DO NOT REPLY [Bug 48236] another workaround for CVE-2009-3555 for the BIO connector

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48236

Ralf Hauser  changed:

   What|Removed |Added

 CC||more...@privasphere.com

--- Comment #4 from Ralf Hauser  2009-11-19 22:00:46 UTC ---
Are there any junit or rather httpclient/httpunit tests for this?
Or at least a detailed test script (e.g. documented in a wiki)?

Looking forward to the new patch.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: svn commit: r882320 - in /tomcat/trunk/java/org/apache/tomcat/util/net/jsse: JSSESocketFactory.java JSSESupport.java

2009-11-19 Thread Bill Barker
This looks like it should work (haven't tested it yet), but hoping that 
there are people that can test on non-Sun JVMs to see if there could be 
problems.  This patch is a little heavy on knowing how the JVM implements 
things :(.

 wrote in message 
news:20091119220644.2d8f42388...@eris.apache.org...
> Author: markt
> Date: Thu Nov 19 22:06:43 2009
> New Revision: 882320
>
> URL: http://svn.apache.org/viewvc?rev=882320&view=rev
> Log:
> Improve workaround for CVE-2009-3555
> On the plus side, it doesn't rely on an async event to close the 
> connection
> On the down side, I haven't yet found a way to log client initiated 
> handshakes before they get closed
>
> Modified:
> 
> tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
>tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESupport.java
>
> Modified: 
> tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
> URL: 
> http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java?rev=882320&r1=882319&r2=882320&view=diff
> 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r882369 - /tomcat/tc5.5.x/trunk/STATUS.txt

2009-11-19 Thread markt
Author: markt
Date: Fri Nov 20 00:50:20 2009
New Revision: 882369

URL: http://svn.apache.org/viewvc?rev=882369&view=rev
Log:
Propose alternative fix

Modified:
tomcat/tc5.5.x/trunk/STATUS.txt

Modified: tomcat/tc5.5.x/trunk/STATUS.txt
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/STATUS.txt?rev=882369&r1=882368&r2=882369&view=diff
==
--- tomcat/tc5.5.x/trunk/STATUS.txt (original)
+++ tomcat/tc5.5.x/trunk/STATUS.txt Fri Nov 20 00:50:20 2009
@@ -250,4 +250,11 @@
   http://people.apache.org/~markt/patches/2009-11-17-cookie-allow-equals.patch
   +1: markt
   -1: 
-  
\ No newline at end of file
+
+* Alternative fix for CVE-2009-3555 SSL MITN
+  The current patch uses an async callback to close the socket. It is
+  technically possible an attack may suceed before the socket is closed
+  The new patch only logs failed server initiated negotiations 
+  http://people.apache.org/~markt/patches/2009-11-20-cve2009-3555-v2.patch
+  +1: markt
+  -1: 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r882368 - /tomcat/tc6.0.x/trunk/STATUS.txt

2009-11-19 Thread markt
Author: markt
Date: Fri Nov 20 00:50:06 2009
New Revision: 882368

URL: http://svn.apache.org/viewvc?rev=882368&view=rev
Log:
Propose alternative fix

Modified:
tomcat/tc6.0.x/trunk/STATUS.txt

Modified: tomcat/tc6.0.x/trunk/STATUS.txt
URL: 
http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/STATUS.txt?rev=882368&r1=882367&r2=882368&view=diff
==
--- tomcat/tc6.0.x/trunk/STATUS.txt (original)
+++ tomcat/tc6.0.x/trunk/STATUS.txt Fri Nov 20 00:50:06 2009
@@ -396,3 +396,11 @@
   http://people.apache.org/~markt/patches/2009-11-17-cookie-allow-equals.patch
   +1: markt
   -1: 
+
+* Alternative fix for CVE-2009-3555 SSL MITN
+  The current patch uses an async callback to close the socket. It is
+  technically possible an attack may suceed before the socket is closed
+  The new patch only logs failed server initiated negotiations 
+  http://people.apache.org/~markt/patches/2009-11-20-cve2009-3555-v2.patch
+  +1: markt
+  -1: 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



SSL MITM status update

2009-11-19 Thread Mark Thomas
Feedback / comments on the info below. I'd like to get it out to users@
and announce@ fairly soon.

Cheers,

Mark

===

Overview


Work on the root cause is progressing but is still in a state of flux.
The purpose of this update is provide information on the current
understanding so users are better informed when making decisions
regarding risk mitigation for this issue in their environment.


BIO Connector
=

The HTTP BIO connector that ships with 6.0.20 and 5.5.28 supports client
and server initiated negotiation and is vulnerable to CVE-2009-3555.

A patch [1] has been applied to trunk, 6.0.x and 5.5.x that provides an
option to disable renegotiation. This patch has an issue in that it uses
an asynchronous callback to close the connection when a handshake is
detected. It is theoretically possible for an attack to complete before
the connection is closed. When negotiation is disabled, both server and
client initiated attempts to renegotiate are logged.

An updated patch [2] has been applied to trunk and proposed for 6.0.x
and 5.5.x that resolves the asynchronous concerns but only logs server
initiated renegotiation.

Users of 6.0.20, 5.5.28 and earlier versions can apply either of the
patches. It will be necessary to build Tomcat from source to use these
patches.

Testing with both these patches has shown that using the connector
attributes clientAuth="want" and allowUnsafeLegacyRenegotiation="false"
provides a similar user experience during negotiation to
clientAuth="false" and allowUnsafeLegacyRenegotiation="true" although
this may vary by application.

It is anticipated that 6.0.21 and 5.5.29 releases will be made once the
situation stabilises and the Tomcat development team is confident that
further changes will not be required.


