Joe Orton wrote:

I'm not sure I understand the issue. mod_ssl should already propagate the APR_BLOCK_READ down so that blocking ap_get_brigade calls are made during the SSL_accept() as far as I can see? Does this fix help?

http://svn.apache.org/viewcvs.cgi?rev=105768&view=rev

Nope, we go from...

[Mon Oct 03 07:56:25 2005] [info] Connection to child 0 established (server www.example.com:8022, client 10.0.8.7)
[Mon Oct 03 07:56:25 2005] [info] Seeding PRNG with 136 bytes of entropy
[Mon Oct 03 07:56:25 2005] [info] SSL handshake interrupted by system [Hint: Stop button pressed in browser?!] [Mon Oct 03 07:56:25 2005] [info] Connection to child 0 closed with abortive shutdown(server www.example.com:8022, client 10.0.8.7)

to...

[Mon Oct 03 08:28:50 2005] [info] Connection to child 0 established (server www.example.com:8022, client 10.0.8.7)
[Mon Oct 03 08:28:50 2005] [info] Seeding PRNG with 136 bytes of entropy

However the client dies immediately.

Reproducing is easy, simply load mod_echo.c, add 'ProtocolEcho on' to
the SSL VHost section, then openssl s_client --crlf --connect foo:8443
... it's really that easy.

I actually set up a second host on another port.  http through mod_ssl
does work, mod_echo does not.

Bill

Reply via email to