DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ· RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=34716>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ· INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=34716 ------- Additional Comments From [EMAIL PROTECTED] 2005-12-07 23:08 ------- (In reply to comment #23) > You are all clear in the understanding that the various 'firewall' software > products, anti-virus 'internet protection', and other add ins all insert > themselves into the network socket stack? > > Some of the vendors of this software haven't implemented (correctly) the > entire WinSock2 advanced API. You can test this by completely disabling > the product and rebooting the machine, and if that fails, uninstalling the > product, rebooting and retesting. > > Also there are several options which cripple Apache to use older API's that > are less likely to demonstrate these bugs in 3rd party socket stack drivers, > you can try adding these directives globally to your server, one at a time, > and report back which directive did resolve this double-headers bug; > > Win32DisableAcceptEx > EnableSendfile off > EnableMMap off > > I'm not excluding the possibility of a bug, but trying to narrow down under > what conditions the bug might exhibit itself, and at least getting your > servers up and operating. > > Those others who see this flaw, what extra software (MS Firewall, AV products, > etc) are you running on the sockets? > > Ok thanks for the hints. Found the problem, my virusscanner (NOD32 2.50.25 mod: IMON) was messing up the headers. Apache (mod_proxy) is working perfect now. Thanks Again. -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