NIO Connector
=

The HTTP NIO connector that ships with 6.0.20 and 5.5.28 does not
support client or server initiated renegotiation and is therefore not
vulnerable to CVE-2009-3555.

As and when negotiation support is added to the NIO connector, it will
support the allowUnsafeLegacyRenegotiation connector attribute and
behave in a similar manner to the HTTP BIO connector.


APR / native Connector
==

Behaviour of the APR/native connector depends on the version of the
APR/native connector and on the version of OpenSSL that the connector is
build with. Versions prior to APR/native 1.1.16 are not discussed.

The windows binaries available from the ASF have been built with the
following OpenSSL versions:

APR/native  OpenSSL
1.1.16  0.9.8i
1.1.17  0.9.8l
1.1.18  0.9.8k - TBC

Any version of the APR/native connector built with OpenSSl 0.9.8l will
not support client or server initiated negotiation and will, therefore,
not be vulnerable to CVE-2009-3555.

Client initiated negotiation is supported in 1.1.16 and 1.1.17. These
versions are, therefore, vulnerable to CVE-2009-3555 unless built with
OpenSSL 0.9.8l.

Client initiated negotiation has been disabled in 1.1.18. Therefore,
this version is not vulnerable to CVE-2009-3555 via client initiated
renegotiation although it may still be vulnerable via server initiated
renegotiation.

Server initiated renegotiation is supported in 1.1.17 onwards.
Therefore, 1.1.17 onwards is vulnerable to CVE-2009-3555 via server
initiated renegotiation unless the APR/native connector is built with
OpenSSL 0.9.8l.




-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r882320 - in /tomcat/trunk/java/org/apache/tomcat/util/net/jsse: JSSESocketFactory.java JSSESupport.java

2009-11-19 Thread markt
Author: markt
Date: Thu Nov 19 22:06:43 2009
New Revision: 882320

URL: http://svn.apache.org/viewvc?rev=882320&view=rev
Log:
Improve workaround for CVE-2009-3555
On the plus side, it doesn't rely on an async event to close the connection
On the down side, I haven't yet found a way to log client initiated handshakes 
before they get closed

Modified:
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESupport.java

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java?rev=882320&r1=882319&r2=882320&view=diff
==
--- tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java 
Thu Nov 19 22:06:43 2009
@@ -42,8 +42,6 @@
 import java.util.Vector;
 
 import javax.net.ssl.CertPathTrustManagerParameters;
-import javax.net.ssl.HandshakeCompletedEvent;
-import javax.net.ssl.HandshakeCompletedListener;
 import javax.net.ssl.KeyManager;
 import javax.net.ssl.KeyManagerFactory;
 import javax.net.ssl.ManagerFactoryParameters;
@@ -159,42 +157,23 @@
 SSLSocket asock = null;
 try {
  asock = (SSLSocket)socket.accept();
- if (!allowUnsafeLegacyRenegotiation) {
- asock.addHandshakeCompletedListener(
- new DisableSslRenegotiation());
- }
 } catch (SSLException e){
   throw new SocketException("SSL handshake error" + e.toString());
 }
 return asock;
 }
 
-private static class DisableSslRenegotiation 
-implements HandshakeCompletedListener {
-private volatile boolean completed = false;
-
-public void handshakeCompleted(HandshakeCompletedEvent event) {
-if (completed) {
-try {
-log.warn("SSL renegotiation is disabled, closing 
connection");
-event.getSession().invalidate();
-event.getSocket().close();
-} catch (IOException e) {
-// ignore
-}
-}
-completed = true;
-}
-}
-
-
 @Override
 public void handshake(Socket sock) throws IOException {
-//we do getSession instead of startHandshake() so we can call this 
multiple times
+// We do getSession instead of startHandshake() so we can call this 
multiple times
SSLSession session = ((SSLSocket)sock).getSession();
 if (session.getCipherSuite().equals("SSL_NULL_WITH_NULL_NULL"))
throw new IOException("SSL handshake failed. Ciper suite in SSL 
Session is SSL_NULL_WITH_NULL_NULL");
-   //((SSLSocket)sock).startHandshake();
+
+if (!allowUnsafeLegacyRenegotiation) {
+// Prevent futher handshakes by removing all cipher suites
+((SSLSocket) sock).setEnabledCipherSuites(new String[0]);
+}
 }
 
 /*

Modified: tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESupport.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESupport.java?rev=882320&r1=882319&r2=882320&view=diff
==
--- tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESupport.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESupport.java Thu Nov 
19 22:06:43 2009
@@ -149,6 +149,15 @@
 ssl.setNeedClientAuth(true);
 }
 
+if (ssl.getEnabledCipherSuites().length == 0) {
+// Handshake is never going to be successful.
+// Assume this is because handshakes are disabled
+log.warn("SSL server initiated renegotiation is disabled, closing 
connection");
+session.invalidate();
+ssl.close();
+return;
+}
+
 InputStream in = ssl.getInputStream();
 int oldTimeout = ssl.getSoTimeout();
 ssl.setSoTimeout(1000);
@@ -171,10 +180,7 @@
 break;
 }
 }
-// If legacy re-negotiation is disabled, socked could be closed here 
-if (!ssl.isClosed()) {
-ssl.setSoTimeout(oldTimeout);
-}
+ssl.setSoTimeout(oldTimeout);
 if (listener.completed == false) {
 throw new SocketException("SSL Cert handshake timeout");
 }



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48236] another workaround for CVE-2009-3555 for the BIO connector

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48236

--- Comment #3 from Mark Thomas  2009-11-19 13:41:24 GMT ---
Testing has been positive. I ended up keeping the listener from the original
patch to log the handshake attempts. I'm not so concerned about the logging
being in a separate thread and it was the easiest (only?) way to hook into the
client triggered handshakes.

