSL_connect:SSLv3 read server certificate A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (525 bytes => 525 (0x20D))
SSL_connect:SSLv3 read server key exchange A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (4 bytes => 4 (0x4))
SSL_connect:SSLv3 read server done A
write to 0x455bf0 [0x180ae00] (139 bytes => 139 (0x8B))
SSL_connect:SSLv3 write client key exchange A
write to 0x455bf0 [0x180ae00] (6 bytes => 6 (0x6))
SSL_connect:SSLv3 write change cipher spec A
write to 0x455bf0 [0x180ae00] (53 bytes => 53 (0x35))
SSL_connect:SSLv3 write finished A
SSL_connect:SSLv3 flush data
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (1 bytes => 1 (0x1))
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (48 bytes => 48 (0x30))
SSL_connect:SSLv3 read finished A
Certificate chain
 0 <snip>
 1 <snip>
 2 <snip>
---
Server certificate
<snip>
SSL handshake has read 4939 bytes and written 287 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 2048 bit
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID: <snip>
    Session-ID-ctx: 
    Master-Key: <snip>
    Key-Arg   : None
    Start Time: 1238608803
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---
GET /test/testme HTTP/1.1
Host: myserver.domain

write to 0x455bf0 [0xef000] (90 bytes => 90 (0x5A))
write to 0x455bf0 [0xef000] (90 bytes => 90 (0x5A))
write to 0x455bf0 [0xef000] (74 bytes => 74 (0x4A))
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (32 bytes => 32 (0x20))
SSL_connect:SSL renegotiate ciphers
write to 0x455bf0 [0xef000] (117 bytes => 117 (0x75))
SSL_connect:SSLv3 write client hello A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (96 bytes => 96 (0x60))
SSL_connect:SSLv3 read server hello A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (4288 bytes => 4238 (0x108E))
read from 0x455bf0 [0xeb093] (50 bytes => 50 (0x32))
depth=2 /.../CN=...
verify return:1
depth=1 /.../CN=...
verify return:1
depth=0 /.../CN=...
verify return:1
SSL_connect:SSLv3 read server certificate A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (560 bytes => 560 (0x230))
SSL_connect:SSLv3 read server key exchange A
read from 0x455bf0 [0xea000] (5 bytes => 5 (0x5))
read from 0x455bf0 [0xea005] (7328 bytes => 3228 (0xC9C))
read from 0x455bf0 [0xeaca1] (4100 bytes => 0 (0x0))
SSL_connect:failed in SSLv3 read server certificate request A
1493:error:140940E5:SSL routines:SSL3_READ_BYTES:ssl handshake
failure:s3_pkt.c:990:

(B)

[info] Initial (No.1) HTTPS request received for child 1 (server
myserver.domain:443)
[debug] ssl_engine_kernel.c(426): Changed client verification type will force
renegotiation
[info] Requesting connection re-negotiation
[debug] ssl_engine_kernel.c(616): Performing full renegotiation: complete
handshake protocol
[debug] ssl_engine_kernel.c(1752): OpenSSL: Handshake: start
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSL renegotiate ciphers
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write hello request A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 flush data
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write hello request C
[info] Awaiting re-negotiation handshake
[debug] ssl_engine_kernel.c(1752): OpenSSL: Handshake: start
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: before accept initialization
[debug] ssl_engine_io.c(1817): OpenSSL: read 5/5 bytes from BIO#f54db0 [mem:
f5c480] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 read client hello A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write server hello A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write certificate A
[debug] ssl_engine_kernel.c(1143): [client ip.ad.dr.es] handing out temporary
1024 bit DH key
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write key exchange A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write certificate
request A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 flush data


(C)

