On Mon, Oct 03, 2005 at 10:34:28AM -0500, William Rowe wrote: > Joe Orton wrote: > > > >I'm not sure I understand the issue. mod_ssl should already propagate > >the APR_BLOCK_READ down so that blocking ap_get_brigade calls are made > >during the SSL_accept() as far as I can see? Does this fix help? > > > >http://svn.apache.org/viewcvs.cgi?rev=105768&view=rev > > Nope, we go from... > > [Mon Oct 03 07:56:25 2005] [info] Connection to child 0 established > (server www.example.com:8022, client 10.0.8.7) > [Mon Oct 03 07:56:25 2005] [info] Seeding PRNG with 136 bytes of entropy > [Mon Oct 03 07:56:25 2005] [info] SSL handshake interrupted by system > [Hint: Stop button pressed in browser?!] > [Mon Oct 03 07:56:25 2005] [info] Connection to child 0 closed with > abortive shutdown(server www.example.com:8022, client 10.0.8.7) > > to... > > [Mon Oct 03 08:28:50 2005] [info] Connection to child 0 established > (server www.example.com:8022, client 10.0.8.7) > [Mon Oct 03 08:28:50 2005] [info] Seeding PRNG with 136 bytes of entropy > > However the client dies immediately.
Dies how, what error, what is the server left doing? This needs further diagnosis; truss the server, loglevel debug output, etc. Does it work on the trunk? > Reproducing is easy, simply load mod_echo.c, add 'ProtocolEcho on' to > the SSL VHost section, then openssl s_client --crlf --connect foo:8443 > ... it's really that easy. Works fine for me here on Linux as you say. You're right that there is platform-specific behaviour here of course, I always get confused about SO_NONBLOCK. joe