Patch to trunk will follow shortly.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48236] another workaround for CVE-2009-3555 for the BIO connector

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48236

Mark Thomas  changed:

   What|Removed |Added

 CC||hau...@acm.org

--- Comment #2 from Mark Thomas  2009-11-19 13:38:59 GMT ---
*** Bug 48158 has been marked as a duplicate of this bug. ***

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48158] warn that "per directory client certificate authentication" is harmful

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48158

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||DUPLICATE

--- Comment #10 from Mark Thomas  2009-11-19 13:38:59 GMT ---
The warning has already gone out to users@, dev@ and announce@

The actual patch is currently being tracked in bug48236. That eventual patch
for bug48236 will be ported to 5.5.x and 6.0.x.

*** This bug has been marked as a duplicate of bug 48236 ***

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48192] Allow to specify the SSLSocket class in connector tag of server.xml

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48192

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||WONTFIX

--- Comment #2 from Mark Thomas  2009-11-19 13:37:27 GMT ---
Assuming this enhancement request is solely to address CVE-2009-3555, then I am
closing this as WONTFIX as this is not the solution that will be implemented.

Current thinking is that the solution to CVE-2009-3555 will be based on the
solution proposed in bug48236 combined logging based on the original patch ie
r881774.

If there are other reasons for wanting this enhancement, feel free to re-open
this issue. Enhancement requests with patches are more likely to be applied
sooner.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: Tomcat Native patch - adding dynamic locking callbacks for openssl engines

2009-11-19 Thread Mladen Turk

On 11/19/2009 08:39 PM, Daniel Ruggeri wrote:

All;
Hello. I have been using Tomcat and TCNative for quite a while now, but
have just now subscribed to this list so I may contribute a proposed
patch. Since I am new, please be patient if I'm doing things wrong -
I've RTFM, but that only goes so far.



Can you please create bugzilla issue and attach a patch to it.

https://issues.apache.org/bugzilla/query.cgi?product=Tomcat%20Native

> I'm also used to

patches including information in the CHANGELOG file, but it seems
TCNative doesn't do things that way?



It's inside xdocs/miscellaneous/changelog.xml

Regards
--
TM

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Tomcat Native patch - adding dynamic locking callbacks for openssl engines

2009-11-19 Thread Daniel Ruggeri




All;
   Hello. I have been using Tomcat and TCNative for quite a while now,
but have just now subscribed to this list so I may contribute a
proposed patch. Since I am new, please be patient if I'm doing things
wrong - I've RTFM, but that only goes so far.

   The attached patch adds dynamic locking callbacks needed by certain
engines in OpenSSL (chil, specifically). Most of this code was poached
from HTTPD 2.2.x mod_ssl (ssl_util.c). The notable differences to
TCNative after applying the patch are that the call to ssl_thread_setup
had to be moved before the engine is initialized since the callbacks
must be set before engine init, and the dynamic callback functions were
added to ssl_thread_setup.

   I am attaching the proposed patch to this email, but please let me
know
what it would take to have it properly committed and offer any
suggestions that may relate to the patch itself. I'm also used to
patches including information in the CHANGELOG file, but it seems
TCNative doesn't do things that way?

Thanks for your time
-- 

--




diff -Nru tomcat-native-1.1.16-src/jni/native/include/ssl_private.h 
tomcat-native-1.1.16-src-dynamic_callbacks/jni/native/include/ssl_private.h
--- tomcat-native-1.1.16-src/jni/native/include/ssl_private.h   2006-10-21 
17:16:34.0 -0500
+++ tomcat-native-1.1.16-src-dynamic_callbacks/jni/native/include/ssl_private.h 
2009-11-19 09:10:58.630479400 -0600
@@ -292,3 +292,13 @@
 int SSL_callback_SSL_verify(int, X509_STORE_CTX *);
 int SSL_rand_seed(const char *file);
 #endif /* SSL_PRIVATE_H */
+
+/* Global reference to the pool used by the dynamic mutexes */
+apr_pool_t *dynlockpool;
+
+/**
+ * Dynamic lock callback functions
+ */
+static struct CRYPTO_dynlock_value *ssl_dyn_create_function(const char *file, 
int line);
+static void ssl_dyn_lock_function(int mode, struct CRYPTO_dynlock_value *l, 
const char *file, int line);
+static void ssl_dyn_destroy_function(struct CRYPTO_dynlock_value *l, const 
char *file, int line);
diff -Nru tomcat-native-1.1.16-src/jni/native/src/ssl.c 
tomcat-native-1.1.16-src-dynamic_callbacks/jni/native/src/ssl.c
--- tomcat-native-1.1.16-src/jni/native/src/ssl.c   2007-04-03 
09:16:23.0 -0500
+++ tomcat-native-1.1.16-src-dynamic_callbacks/jni/native/src/ssl.c 
2009-11-19 09:10:40.567979400 -0600
@@ -213,6 +213,12 @@
 UNREFERENCED(data);
 CRYPTO_set_locking_callback(NULL);
 CRYPTO_set_id_callback(NULL);
+CRYPTO_set_dynlock_create_callback(NULL);
+CRYPTO_set_dynlock_lock_callback(NULL);
+CRYPTO_set_dynlock_destroy_callback(NULL);
+
+dynlockpool = NULL;
+
 /* Let the registered mutex cleanups do their own thing
  */
 return APR_SUCCESS;
@@ -233,6 +239,14 @@
 CRYPTO_set_id_callback(ssl_thread_id);
 CRYPTO_set_locking_callback(ssl_thread_lock);
 