#0 0x00000035179c08ef in poll () from /lib64/tls/libc.so.6
#1 0x0000002a957c483f in apr_wait_for_io_or_timeout ()
#2 0x0000002a957bfcaa in apr_socket_recv ()
#3 0x0000002a9556cd30 in socket_bucket_read ()
#4 0x0000000000433a02 in ap_core_input_filter ()
#5 0x0000002a96104e19 in logio_in_filter ()
#6 0x0000002a96942230 in bio_filter_in_read ()
#7 0x000000351948f1a3 in BIO_read () from /lib64/libcrypto.so.4
#8 0x0000003519b1af12 in ssl3_alert_code () from /lib64/libssl.so.4
#9 0x0000003519b1bb7e in ssl3_read_bytes () from /lib64/libssl.so.4
#10 0x0000003519b1cc5b in ssl3_get_message () from /lib64/libssl.so.4
#11 0x0000003519b14c5d in ssl3_accept () from /lib64/libssl.so.4
#12 0x0000003519b22108 in SSL_do_handshake () from /lib64/libssl.so.4
#13 0x0000002a96944c45 in ssl_hook_Access ()
#14 0x0000000000430b9f in ap_run_access_checker ()
#15 0x0000000000432bc6 in ap_process_request_internal ()
#16 0x0000000000442070 in ap_process_request ()
#17 0x000000000043f7cd in ap_process_http_connection ()
#18 0x000000000043be73 in ap_run_process_connection ()
#19 0x0000000000446164 in child_main ()
#20 0x0000000000446384 in make_child ()
#21 0x0000000000446f09 in ap_mpm_run ()
#22 0x0000000000423055 in main ()

(D)

[info] Initial (No.1) HTTPS request received for child 0 (server
myserver.domain:443)
[debug] ssl_engine_kernel.c(426): Changed client verification type will force
renegotiation
[info] Requesting connection re-negotiation
[debug] ssl_engine_kernel.c(616): Performing full renegotiation: complete
handshake protocol
[debug] ssl_engine_kernel.c(1752): OpenSSL: Handshake: start
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSL renegotiate ciphers
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f4f240,
in#f651c0, inl 37), retry=0, ctx: [length 0, blen 0, nobuffer=0]
[debug] ssl_engine_io.c(238): OpenSSL:
bio_filter_out_write(BIO#f4f240)->buffer[0, 0: 37]
[debug] ssl_engine_io.c(1858): OpenSSL: write 37/37 bytes to BIO#f4f240 [mem:
f651c0] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write hello request A
[debug] ssl_engine_io.c(272): OpenSSL: bio_filter_out_ctrl(BIO#f4f240, 3, 0,
#0); ctx:[37, 0]
[debug] ssl_engine_io.c(322): OpenSSL: bio_filter_out_ctrl(BIO#f4f240, 3, 0,
#0); ctx:[37, 0]->ret 37
[debug] ssl_engine_io.c(272): OpenSSL: bio_filter_out_ctrl(BIO#f4f240, 11, 0,
#0); ctx:[37, 0]
[debug] ssl_engine_io.c(136): OpenSSL: flush 1: BIO#f4f240, blen=37, length=0
[debug] ssl_engine_io.c(159): OpenSSL: flush 2: BIO#f4f240, head=f51318,
bucket=f4cf78
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f4f240, e=f4ce38 [#f4f308,
37] -> f4cf78
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f4f240, e=f4cf78 [#0, 0] ->
f51320
[debug] ssl_engine_io.c(180): OpenSSL: flush 5: BIO#f4f240, rc=0,
APR_SUCCESS=0, retval=1
[debug] ssl_engine_io.c(322): OpenSSL: bio_filter_out_ctrl(BIO#f4f240, 11, 0,
