httpd-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Boyle Owen" <Owen.Bo...@swx.com>
Subject RE: [users@httpd] Fw: signal Bus error with apache Apache/2.0.54 with SSL pages
Date Tue, 14 Jun 2005 12:36:03 GMT
> -----Original Message-----
> From: charles_e_borton@bankone.com 
> [mailto:charles_e_borton@bankone.com]
> Sent: Montag, 13. Juni 2005 19:31
> To: users@httpd.apache.org
> Subject: RE: [users@httpd] Fw: signal Bus error with apache
> Apache/2.0.54 with SSL pages
> 
> 
> OK - I tired a new setting in my mail client - let me know if 
> this comes as
> plain text.
> 
> Responses are in-line.

Thanks. I had a look at your mail but it's getting beyond me. Anything else in the way (router/FW/bridge
etc.)? I'm not sure I can help much more - there's a limit to what you can do over a mailing-list...

Rgds,
Owen Boyle
Disclaimer: Any disclaimer attached to this message may be ignored. 

> 
> And here is new chain of thought:
> 
> After studying Ethereal traces taken during the problem, this problem
> appears to occur anytime my browser attempts to re-use the 
> SSL session ID.
> 
> I have attempted 2 things to try and work around - disabling 
> SSLv3 in my
> browser - the problem still occurs (see trace) and disabling 
> SSL session
> caching - also no luck.
> 
> I have noted that my server is creating the SSL cache file 
> but it's not
> creating the SSL mutex file.
> 
> Below are the Ethereal traces:
> 
> 
> 
> 
> 
> 
> No.     Time        Source                Destination         
>   Protocol
> Info
> - new ssl session key - it works
>     189 12.585475   10.129.149.250        204.151.176.150       TCP
> 1689 > https [SYN] Seq=0 Ack=0 Win=64512 Len=0 MSS=1260
>     190 12.586075   204.151.176.150       10.129.149.250        TCP
> https > 1689 [SYN, ACK] Seq=0 Ack=1 Win=50400 Len=0 MSS=1460
>     191 12.586101   10.129.149.250        204.151.176.150       TCP
> 1689 > https [ACK] Seq=1 Ack=1 Win=64512 Len=0
>     192 12.609405   10.129.149.250        204.151.176.150       SSLv2
> Client Hello
>     193 12.609945   204.151.176.150       10.129.149.250        TCP
> https > 1689 [ACK] Seq=1 Ack=46 Win=50400 Len=0
>     194 12.610493   204.151.176.150       10.129.149.250        SSLv2
> Server Hello
>     195 12.611325   10.129.149.250        204.151.176.150       SSLv2
> Client Master Key
>     196 12.611846   204.151.176.150       10.129.149.250        TCP
> https > 1689 [ACK] Seq=762 Ack=186 Win=50400 Len=0
>     199 12.636118   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data
>     200 12.636369   10.129.149.250        204.151.176.150       SSLv2
> Encrypted Data
>     201 12.636960   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data
>     202 12.637632   10.129.149.250        204.151.176.150       SSLv2
> Encrypted Data, [Unreassembled Packet]
>     203 12.637686   10.129.149.250        204.151.176.150       SSLv2
> Encrypted Data, [Unreassembled Packet]
>     204 12.638546   204.151.176.150       10.129.149.250        TCP
> https > 1689 [ACK] Seq=832 Ack=1769 Win=50400 Len=0
>     205 12.639477   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data
>     206 12.640166   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     207 12.640209   10.129.149.250        204.151.176.150       TCP
> 1689 > https [ACK] Seq=1769 Ack=2416 Win=64512 Len=0
>     208 12.640244   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     209 12.640351   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     210 12.640367   10.129.149.250        204.151.176.150       TCP
> 1689 > https [ACK] Seq=1769 Ack=4936 Win=64512 Len=0
>     262 17.493514   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     267 17.630522   10.129.149.250        204.151.176.150       TCP
> 1689 > https [ACK] Seq=1769 Ack=6196 Win=64512 Len=0
>     268 17.631444   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, Encrypted Data, [Unreassembled Packet]
>     269 17.631501   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     270 17.631524   10.129.149.250        204.151.176.150       TCP