+/* Set up dynamic locking scaffolding for OpenSSL to use at its
+ * convenience.
+ */
+dynlockpool = p;
+CRYPTO_set_dynlock_create_callback(ssl_dyn_create_function);
+CRYPTO_set_dynlock_lock_callback(ssl_dyn_lock_function);
+CRYPTO_set_dynlock_destroy_callback(ssl_dyn_destroy_function);
+
 apr_pool_cleanup_register(p, NULL, ssl_thread_cleanup,
   apr_pool_cleanup_null);
 }
@@ -402,6 +416,9 @@
 OPENSSL_load_builtin_modules();
 #endif
 
+/* Initialize thread support */
+ssl_thread_setup(tcn_global_pool);
+
 #ifndef OPENSSL_NO_ENGINE
 if (J2S(engine)) {
 ENGINE *ee = NULL;
@@ -455,8 +472,6 @@
 apr_pool_cleanup_register(tcn_global_pool, NULL,
   ssl_init_cleanup,
   apr_pool_cleanup_null);
-/* Initialize thread support */
-ssl_thread_setup(tcn_global_pool);
 TCN_FREE_CSTRING(engine);
 return (jint)APR_SUCCESS;
 }
@@ -911,3 +926,109 @@
 }
 
 #endif
+
+/* Dynamic lock structure */
+struct CRYPTO_dynlock_value {
+apr_pool_t *pool;
+const char* file;
+int line;
+apr_thread_mutex_t *mutex;
+};
+
+/*
+ * Dynamic lock creation callback
+ */
+static struct CRYPTO_dynlock_value *ssl_dyn_create_function(const char *file,
+ int line)
+{
+struct CRYPTO_dynlock_value *value;
+apr_pool_t *p;
+apr_status_t rv;
+
+/* 
+ * We need a pool to allocate our mutex.  Since we can't clear
+ * allocated memory from a pool, create a subpool that we can blow
+ * away in the destruction callback. 
+ */
+rv = apr_pool_create(&p, dynlockpool);
+if (rv != APR_SUCCESS) {
+fprintf(stderr, "Failed to create subpool for dynamic lock");
+return NULL;
+}
+
+/*
+fprintf(stderr, "Creating dynamic lock");
+*/
+
+value = (struct CRYPTO_dynlock_value *)apr_palloc(p,
+  sizeof(struct 
CRYPTO_dynlock_value));
+if (!value) {
+fprintf(stderr, "Failed to allocate dynamic lock structure");
+return NULL;
+

svn commit: r882231 - in /tomcat/trunk: java/org/apache/catalina/connector/ java/org/apache/coyote/http11/ java/org/apache/tomcat/util/net/ java/org/apache/tomcat/util/net/jsse/ webapps/docs/config/

2009-11-19 Thread markt
Author: markt
Date: Thu Nov 19 18:00:09 2009
New Revision: 882231

URL: http://svn.apache.org/viewvc?rev=882231&view=rev
Log:
Fix SSL for BIO post refactoring
Make attribute names consistent
Endpoints are now responsible for configuring the SSL "engine"
Basics work but still needs more testing
NIO & APR to follow

Modified:
tomcat/trunk/java/org/apache/catalina/connector/Connector.java
tomcat/trunk/java/org/apache/coyote/http11/AbstractHttp11Protocol.java
tomcat/trunk/java/org/apache/tomcat/util/net/AbstractEndpoint.java
tomcat/trunk/java/org/apache/tomcat/util/net/JIoEndpoint.java
tomcat/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
tomcat/trunk/webapps/docs/config/http.xml

Modified: tomcat/trunk/java/org/apache/catalina/connector/Connector.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/connector/Connector.java?rev=882231&r1=882230&r2=882231&view=diff
==
--- tomcat/trunk/java/org/apache/catalina/connector/Connector.java (original)
+++ tomcat/trunk/java/org/apache/catalina/connector/Connector.java Thu Nov 19 
18:00:09 2009
@@ -284,12 +284,8 @@
  replacements.put("connectionLinger", "soLinger");
  replacements.put("connectionTimeout", "soTimeout");
  replacements.put("connectionUploadTimeout", "timeout");
- replacements.put("clientAuth", "clientauth");
- replacements.put("keystoreFile", "keystore");
  replacements.put("randomFile", "randomfile");
  replacements.put("rootFile", "rootfile");
- replacements.put("keystorePass", "keypass");
- replacements.put("keystoreType", "keytype");
  replacements.put("sslProtocols", "protocols");
  }
 

Modified: tomcat/trunk/java/org/apache/coyote/http11/AbstractHttp11Protocol.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/AbstractHttp11Protocol.java?rev=882231&r1=882230&r2=882231&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/AbstractHttp11Protocol.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/AbstractHttp11Protocol.java Thu 
Nov 19 18:00:09 2009
@@ -325,49 +325,68 @@
 public int getSoLinger() { return endpoint.getSoLinger(); }
 public void setSoLinger(int soLinger) { endpoint.setSoLinger(soLinger); }
 
+// JSSE SSL attrbutes
+public String getAlgorithm() { return endpoint.getAlgorithm();}
+public void setAlgorithm(String s ) { endpoint.setAlgorithm(s);}
 
