mod_ssl: mod_ssl-2.4.5-1.3.9
OS:      RedHat Linux 6.0 (plus bits of 6.1)

        Previous bug reports (not mine, I just got here) have
discussed the desirability of having runtime configuration for
EAPI_MM_CORE_PATH.  I'd like to illustrate the point.

        Red Hat Linux Professional 6.1 uses mod_ssl-2.4.5-1.3.9.  It
also has EAPI_MM_CORE_PATH *fixed* to "/var/run/httpsd.mm"; the
runtime root can't change this.  This leads to two problems:

1) Multiple servers share the same MM file.  Is this safe?  I'm
   assuming not, in the absence of a reassuring statement from
   someone familiar with the code.

2) Unprivileged users cannot run the server.

        At this point I am uncertain whether RedHat's source kit for
this particular server is actually comprehensive enough for me to
relink with corrected code.  Perhaps I could patch the executable?
Chroot is not an option...

        Now, I realize that RedHat's error isn't really this group's
responsibility, and that consequence (1), above, is already corrected
in the current version of mod_ssl (the pid is appended to the name).
Nontheless, it would really, really help if there were something,
perhaps a command line flag (rather than a directive) that could
override EAPI_MM_CORE_PATH.

        You might also want to be prepared, just in case the screaming
hordes of dissatisfied RedHat Professional customers descend upon your
Web site and invade your mailing list. :-)

        I first composed this message as a modssl bug report in my Web
browser, but when I try to "Submit Bug Report" I get:

    Bug Database
    The system encountered a fatal error
    After command: 
    Received: 
    The last error code was: Connection refused 

                                        Craig Milo Rogers
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to