> 1689 > https [ACK] Seq=1769 Ack=7596 Win=64512 Len=0
>     271 17.632893   10.129.149.250        204.151.176.150       TCP
> 1689 > https [FIN, ACK] Seq=1769 Ack=7596 Win=64512 Len=0
>     272 17.633372   204.151.176.150       10.129.149.250        TCP
> https > 1689 [ACK] Seq=7596 Ack=1770 Win=50400 Len=0
> 
> - resuse ssl session key - does not work
>     430 21.122033   10.129.149.250        204.151.176.150       TCP
> 1690 > https [SYN] Seq=0 Ack=0 Win=64512 Len=0 MSS=1260
>     432 21.122548   204.151.176.150       10.129.149.250        TCP
> https > 1690 [SYN, ACK] Seq=0 Ack=1 Win=50400 Len=0 MSS=1460
>     433 21.122565   10.129.149.250        204.151.176.150       TCP
> 1690 > https [ACK] Seq=1 Ack=1 Win=64512 Len=0
>     434 21.122999   10.129.149.250        204.151.176.150       SSLv2
> Client Hello
>     435 21.123501   204.151.176.150       10.129.149.250        TCP
> https > 1690 [ACK] Seq=1 Ack=62 Win=50400 Len=0
>     436 21.124812   204.151.176.150       10.129.149.250        TCP
> https > 1690 [FIN, ACK] Seq=1 Ack=62 Win=50400 Len=0
>     437 21.124837   10.129.149.250        204.151.176.150       TCP
> 1690 > https [ACK] Seq=62 Ack=2 Win=64512 Len=0
>     438 21.124952   10.129.149.250        204.151.176.150       TCP
> 1690 > https [FIN, ACK] Seq=62 Ack=2 Win=64512 Len=0
>     439 21.125686   204.151.176.150       10.129.149.250        TCP
> https > 1690 [ACK] Seq=2 Ack=63 Win=50400 Len=0
> 
> - new ssl session key - it works
>     440 21.126169   10.129.149.250        204.151.176.150       TCP
> 1691 > https [SYN] Seq=0 Ack=0 Win=64512 Len=0 MSS=1260
>     441 21.126715   204.151.176.150       10.129.149.250        TCP
> https > 1691 [SYN, ACK] Seq=0 Ack=1 Win=50400 Len=0 MSS=1460
>     442 21.126733   10.129.149.250        204.151.176.150       TCP
> 1691 > https [ACK] Seq=1 Ack=1 Win=64512 Len=0
>     443 21.127044   10.129.149.250        204.151.176.150       SSLv2
> Client Hello
>     444 21.127552   204.151.176.150       10.129.149.250        TCP
> https > 1691 [ACK] Seq=1 Ack=46 Win=50400 Len=0
>     445 21.128681   204.151.176.150       10.129.149.250        SSLv2
> Server Hello
>     446 21.129254   10.129.149.250        204.151.176.150       SSLv2
> Client Master Key
>     447 21.129833   204.151.176.150       10.129.149.250        TCP
> https > 1691 [ACK] Seq=762 Ack=186 Win=50400 Len=0
>     449 21.154045   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data
>     450 21.154309   10.129.149.250        204.151.176.150       SSLv2
> Encrypted Data
>     451 21.154853   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data
>     452 21.156212   10.129.149.250        204.151.176.150       SSLv2
> Encrypted Data, [Unreassembled Packet]
>     453 21.156271   10.129.149.250        204.151.176.150       SSLv2
> Encrypted Data, [Unreassembled Packet]
>     454 21.157126   204.151.176.150       10.129.149.250        TCP
> https > 1691 [ACK] Seq=832 Ack=1769 Win=50400 Len=0
>     455 21.158075   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data
>     456 21.158841   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     457 21.158885   10.129.149.250        204.151.176.150       TCP
> 1691 > https [ACK] Seq=1769 Ack=2416 Win=64512 Len=0
>     458 21.158919   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     459 21.159024   204.151.176.150       10.129.149.250        SSLv2
> Encrypted Data, [Unreassembled Packet]
>     460 21.159040   10.129.149.250        204.151.176.150       TCP
> 1691 > https [ACK] Seq=1769 Ack=4936 Win=64512 Len=0
>     461 21.159272   204.151.176.150       10.129.149.250        TCP
> [TCP Previous segment lost] https > 1691 [FIN, ACK] Seq=7595 Ack=1769
> Win=50400 Len=0
>     462 21.159286   10.129.149.250        204.151.176.150       TCP
> [TCP Dup ACK 460#1] 1691 > https [ACK] Seq=1769 Ack=4936 
> Win=64512 Len=0
> SLE=2522522687 SRE=2522522688
>     661 26.013635   204.151.176.150       10.129.149.250        SSLv2
> [TCP Retransmission] Encrypted Data, [Unreassembled Packet]
>     666 26.157727   10.129.149.250        204.151.176.150       TCP