+public String getClientAuth() { return endpoint.getClientAuth();}
+public void setClientAuth(String s ) { endpoint.setClientAuth(s);}
+
 public String getKeystoreFile() { return endpoint.getKeystoreFile();}
 public void setKeystoreFile(String s ) { endpoint.setKeystoreFile(s);}
-public void setKeystore(String s) { setKeystoreFile(s);}
-public String getKeystore(){ return getKeystoreFile();}
-public String getKeyAlias() { return (endpoint).getKeyAlias();}
-public void setKeyAlias(String s ) { (endpoint).setKeyAlias(s);}
-
-
-public String getAlgorithm() { return (endpoint).getAlgorithm();}
-public void setAlgorithm(String s ) { (endpoint).setAlgorithm(s);}
-
-public void setClientauth(String s) {setClientAuth(s);}
-public String getClientauth(){ return getClientAuth();}
-public String getClientAuth() { return (endpoint).getClientAuth();}
-public void setClientAuth(String s ) { (endpoint).setClientAuth(s);}
-
-public String getKeystorePass() { return (endpoint).getKeystorePass();}
-public void setKeystorePass(String s ) { (endpoint).setKeystorePass(s);}
-public void setKeypass(String s) { setKeystorePass(s);}
-public String getKeypass() { return getKeystorePass();}
-public String getKeystoreType() { return (endpoint).getKeystoreType();}
-public void setKeystoreType(String s ) { (endpoint).setKeystoreType(s);}
-public String getKeytype() { return getKeystoreType();}
-public void setKeytype(String s ) { setKeystoreType(s);}
-
-public void setTruststoreFile(String f){(endpoint).setTruststoreFile(f);}
-public String getTruststoreFile(){return (endpoint).getTruststoreFile();}
-public void setTruststorePass(String p){(endpoint).setTruststorePass(p);}
-public String getTruststorePass(){return (endpoint).getTruststorePass();}
-public void setTruststoreType(String t){(endpoint).setTruststoreType(t);}
-public String getTruststoreType(){ return (endpoint).getTruststoreType();}
+
+public String getKeystorePass() { return endpoint.getKeystorePass();}
+public void setKeystorePass(String s ) { endpoint.setKeystorePass(s);}
 
+public String getKeystoreType() { return endpoint.getKeystoreType();}
+public void setKeystoreType(String s ) 

svn commit: r882186 - /tomcat/trunk/java/org/apache/coyote/http11/Http11Protocol.java

2009-11-19 Thread markt
Author: markt
Date: Thu Nov 19 16:05:48 2009
New Revision: 882186

URL: http://svn.apache.org/viewvc?rev=882186&view=rev
Log:
Fix Eclipse warning

Modified:
tomcat/trunk/java/org/apache/coyote/http11/Http11Protocol.java

Modified: tomcat/trunk/java/org/apache/coyote/http11/Http11Protocol.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/Http11Protocol.java?rev=882186&r1=882185&r2=882186&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/Http11Protocol.java (original)
+++ tomcat/trunk/java/org/apache/coyote/http11/Http11Protocol.java Thu Nov 19 
16:05:48 2009
@@ -185,6 +185,7 @@
 
 protected ConcurrentLinkedQueue recycledProcessors = 
 new ConcurrentLinkedQueue() {
+private static final long serialVersionUID = 1L;
 protected AtomicInteger size = new AtomicInteger(0);
 @Override
 public boolean offer(Http11Processor processor) {



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48240] New: Tomcat-Lite missing @Override markers

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48240

   Summary: Tomcat-Lite missing @Override markers
   Product: Tomcat 7
   Version: trunk
  Platform: PC
OS/Version: Windows XP
Status: NEW
  Severity: normal
  Priority: P2
 Component: Modules: tomcat-lite
AssignedTo: dev@tomcat.apache.org
ReportedBy: s...@apache.org


Created an attachment (id=24568)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=24568)
+= @Override; -= (cast)

Lots of missing @Override markers in tomcat-lite

Also a couple of unnecessary casts can be removed.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48239] New: HexUtils exposes public array

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48239

   Summary: HexUtils exposes public array
   Product: Tomcat 7
   Version: trunk
  Platform: PC
OS/Version: Windows XP
Status: NEW
  Severity: normal
  Priority: P2
 Component: Catalina
AssignedTo: dev@tomcat.apache.org
ReportedBy: s...@apache.org


Created an attachment (id=24567)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=24567)
Patch to replace direct array access with getters

HexUtils has two public static arrays which ought to be immutable.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48238] Tomcat-lite won't compile

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48238

--- Comment #2 from Sebb  2009-11-19 07:45:11 UTC ---
Created an attachment (id=24566)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=24566)
ByteChunk.length() => ByteChunk.getLength(); += @Override

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48238] Tomcat-lite won't compile

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48238

--- Comment #1 from Sebb  2009-11-19 07:43:54 UTC ---
Created an attachment (id=24565)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=24565)
Fix bug (sm not init); remove unnecessary casts

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48238] New: Tomcat-lite won't compile

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48238

   Summary: Tomcat-lite won't compile
   Product: Tomcat 7
   Version: trunk
  Platform: PC
OS/Version: Windows XP
Status: NEW
  Severity: normal
  Priority: P2
 Component: Modules: tomcat-lite
AssignedTo: dev@tomcat.apache.org
ReportedBy: s...@apache.org


TL has a couple of errors which mean it won't compile.

Patches to follow

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r882169 - /tomcat/trunk/java/org/apache/catalina/connector/Connector.java

2009-11-19 Thread markt
Author: markt
Date: Thu Nov 19 15:08:03 2009
New Revision: 882169

URL: http://svn.apache.org/viewvc?rev=882169&view=rev
Log:
Fix SSL config error as a result of attribute refactoring.

