Joe Orton wrote:
I'm not sure I understand the issue. mod_ssl should already propagate
the APR_BLOCK_READ down so that blocking ap_get_brigade calls are made
during the SSL_accept() as far as I can see? Does this fix help?
http://svn.apache.org/viewcvs.cgi?rev=105768&view=rev
Nope, we go from...
[Mon Oct 03 07:56:25 2005] [info] Connection to child 0 established
(server www.example.com:8022, client 10.0.8.7)
[Mon Oct 03 07:56:25 2005] [info] Seeding PRNG with 136 bytes of entropy
[Mon Oct 03 07:56:25 2005] [info] SSL handshake interrupted by system
[Hint: Stop button pressed in browser?!]
[Mon Oct 03 07:56:25 2005] [info] Connection to child 0 closed with
abortive shutdown(server www.example.com:8022, client 10.0.8.7)
to...
[Mon Oct 03 08:28:50 2005] [info] Connection to child 0 established
(server www.example.com:8022, client 10.0.8.7)
[Mon Oct 03 08:28:50 2005] [info] Seeding PRNG with 136 bytes of entropy
However the client dies immediately.
Reproducing is easy, simply load mod_echo.c, add 'ProtocolEcho on' to
the SSL VHost section, then openssl s_client --crlf --connect foo:8443
... it's really that easy.
I actually set up a second host on another port. http through mod_ssl
does work, mod_echo does not.
Bill