Return-Path: X-Original-To: apmail-httpd-modules-dev-archive@minotaur.apache.org Delivered-To: apmail-httpd-modules-dev-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 8639B23A3 for ; Fri, 29 Apr 2011 20:47:28 +0000 (UTC) Received: (qmail 75923 invoked by uid 500); 29 Apr 2011 20:47:25 -0000 Delivered-To: apmail-httpd-modules-dev-archive@httpd.apache.org Received: (qmail 75880 invoked by uid 500); 29 Apr 2011 20:47:25 -0000 Mailing-List: contact modules-dev-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: modules-dev@httpd.apache.org Delivered-To: mailing list modules-dev@httpd.apache.org Received: (qmail 75846 invoked by uid 99); 29 Apr 2011 20:47:25 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 29 Apr 2011 20:47:25 +0000 X-ASF-Spam-Status: No, hits=0.7 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_HELO_PASS,SPF_NEUTRAL X-Spam-Check-By: apache.org Received-SPF: neutral (nike.apache.org: local policy) Received: from [212.227.17.9] (HELO moutng.kundenserver.de) (212.227.17.9) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 29 Apr 2011 20:47:16 +0000 Received: from [192.168.178.24] (dslb-188-098-068-110.pools.arcor-ip.net [188.98.68.110]) by mrelayeu.kundenserver.de (node=mrbap2) with ESMTP (Nemesis) id 0MhO2U-1QSe1K1H4U-00MAFA; Fri, 29 Apr 2011 22:46:56 +0200 Message-ID: <4DBB23BD.60707@mardys.de> Date: Fri, 29 Apr 2011 22:46:53 +0200 From: Hardy Griech User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.15) Gecko/20110303 Lightning/1.0b3pre Thunderbird/3.1.9 MIME-Version: 1.0 To: modules-dev@httpd.apache.org Subject: Re: mod_gnutls and mod_proxy (TLS termination) References: <4DBA7664.6000906@mardys.de> <4DBAB8DB.8030803@mardys.de> <4DBABB06.7090505@mardys.de> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Provags-ID: V02:K0:2fncK6kb5VeRb+MfV76aTLqYPot16Tjz67gL1Skbvtg eGwS1rEzMM6VjaOSm5UOhoJjMX3+8hf6YwsXpdeJkocRpp4NJH w56ryLf85DbmFuA+SAm7cAvln+MVp+LhoQNtN/9ai2x05KkoNV Cmok12aRjUyr81wnsHkfW0y3j/cvLIUxDZ2zDasCPQJZoNd9Uk cPOyi8nwdbocJYbzc4FJw== X-Virus-Checked: Checked by ClamAV on apache.org On 29.04.2011 22:38, Ben Noordhuis wrote: >> - mod_ssl (openssl?) does not obey the maximum fragmentation >> length requested by the clients > > I think that this has been fixed in openssl 1.0.0.a. I thought that too, but all my tries with my piece of software did not show the expected results. Perhaps I will give it a try again. > Monkey curiosity: why do you need it? Embedded device where buffer size counts - if you have 16KByte RAM (which is quite comfortable) in total you do not like to waste it for a single buffer. : > $ cat> gdb.conf > b ap_run_post_config > r > b your_function > c > $ gdb -x gdb.conf --args /path/to/httpd -X > > But mostly you place the breakpoint once manually, then restart the > server (`r` or `run`) when you recompile your module. : Many thanks for your hints, Ben. Now I have a testbed to check the filtering mechanism of mod_gnutls. Hardy