Modified:
tomcat/trunk/java/org/apache/catalina/connector/Connector.java

Modified: tomcat/trunk/java/org/apache/catalina/connector/Connector.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/connector/Connector.java?rev=882169&r1=882168&r2=882169&view=diff
==
--- tomcat/trunk/java/org/apache/catalina/connector/Connector.java (original)
+++ tomcat/trunk/java/org/apache/catalina/connector/Connector.java Thu Nov 19 
15:08:03 2009
@@ -290,7 +290,6 @@
  replacements.put("rootFile", "rootfile");
  replacements.put("keystorePass", "keypass");
  replacements.put("keystoreType", "keytype");
- replacements.put("sslProtocol", "protocol");
  replacements.put("sslProtocols", "protocols");
  }
 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r882151 - /tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java

2009-11-19 Thread markt
Author: markt
Date: Thu Nov 19 14:05:56 2009
New Revision: 882151

URL: http://svn.apache.org/viewvc?rev=882151&view=rev
Log:
Fix the Eclipse warnings - no functional change

Modified:
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java?rev=882151&r1=882150&r2=882151&view=diff
==
--- tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java 
Thu Nov 19 14:05:56 2009
@@ -116,6 +116,7 @@
 
 
 public JSSESocketFactory () {
+// NOOP
 }
 
 @Override
@@ -207,7 +208,7 @@
 protected String[] getEnabledCiphers(String requestedCiphers,
  String[] supportedCiphers) {
 
-String[] enabledCiphers = null;
+String[] result = null;
 
 if (requestedCiphers != null) {
 Vector vec = null;
@@ -261,14 +262,14 @@
 }   
 
 if (vec != null) {
-enabledCiphers = new String[vec.size()];
-vec.copyInto(enabledCiphers);
+result = new String[vec.size()];
+vec.copyInto(result);
 }
 } else {
-enabledCiphers = sslProxy.getDefaultCipherSuites();
+result = sslProxy.getDefaultCipherSuites();
 }
 
-return enabledCiphers;
+return result;
 }
  
 /*
@@ -526,11 +527,12 @@
 
 kms = kmf.getKeyManagers();
 if (keyAlias != null) {
+String alias = keyAlias;
 if (JSSESocketFactory.defaultKeystoreType.equals(keystoreType)) {
-keyAlias = keyAlias.toLowerCase();
+alias = alias.toLowerCase();
 }
 for(int i=0; i

svn commit: r882148 - /tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java

2009-11-19 Thread markt
Author: markt
Date: Thu Nov 19 14:01:27 2009
New Revision: 882148

URL: http://svn.apache.org/viewvc?rev=882148&view=rev
Log:
Remove unused code

Modified:
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java

Modified: 
tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java?rev=882148&r1=882147&r2=882148&view=diff
==
--- tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java 
(original)
+++ tomcat/trunk/java/org/apache/tomcat/util/net/jsse/JSSESocketFactory.java 
Thu Nov 19 14:01:27 2009
@@ -161,7 +161,6 @@
  asock.addHandshakeCompletedListener(
  new DisableSslRenegotiation());
  }
- configureClientAuth(asock);
 } catch (SSLException e){
   throw new SocketException("SSL handshake error" + e.toString());
 }
@@ -746,17 +745,6 @@
 }
 
 /**
- * Configure Client authentication for this version of JSSE.  The
- * JSSE included in Java 1.4 supports the 'want' value.  Prior
- * versions of JSSE will treat 'want' as 'false'.
- * @param socket the SSLSocket
- */
-protected void configureClientAuth(SSLSocket socket){
-// Per JavaDocs: SSLSockets returned from 
-// SSLServerSocket.accept() inherit this setting.
-}
-
-/**
  * Configures the given SSL server socket with the requested cipher suites,
  * protocol versions, and need for client authentication
  */



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48236] another workaround for CVE-2009-3555 for the BIO connector

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48236

--- Comment #1 from Mark Thomas  2009-11-19 05:44:36 GMT ---
Thanks for the alternative suggestion. I'll do some testign and if all looks
OK, change the way we disable the handshake.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 48236] New: another workaround for CVE-2009-3555 for the BIO connector

2009-11-19 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=48236

   Summary: another  workaround for CVE-2009-3555 for the BIO
connector
   Product: Tomcat 6
   Version: unspecified
  Platform: All
OS/Version: All
Status: NEW
  Severity: major
  Priority: P2
 Component: Connectors
AssignedTo: dev@tomcat.apache.org
ReportedBy: hartmut.k...@adnovum.ch


Since Revision 881774 of org/apache/tomcat/util/net/jsse/JSSESocketFactory.java
SSL renegotiation can be disabled.

That is achieved by a HandshakeCompletedListener. The drawback is, that in the
JSSE from SUN any HandshakeCompletedListener will be invoked by with an own 
thread. (See com.sun.net.ssl.internal.ssl.SSLSocketImpl or the fragment below)

Another way of disabling a SSL renegotiation is to set an empty cipher
list after the initial handshake:

org.apache.tomcat.util.net.jsse.JSSESocketFactory
...
...
public void handshake(Socket sock) throws IOException {

   ((SSLSocket)sock).startHandshake();

if(!allowUnsafeLegacyRenegotiation) {
// disable all ciphers, avoiding any subsequent handshake 
((SSLSocket)sock).setEnabledCipherSuites(new String[0]);
}
}



Regards 
Hartmut



com.sun.net.ssl.internal.ssl.SSLSocketImpl code fragment:

if (handshaker.isDone()) {
sess = handshaker.getSession();
handshaker = null;
connectionState = cs_DATA;