> 1691 > https [ACK] Seq=1769 Ack=6196 Win=64512 Len=0 SLE=2522522687
> SRE=2522522688
>     667 26.158646   204.151.176.150       10.129.149.250        SSLv2
> [TCP Retransmission] Encrypted Data, [Unreassembled Packet]
>     668 26.158697   204.151.176.150       10.129.149.250        SSLv2
> [TCP Retransmission] Encrypted Data, [Unreassembled Packet]
>     669 26.158716   10.129.149.250        204.151.176.150       TCP
> 1691 > https [ACK] Seq=1769 Ack=7596 Win=64512 Len=0 SLE=2522522687
> SRE=2522522688
>     670 26.159292   10.129.149.250        204.151.176.150       TCP
> 1691 > https [FIN, ACK] Seq=1769 Ack=7596 Win=64512 Len=0
>     671 26.159765   204.151.176.150       10.129.149.250        TCP
> https > 1691 [ACK] Seq=7596 Ack=1770 Win=50400 Len=0
> 
> 
> 
> From the frist session - no session key is passed:
> No.     Time        Source                Destination         
>   Protocol
> Info
>     192 12.609405   10.129.149.250        204.151.176.150       SSLv2
> Client Hello
> 
> Frame 192 (99 bytes on wire, 99 bytes captured)
> Ethernet II, Src: 00:08:02:da:21:42, Dst: 00:00:0c:07:ac:00
> Internet Protocol, Src Addr: 10.129.149.250 (10.129.149.250), 
> Dst Addr:
> 204.151.176.150 (204.151.176.150)
> Transmission Control Protocol, Src Port: 1689 (1689), Dst Port: https
> (443), Seq: 1, Ack: 1, Len: 45
> Secure Socket Layer
>     SSLv2 Record Layer: Client Hello
>         Length: 43
>         Handshake Message Type: Client Hello (1)
>         Version: SSL 2.0 (0x0002)
>         Cipher Spec Length: 18
>         Session ID Length: 0
>         Challenge Length: 16
>         Cipher Specs (6 specs)
>         Challenge
> 
> 
> 
> From the 2nd session - session key is passed:
> No.     Time        Source                Destination         
>   Protocol
> Info
>     434 21.122999   10.129.149.250        204.151.176.150       SSLv2
> Client Hello
> 
> Frame 434 (115 bytes on wire, 115 bytes captured)
> Ethernet II, Src: 00:08:02:da:21:42, Dst: 00:00:0c:07:ac:00
> Internet Protocol, Src Addr: 10.129.149.250 (10.129.149.250), 
> Dst Addr:
> 204.151.176.150 (204.151.176.150)
> Transmission Control Protocol, Src Port: 1690 (1690), Dst Port: https
> (443), Seq: 1, Ack: 1, Len: 61
> Secure Socket Layer
>     SSLv2 Record Layer: Client Hello
>         Length: 59
>         Handshake Message Type: Client Hello (1)
>         Version: SSL 2.0 (0x0002)
>         Cipher Spec Length: 18
>         Session ID Length: 16
>         Challenge Length: 16
>         Cipher Specs (6 specs)
>         Session ID (16 bytes)
>         Challenge
> 
> 
> 
> Thank you.
> 
> 
> Chuck Borton
> JPMorgan Chase & Co.
> Global Network Engineering
> Office:  614-213-8757
> Cell:  614-477-4334
> Pager:  6144774334@mobile.att.net
> 
> 
> 
> |---------+---------------------------->
> |         |           "Boyle Owen"     |
> |         |           <Owen.Boyle@swx.c|
> |         |           om>              |
> |         |                            |
> |         |           06/13/2005 03:27 |
> |         |           AM               |
> |         |           Please respond to|
> |         |           users            |
> |---------+---------------------------->
>   
> >-------------------------------------------------------------
> -----------------------------------------------------------------|
>   |                                                           
>                                                                    |
>   |       To:       <users@httpd.apache.org>                  
>                                                                    |
>   |       cc:                                                 
>                                                                    |
>   |       Subject:  RE: [users@httpd] Fw: signal Bus error 
> with apache Apache/2.0.54 with SSL pages                      
>         |
>   
> >-------------------------------------------------------------
> -----------------------------------------------------------------|
> 
> 
> 
> 
> You must've missed my earlier plea for plain text... I can't 
> inline quote
> HTML mail.