#0); ctx:[0, 0]->ret 1
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 flush data
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write hello request C
[info] Awaiting re-negotiation handshake
[debug] ssl_engine_kernel.c(1752): OpenSSL: Handshake: start
[debug] ssl_engine_io.c(272): OpenSSL: bio_filter_out_ctrl(BIO#f4f240, 6, 0,
#0); ctx:[0, 0]
[debug] ssl_engine_io.c(322): OpenSSL: bio_filter_out_ctrl(BIO#f4f240, 6, 0,
#0); ctx:[0, 0]->ret 0
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: before accept initialization
[debug] ssl_engine_io.c(1858): OpenSSL: read 5/5 bytes from BIO#f552e0 [mem:
f5c9b0] (BIO dump follows)
[debug] ssl_engine_io.c(1858): OpenSSL: read 112/112 bytes from BIO#f552e0
[mem: f5c9b5] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 read client hello A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write server hello A
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f4f240,
in#f6cb00, inl 4096), retry=0, ctx: [length 0, blen 0, nobuffer=0]
[debug] ssl_engine_io.c(238): OpenSSL:
bio_filter_out_write(BIO#f4f240)->buffer[0, 0: 4096]
[debug] ssl_engine_io.c(1858): OpenSSL: write 4096/4096 bytes to BIO#f4f240
[mem: f6cb00] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write certificate A
[debug] ssl_engine_kernel.c(1143): [client ip.ad.dr.es] handing out temporary
1024 bit DH key
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write key exchange A
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f4f240,
in#f6cb00, inl 4096), retry=0, ctx: [length 0, blen 4096, nobuffer=0]
[debug] ssl_engine_io.c(254): OpenSSL:
bio_filter_out_write(BIO#f4f240)->bucket(4096, 4096: #f4ced8)
[debug] ssl_engine_io.c(136): OpenSSL: flush 1: BIO#f4f240, blen=4096,
length=4096
[debug] ssl_engine_io.c(159): OpenSSL: flush 2: BIO#f4f240, head=f51318,
bucket=f4cd98
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f4f240, e=f4cf78 [#f4f308,
4096] -> f4ced8
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f4f240, e=f4ced8 [#f6cb00,
4096] -> f4cd98
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f4f240, e=f4cd98 [#0, 0] ->
f51320
[debug] ssl_engine_io.c(180): OpenSSL: flush 5: BIO#f4f240, rc=0,
APR_SUCCESS=0, retval=1
[debug] ssl_engine_io.c(1858): OpenSSL: write 4096/4096 bytes to BIO#f4f240
[mem: f6cb00] (BIO dump follows)
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f4f240,
in#f65e61, inl 4148), retry=0, ctx: [length 0, blen 0, nobuffer=0]
[debug] ssl_engine_io.c(238): OpenSSL:
bio_filter_out_write(BIO#f4f240)->buffer[0, 0: 4148]
[debug] ssl_engine_io.c(1858): OpenSSL: write 4148/4148 bytes to BIO#f4f240
[mem: f65e61] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write certificate
request A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 flush data
[debug] ssl_engine_io.c(1869): OpenSSL: I/O error, 5 bytes expected to read on
BIO#f552e0 [mem: f5c9b0]