//
// Tell folk about handshake completion, but do
// it in a separate thread.
//
if (handshakeListeners != null) {
HandshakeCompletedEvent event =
new HandshakeCompletedEvent(this, sess);

Thread t = new NotifyHandshakeThread(
handshakeListeners.entrySet(), event);
t.start();
}
}

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: [VOTE] Releasing Apache Tomcat Native 1.1.18

2009-11-19 Thread jean-frederic clere

On 11/19/2009 09:41 AM, Henri Gomez wrote:

It works with the update tarball :


The updated tarball is now available at 
http://tomcat.apache.org/dev/dist/tomcat-connectors/native/source/1.1.18/


Cheers

Jean-Frederic

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r882085 - /tomcat/native/branches/1.1.x/KEYS

2009-11-19 Thread jfclere
Author: jfclere
Date: Thu Nov 19 09:12:57 2009
New Revision: 882085

URL: http://svn.apache.org/viewvc?rev=882085&view=rev
Log:
Put back the old key.

Modified:
tomcat/native/branches/1.1.x/KEYS

Modified: tomcat/native/branches/1.1.x/KEYS
URL: 
http://svn.apache.org/viewvc/tomcat/native/branches/1.1.x/KEYS?rev=882085&r1=882084&r2=882085&view=diff
==
--- tomcat/native/branches/1.1.x/KEYS (original)
+++ tomcat/native/branches/1.1.x/KEYS Thu Nov 19 09:12:57 2009
@@ -48,6 +48,180 @@
 -END PGP PUBLIC KEY BLOCK-
 
