Hi,
when migrating from Tomcat7 to Tomcat8 for an application using javax-el
expression evaluation on every request, we noticed a significant
performance impact.
Analyzing it, we see that a call sequence like for
ValueExpression.getValue():
ExpressionFactory expressionFactory = new
In response to my question:
I've just (same customer as before) been asked about
ECDHE-ECDSA-CHACHA20-POLY1305 and ECDHE-RSA-CHACHA20-POLY1305
and I can't find either one on the Sun or IBM JSSE cipher lists for
Java 8.
On 3/19/19, 12:34 AM, Peter@Kreuser-Online wrote:
Most certainly only
Java 10 - OK
Java 11 Oracle or Adopt - Fail
Chrome, Edge - OK
Firefox 60, Internet explorer 11 - Fail
Server is in our test environment on Linux. When I tryed to reproduce
this bug on my computer (Windows 10), bug did not occure. On our test
environment it occures irregularly, a few tests
-- Christopher Schultz (cs) wrote 3/12/19:
-- Rich Bowen (rb) wrote 3/6/19:
rb> * Apache Roadshow DC is in [2] weeks. Register now at
rb> https://apachecon.com/usroadshowdc19/
cs> I'll be speaking at this event, and I'd love to meet some
cs> local Tomcat-ers. It's $25 to attend; schedule
On Mon, Mar 18, 2019 at 4:44 PM Igor T wrote:
> success: 1, read 73 bytes for: 109ms
> success: 2, read 73 bytes for: 218ms
> success: 3, read 73 bytes for: 203ms
> success: 4, read 73 bytes for: 203ms
>
You are right there is something wrong here as well, especially since the
On Mon, Mar 18, 2019 at 4:44 PM Igor T wrote:
> > Since 9.0.12 and 16 do the same, I wouldn't look at that at all.
> Something
> > simple like this works in the general case, there must be something
> > specific here. So it's Windows, which some unspecified OpenSSL version.
> >
> > Rémy
>
>
The Apache Tomcat team announces the immediate availability of Apache
Tomcat 9.0.17.
Apache Tomcat 9 is an open source software implementation of the Java
Servlet, JavaServer Pages, Java Unified Expression Language, Java
WebSocket and JASPIC technologies.
Apache Tomcat 9.0.17 is a bugfix and
Thanks for all that data.
Very strange. It is as if the server picks the wrong key to decrypt with.
Given you can reproduce this, I suggest trying different versions of
Java on the server to see if you can determine a pattern.
Also, if you are able to provide a test case that reliably
Not too much bigger than normal and they don't show too much unusual activity.
Definitely not running out of space on the machine if that is what you are
curious about.
Thanks, Louis
-Original Message-
From: John Dale [mailto:jcdw...@gmail.com]
Sent: Saturday, March 16, 2019 4:33 AM
Ok, thanks. As mentioned it is difficult to grab due to timing but I will try
to show the overnight team how to capture a thread dump but for right now I
have change the restart time forward 10 minutes and done put in some other
stop/start jobs for the third party app and will see if that
Hello Mark,
communication is on
https://drive.google.com/open?id=12ZqbgKkHzGKzXk19ssIcJMX6iQBUE4fQ
file 18-03-2019-3-filtered-one-connection.pcapng
There is also full communication log from wireshark and catalina.out.
Critical packet contains data:
17 03 03 01 AB 00 00 00 00 00 00 00 01
Hi James,
> Am 18.03.2019 um 23:49 schrieb James H. H. Lampert :
>
> I've just (same customer as before) been asked about
> ECDHE-ECDSA-CHACHA20-POLY1305
> and ECDHE-RSA-CHACHA20-POLY1305
>
> and I can't find either one on the Sun or IBM JSSE cipher lists for Java 8.
>
Most certainly only
Oh,
and yes I’ve heard about them and used the RSA version!
Peter
> Am 18.03.2019 um 23:49 schrieb James H. H. Lampert :
>
> I've just (same customer as before) been asked about
> ECDHE-ECDSA-CHACHA20-POLY1305
> and ECDHE-RSA-CHACHA20-POLY1305
>
> and I can't find either one on the Sun or IBM
13 matches
Mail list logo