> 
> Did you cross reference the errors to the access log and find 
> they were
> caused by requests for GIFs? - Yes - the cross reference 
> links mostly to
> gif files but some times html pages or javascript files.
> 
> How are the GIFs obtained - from a file on a local disk or by 
> some magic
> (DB access, generation by a script or external application, proxy from
> another server etc)? - The gifs are on the local disk with no magic.
> 
> Can you reproduce the errors by requesting individual GIFs 
> directly? - Yes.
> I can reproduce the errors at will.
> 
> What is your OS - were there any trauma during compilation? - 
> The os is -
> SunOS ino0s093 5.9 Generic_117171-17 sun4u sparc 
> SUNW,Sun-Fire-280R - there
> were no issues during the compile.
> 
> Rgds,
> Owen Boyle
> Disclaimer: Any disclaimer attached to this message may be ignored.
> 
> 
> -----Original Message-----
> From: charles_e_borton@bankone.com 
> [mailto:charles_e_borton@bankone.com]
> Sent: Samstag, 11. Juni 2005 06:00
> To: users@httpd.apache.org
> Subject: RE: [users@httpd] Fw: signal Bus error with apache 
> Apache/2.0.54
> with SSL pages
> 
> 
> 
> Boyle,
> 
> Thanks for the info.
> 
> When I upgraded to 2.0, I did  clean compile and installed into a new
> directory.  Based upon your comments, I checked by startup 
> script to verify
> that I'm not referring to any old libraries.  All references 
> are to apache
> 2 directories.
> 
> The problem I'm experiencing (around 60% of all SSL pages but 
> not normal
> pages) is occurring on straight html pages with gif images.   
> For example,
> if I load a page with 10 gif images, I may get success on 4 images and
> failure and bus errors on 6.  Usually by the 3rd refresh, I 
> get all of the
> images.   It's not restricted to just images.  Sometimes, a 
> straight html
> page or javascript file will fail with the same bus error.
> 
> Any other suggestions?
> 
> One question I have - what is the minimum version of openssl that is
> required with apache 2.0?  I have - openssl-0.9.6l.
> 
> Thank you.
> 
> 
> Chuck Borton
> JPMorgan Chase & Co.
> Global Network Engineering
> Office:  614-213-8757
> Cell:  614-477-4334
> Pager:  6144774334@mobile.att.net
> 
> 
> 
> Charles E Borton "Boyle Owen" <Owen.Boyle@swx.com>
> 06/09/2005 05:08 AM
> Please respond to users
>         To:        <users@httpd.apache.org>
>         cc:
>         Subject:        RE: [users@httpd] Fw: signal Bus 
> error with apache
> Apache/2.0.54 with SSL pages
> 
> 
> 
> Plain text please...
> 
> To recap, you upgraded from 1.3 to 2 and now you get occassional bus
> errors.
> 
> My guess is that certain requests are triggering a call to a 
> function in an
> extension module or library and that the module was compiled 
> for 1.3 and is
> not compatible with apache 2.
> 
> To find the request, cross reference, using the timestamp, 
> the error log
> with the access log. That will tell you what module is being 
> accessed. Then
> recompile it for apache 2.
> 
> Rgds,
> Owen Boyle
> Disclaimer: Any disclaimer attached to this message may be ignored.
> 
> 
> -----Original Message-----
> From: charles_e_borton@bankone.com 
> [mailto:charles_e_borton@bankone.com]
> Sent: Mittwoch, 8. Juni 2005 18:50
> To: users@httpd.apache.org
> Subject: [users@httpd] Fw: signal Bus error with apache 
> Apache/2.0.54 with
> SSL pages
> 
> 
> 
> All,
> 
> My apologies.  I forgot to include the error message:
> 
> [Wed Jun 08 11:11:37 2005] [notice] child pid 14430 exit 
> signal Bus error
> (10)
> 
> Thank you.