(E)


[info] Initial (No.1) HTTPS request received for child 2 (server
myserver.domain:443)
[debug] ssl_engine_kernel.c(426): Changed client verification type will force
renegotiation
[info] Requesting connection re-negotiation
[debug] ssl_engine_kernel.c(616): Performing full renegotiation: complete
handshake protocol
[debug] ssl_engine_kernel.c(1752): OpenSSL: Handshake: start
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSL renegotiate ciphers
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f789d0,
in#f990a0, inl 37), retry=0, ctx: [length 0, blen 0, nobuffer=0]
[debug] ssl_engine_io.c(238): OpenSSL:
bio_filter_out_write(BIO#f789d0)->buffer[0, 0: 37]
[debug] ssl_engine_io.c(1859): OpenSSL: write 37/37 bytes to BIO#f789d0 [mem:
f990a0] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write hello request A
[debug] ssl_engine_io.c(272): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 3, 0,
#0); ctx:[37, 0]
[debug] ssl_engine_io.c(322): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 3, 0,
#0); ctx:[37, 0]->ret 37
[debug] ssl_engine_io.c(272): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 11, 0,
#0); ctx:[37, 0]
[debug] ssl_engine_io.c(136): OpenSSL: flush 1: BIO#f789d0, blen=37, length=0
[debug] ssl_engine_io.c(159): OpenSSL: flush 2: BIO#f789d0, head=f88208,
bucket=f80e58
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f789d0, e=f80d18 [#f861f8,
37] -> f80e58
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f789d0, e=f80e58 [#0, 0] ->
f88210
[debug] ssl_engine_io.c(180): OpenSSL: flush 5: BIO#f789d0, rc=0,
APR_SUCCESS=0, retval=1
[debug] ssl_engine_io.c(322): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 11, 0,
#0); ctx:[0, 0]->ret 1
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 flush data
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write hello request C
[info] Awaiting re-negotiation handshake
[debug] ssl_engine_kernel.c(1752): OpenSSL: Handshake: start
[debug] ssl_engine_io.c(272): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 6, 0,
#0); ctx:[0, 0]
[debug] ssl_engine_io.c(322): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 6, 0,
#0); ctx:[0, 0]->ret 0
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: before accept initialization
[debug] ssl_engine_io.c(1859): OpenSSL: read 5/5 bytes from BIO#f78a50 [mem:
f90890] (BIO dump follows)
[debug] ssl_engine_io.c(1859): OpenSSL: read 192/192 bytes from BIO#f78a50
[mem: f90895] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 read client hello A
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write server hello A
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f789d0,
in#fa5600, inl 4096), retry=0, ctx: [length 0, blen 0, nobuffer=0]
[debug] ssl_engine_io.c(238): OpenSSL:
bio_filter_out_write(BIO#f789d0)->buffer[0, 0: 4096]
[debug] ssl_engine_io.c(1859): OpenSSL: write 4096/4096 bytes to BIO#f789d0
[mem: fa5600] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write certificate A
[debug] ssl_engine_kernel.c(1143): [client ip.ad.dr.es] handing out temporary
1024 bit DH key
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write key exchange A
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f789d0,
in#fa5600, inl 4096), retry=0, ctx: [length 0, blen 4096, nobuffer=0]
[debug] ssl_engine_io.c(254): OpenSSL:
bio_filter_out_write(BIO#f789d0)->bucket(4096, 4096: #f80ef8)
[debug] ssl_engine_io.c(136): OpenSSL: flush 1: BIO#f789d0, blen=4096,
length=4096
[debug] ssl_engine_io.c(159): OpenSSL: flush 2: BIO#f789d0, head=f88208,
bucket=f80db8
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f789d0, e=f80e58 [#f861f8,
4096] -> f80ef8
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f789d0, e=f80ef8 [#fa5600,
4096] -> f80db8
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f789d0, e=f80db8 [#0, 0] ->
f88210
[debug] ssl_engine_io.c(180): OpenSSL: flush 5: BIO#f789d0, rc=0,
APR_SUCCESS=0, retval=1
[debug] ssl_engine_io.c(1859): OpenSSL: write 4096/4096 bytes to BIO#f789d0
[mem: fa5600] (BIO dump follows)
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write certificate
request A
[debug] ssl_engine_io.c(217): OpenSSL: bio_filter_out_write(BIO#f789d0,
in#fa5600, inl 4020), retry=0, ctx: [length 0, blen 0, nobuffer=0]
[debug] ssl_engine_io.c(238): OpenSSL:
bio_filter_out_write(BIO#f789d0)->buffer[0, 0: 4020]
[debug] ssl_engine_io.c(1859): OpenSSL: write 4020/4020 bytes to BIO#f789d0
[mem: fa5600] (BIO dump follows)
[debug] ssl_engine_io.c(272): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 11, 0,
#0); ctx:[4020, 0]
[debug] ssl_engine_io.c(136): OpenSSL: flush 1: BIO#f789d0, blen=4020, length=0
[debug] ssl_engine_io.c(159): OpenSSL: flush 2: BIO#f789d0, head=f88208,
bucket=f80ef8
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f789d0, e=f80db8 [#f861f8,
4020] -> f80ef8
[debug] ssl_engine_io.c(163): OpenSSL: flush 3: BIO#f789d0, e=f80ef8 [#0, 0] ->
f88210
[debug] ssl_engine_io.c(180): OpenSSL: flush 5: BIO#f789d0, rc=0,
APR_SUCCESS=0, retval=1
[debug] ssl_engine_io.c(322): OpenSSL: bio_filter_out_ctrl(BIO#f789d0, 11, 0,
#0); ctx:[0, 0]->ret 1
[debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 flush data
[debug] ssl_engine_io.c(1859): OpenSSL: read 5/5 bytes from BIO#f78a50 [mem:
f90890] (BIO dump follows)

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message