Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 2F305200B54 for ; Thu, 28 Jul 2016 17:34:55 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 2C002160A85; Thu, 28 Jul 2016 15:34:55 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 724EA160A56 for ; Thu, 28 Jul 2016 17:34:54 +0200 (CEST) Received: (qmail 3481 invoked by uid 500); 28 Jul 2016 15:34:53 -0000 Mailing-List: contact users-help@subversion.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@subversion.apache.org Received: (qmail 3468 invoked by uid 99); 28 Jul 2016 15:34:53 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 28 Jul 2016 15:34:53 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id E09CC1A7E62 for ; Thu, 28 Jul 2016 15:34:52 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -2.216 X-Spam-Level: X-Spam-Status: No, score=-2.216 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_BL=0.01, RCVD_IN_MSPIKE_L5=0.001, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd2-us-west.apache.org (amavisd-new); dkim=pass (1024-bit key) header.d=wp.pl Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id SppUJvBFce92 for ; Thu, 28 Jul 2016 15:34:51 +0000 (UTC) Received: from mx4.wp.pl (mx4.wp.pl [212.77.101.11]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTPS id 4B1F35F1B3 for ; Thu, 28 Jul 2016 15:34:51 +0000 (UTC) Received: (wp-smtpd smtp.wp.pl 29301 invoked from network); 28 Jul 2016 17:34:37 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wp.pl; s=1024a; t=1469720077; bh=qcvoCyWsizAviYbH9vTYHhuW8VWtdxamNX1Ndp7+CJo=; h=Subject:To:From; b=kbus9SdzsU3NaQGhHpwsbZAthsZ3o0BEsAO8swaW69jJ0kiTsN2ZjMzoTkjzMcY9t citg49OtTBty+ix1ICVKOg3/rzFfWgc6b5Mf6Nh8H1A/9fgE5B8kwTgzHZ/S3QYOEP 2Fc1R1OwJSBhOqwLZ2V4UzUuS057vm/wcLCSvDHI= Received: from user-164-126-136-150.play-internet.pl (HELO [192.168.2.132]) (deadwood@[164.126.136.150]) (envelope-sender ) by smtp.wp.pl (WP-SMTPD) with ECDHE-RSA-AES256-SHA encrypted SMTP for ; 28 Jul 2016 17:34:37 +0200 Subject: Re: Authentication problem with clients > 1.7.22 To: users@subversion.apache.org References: <2a3e5af7-9649-025e-154d-216ec27de94c@wp.pl> <20160728080152.GA10889@byrne.stsp.name> From: Krzysztof Smiechowicz Message-ID: <7fa7eec4-cf83-d52a-6d48-79b1b456dbe3@wp.pl> Date: Thu, 28 Jul 2016 17:34:36 +0200 User-Agent: Mozilla/5.0 (X11; Linux i686; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: <20160728080152.GA10889@byrne.stsp.name> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-WP-MailID: fd5ff08c68ca94c9c6f3566377db4221 X-WP-AV: skaner antywirusowy poczty Wirtualnej Polski S. A. X-WP-SPAM: NO 000000A [0YNk] archived-at: Thu, 28 Jul 2016 15:34:55 -0000 W dniu 28.07.2016 o 10:01, Stefan Sperling pisze: > On Wed, Jul 27, 2016 at 06:56:46PM +0200, Krzysztof Smiechowicz wrote: >> Hi All, >> >> We are having problems accessing our svn server via https with client newer >> than 1.7.22 - 1.8.16 and 1.9.3 to be specific. The problem is that the newer >> clients come up with authentication request during svn checkout which after >> entering correct password fails. The authentication comes at random moments >> during checkout. The difference we could spot so far was that 1.7.22 was >> using ra_neon and newer clients are using ra_serf for HTTPS. > > My guess is that you need to increase the MaxKeepAliveRequests setting > in httpd.conf on the SVN server. > > Once the MaxKeepAliveRequests limit is reached the server closes the > connection so the client opens a new one and authenticates again. > > Serf-based clients send a lot more requests than Neon-based clients. > It seems the Neon-based clients do not trigger the limit in your > situations, while Serf-based clients do. > Hello, Thank you for reply. We set this setting to 0 (unlimited), but the problem persists. Should this be entered into Subversion bugtracker? Best regards, Krzysztof