> 
> 
> Chuck Borton
> JPMorgan Chase & Co.
> Global Network Engineering
> Office:  614-213-8757
> Cell:  614-477-4334
> Pager:  6144774334@mobile.att.net
> 
> ----- Forwarded by Charles E Borton/OH/ONE on 06/08/2005 
> 12:45 PM -----
> Charles E Borton Charles E Borton
> 06/08/2005 11:33 AM
>        To:        users@httpd.apache.org
>        cc:
>        Subject:        signal Bus error with apache 
> Apache/2.0.54 with SSL
> pages
> 
> 
> Hi,
> 
> I have recently upgraded to 2.0.54 from 1.3.29.
> 
> In my new install, when users try to access the HTTPs portion 
> of my site,
> they get some (around 605) broken links (often on images but 
> sometime on
> whole pages).
> 
> The broken links map to errors in the error log that look like this:
> 
> Has anyone seen this before?
> 
> Thank you.
> 
> 
> Chuck Borton
> JPMorgan Chase & Co.
> Global Network Engineering
> Office:  614-213-8757
> Cell:  614-477-4334
> Pager:  6144774334@mobile.att.net
> 
> 
> This transmission may contain information that is privileged, 
> confidential
> and/or exempt from disclosure under applicable law. If you are not the
> intended recipient, you are hereby notified that any 
> disclosure, copying,
> distribution, or use of the information contained herein 
> (including any
> reliance thereon) is STRICTLY PROHIBITED. If you received 
> this transmission
> in error, please immediately contact the sender and destroy 
> the material in
> its entirety, whether in electronic or hard copy format. Thank you.
> Diese E-mail ist eine private und persönliche Kommunikation. 
> Sie hat keinen
> Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Gruppe. 
> This e-mail is of
> a private and personal nature. It is not related to the exchange or
> business activities of the SWX Group. Le présent e-mail est un message
> privé et personnel, sans rapport avec l'activité boursière du 
> Groupe SWX.
> 
> 
> This message is for the named person's use only. It may contain
> confidential, proprietary or legally privileged information. No
> confidentiality or privilege is waived or lost by any 
> mistransmission. If
> you receive this message in error, please notify the sender 
> urgently and
> then immediately delete the message and any copies of it from 
> your system.
> Please also immediately destroy any hardcopies of the 
> message. You must
> not, directly or indirectly, use, disclose, distribute, 
> print, or copy any
> part of this message if you are not the intended recipient. 
> The sender's
> company reserves the right to monitor all e-mail 
> communications through
> their networks. Any views expressed in this message are those of the
> individual sender, except where the message states otherwise 
> and the sender
> is authorised to state them to be the views of the sender's company.
> 
> ---------------------------------------------------------------------
> The official User-To-User support forum of the Apache HTTP 
> Server Project.
> See <URL:http://httpd.apache.org/userslist.html> for more info.
> To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
>   "   from the digest: users-digest-unsubscribe@httpd.apache.org
> For additional commands, e-mail: users-help@httpd.apache.org
> 
> ---------------------------------------------------------------------
> The official User-To-User support forum of the Apache HTTP 
> Server Project.
> See <URL:http://httpd.apache.org/userslist.html> for more info.
> To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
>    "   from the digest: users-digest-unsubscribe@httpd.apache.org
> For additional commands, e-mail: users-help@httpd.apache.org
> 
> 
> 
> 
> ---------------------------------------------------------------------
> The official User-To-User support forum of the Apache HTTP 
> Server Project.
> See <URL:http://httpd.apache.org/userslist.html> for more info.
> To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
>    "   from the digest: users-digest-unsubscribe@httpd.apache.org
> For additional commands, e-mail: users-help@httpd.apache.org
> 
>
 
 
This message is for the named person's use only. It may contain confidential, proprietary
or legally privileged information. No confidentiality or privilege is waived or lost by any
mistransmission. If you receive this message in error, please notify the sender urgently and
then immediately delete the message and any copies of it from your system. Please also immediately
destroy any hardcopies of the message. You must not, directly or indirectly, use, disclose,
distribute, print, or copy any part of this message if you are not the intended recipient.
The sender's company reserves the right to monitor all e-mail communications through their
networks. Any views expressed in this message are those of the individual sender, except where
the message states otherwise and the sender is authorised to state them to be the views of
the sender's company.

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
   "   from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org


Mime
View raw message