 Type Bits/KeyID Date   User ID
+pub   1024D/6210BFC0 2007-03-01
+  Key fingerprint = 3A6F 081D DFD3 DE93 02C3  1329 0F45 0A26 6210 BFC0
+uid  Jean-Frederic Clere 
+
+-BEGIN PGP PUBLIC KEY BLOCK-
+Version: GnuPG v1.4.9 (GNU/Linux)
+
+mQGiBEXmkEIRBACXRXY3PDrrX7Ropn3BQhyas3nlXO78lD2nFfPsF5bAPWFOM15j
+GCQ+gbv5elNQoHHUW3xRb8+ac1gX+UmnX3ZRv7aUb3EfFgIPSK5pc7ZsFcVnZVEP
+5Gas7daUSnnUu3qi7uYGb5HFbF/YwQCM6vbhXoAKtEvxZhXC0m6ZKif/8wCgxD8f
+eXQfHk7ecbeu5TIufJqaqesD/2l+eoLQtMjdEBq7uEoh9MteH+Z33cHvNwNL4K0H
+NwNlvkOb80SlELi+3AiOuRx40HwkFeN+5SEDHGhDJSxqEzvQCja+TuOIS3hXiNjk
+OsjEpQb/4E9mGVsnlFZuuFL8vnq16MgF4hh3FMe3jFMqCAoiV9J6hou/zDs3b/Ha
+a8/DA/9H1McE4p9GRIJA9Y4N1BkyX8+ADKIpAMvHPCzT3yugSz/K4Ifu3CwBkuTi
+le1FZGXsAVL3RrbffAgN0xBsq1EpPkdCdNasK5GhFPSxKcyL7uvN8bZR1JiISWBZ
+4GxhiC2rlXPbc2yFl4WRwCRRUb74/oJZAzFmS+pMiKaV7SyqJrQoSmVhbi1GcmVk
+ZXJpYyBDbGVyZSA8amZjbGVyZUBhcGFjaGUub3JnPohgBBMRAgAgBQJF5pBCAhsD
+BgsJCAcDAgQVAggDBBYCAwECHgECF4AACgkQD0UKJmIQv8DFdwCeIBT2LHKqfYps
+3QuIvrYttQg/t2AAoJInGcOe/URrRu1Ll0hPjd5YhdwWiEYEEBECAAYFAkXsV5MA
+CgkQgLlToEHklGXSMACgve83/VOFOtbpzWFD9rOREZStDXsAnRgBmJnc0QFsIXOc
+dU5Ah9J7/iJtiEYEEBECAAYFAkXxWUQACgkQjxyfqkjBhuytuQCfV4Odj+jKbqnj
+64wxMw5kGHnQZH0An1giH7fn3UH3lBkprW19brvb05CFiJwEEAECAAYFAkX1FikA
+CgkQN+P0X+5l4yFU0wP/WethK81d//omAQDFdolLSF1TaOB+zrAhuYrxy7m72HLo
+zx/7Y+0/1wzMX5V7u7HAe+XFEl9fERB6TNLuxqZ4klY7d7KLIujzEug8sdUH4u4N
+rUSsemRKdbcfvDbkB6J9UvhWnvHSsFgqL7H2cLfBgQFepk+56IB9YrdTNIUZOwaI
+RgQQEQIABgUCRfUW4QAKCRAyyeTONkLLS09FAJ9NL8xU9OYjspKfg0Kk4eburgP8
+nACdF7HZyo9HKKhzJn28PRXX7+3H0b2IRgQQEQIABgUCRjjkzwAKCRAVRbP+4iLe
+T0GZAKCUOipt/K3MzpQ083eS4mVr4R429wCfQEoMiXiHdz+KT07mZXo4QD1O192I
+RgQQEQIABgUCRjjpXAAKCRBj0K2ukRID5L3hAKCP6tsY3xUQBHvvQM4OmQZdfRR9
+pQCdEMFh8Jq1oZuS9LHCTrf7ggjq7zCIRgQTEQIABgUCRjkZrwAKCRDh4fKwmQ7U
+quVOAJ0UW1UrbDCuB4DQ4tAz03sC6FObywCdFH6Xkdq4qX3XgeiezlhOlIBwTlKI
+RgQQEQIABgUCRj4Y1gAKCRA+Km/CXymIJLFXAKCXipHF2Rqxl+dTAA6g3LuP3FF7
+YQCfaNWVxSlmZv+VN33zVznr91ovmgWInAQQAQIABgUCRjoJaAAKCRCazTzAqZ91
+3UEYBADUpDKiPOaWvVydgd1/p7N8UNPVDBCL9z1/fFtu/5Sv70ZycH1LlhPjPJ+M
+0wJJ+YnT6MfCrK9IvUA4EBOLCKUnPXLNRRDSTR9KAZ/MdTcXWDpSeblnzdhtTbIR
+d+jM4WGmTHdf63Ihnbdwk+R+DqXhcC2B5bAehL2uvAlXiJDtgYhGBBARAgAGBQJG
+OgloAAoJEFCOrsUwLaVoQVEAn3BkgA7UBE4ZovfuI7Bp8wsPJFJ6AJ40FDNEFjbe
+t9olf651G7WkpoivGYhGBBARAgAGBQJGOgloAAoJEN26ZLosMS0vQVEAoMcPumxy
+JjF8vRBAyXVSFTM89jGFAKCti+obp2QQw/XlMNspQ/EO5AD8z4hGBBARAgAGBQJG
+PNZeAAoJEJhw7/PxL2Byv2IAnicACjBfpx8eIGGT+fZ4OFFan3cpAJ417eg7IBHC
+p4l178Gi5y0p+wsNTIhGBBMRAgAGBQJGPElkAAoJEEwEKBgxGj3lI0QAnAwZX18Q
+U0pcbHwx9ny6b63MiXcyAJ9XJL4lLkVqIm0uzS3eoLZjBO7ZU4hGBBMRAgAGBQJG
+PaU8AAoJEC65RoKIgXQCOyEAniDyarxoZXRE6rUk4g4lEtCoJvqGAJ9JKFmj6iZi
+uy4UQPoEsPqSWLPEAYhGBBARAgAGBQJGP2YGAAoJEFQiDSzIdBVcoKkAoI49yLAx
++RvUb1j5+Cbb8vYpowwbAJ9k3wfDs78E8s5sYkGbYN85Mu/q24hxBBARAgAxBQJG
+SMVhKhxIZW5uaW5nIFNjaG1pZWRlaGF1c2VuIDxocHNAaW50ZXJtZXRhLmRlPgAK
+CRAyhk5BnIUiK1MuAJ4h7vp1hLjsm7gr2blUvG15e6+PHgCePye70dE1hoVONGNE
+Q+FX27Ql4rmIRgQQEQIABgUCRjj8WAAKCRBz3YwWAVMCNe+mAJwPyecY3Y+auncb
+tiFOj8petNa16wCgkLEilAZsWH8bQzLUu0yZXcrBW1WIRgQQEQIABgUCRj34MQAK
+CRCgctTQQ1jFhEBtAKCOlOOxoqANEF2Zij8Gi1rvK0yTzACfSssIWEFZkgdPxiiW
+r4/+t8FQqVaIRgQQEQIABgUCRj4U6gAKCRACpaYFC35s+nBuAKC5+CCIz88XrRVX
+G3LFbeK9H+aAeACbBGI+y7jAgKLNGBSjOnPB5ajBe9GIRgQQEQIABgUCRj8qcAAK
+CRD1wmAWTO7XX2wCAJ99C+LVaPbN4P1FwU0o6WUadEnZcwCeMithJAFS3Rultu9y
+1HmWLOWFSN6IRgQQEQIABgUCRkC/CQAKCRBtC8c6QFgYNwjoAKCSlNTJj/kNqvAc
+JsC0GKfT+r8RwgCffaiPviX9ertpr+PM8yz+nT6L2ymIRgQQEQIABgUCRkYTTQAK
+CRCiEVrhX2uLciWvAJ9cM9TfSkK1ou7pXypgnHlgPV4PtQCgggWePY2cBTfx+GXU
+StQaZcAgDyaIRgQQEQIABgUCRkxHGwAKCRAfISPDa9hyoGU/AKCrtCvm5B4EQAXe
+EPyKsuPbUWrXowCcDFpFZe1UjXqiwrW1lJrXGUDhR4uJARwEEAECAAYFAkc8uywA
+CgkQGWWFUMMRBhGwIwf7BS+5jxF/dAqG/XZx9BibpENe2hg2QEWzcaH/32gYThUj
+NU/ihqlibTD1vpUUUk7lVL3zMzaJ9x0MweN87sxQ5M/qpwnxdKCXGVvjPt0Py0ej
+elYSbgZ3o+5FcbO0X4J7DfYOXwJ6purzaqlgw5x6iU5xUdfY0lFwFhg9QlkwQISm
+vNBvwxiQU4PIHCq38pjIUPvZXOKkdLPeC8Tl056IgjztUZC4C6VGqHiOHBGLxiQT
+azrUCdu8KFG/be1ddrmRpH/DP+Y37uXIJ/eQxw1B6NWbjt63TWdsi5P2zdSu5RHK
+2ExI5/yQcutDSn0fmsPYCJ32ZYo+euL5NHheVYK0/4icBBABAgAGBQJH/k2KAAoJ
+EDGmPZbsFAuBySsD/3hfokxe76Tm4wgDCKL9m71Pokkv740AXp024QF23ySugGRT
+9PN2jUu/xFhAGoQxF6c2AbZpAXbTc/qvsxlbEvroTb5FsD2VJFwaWLP+SYejY3pr
+QF1STzpI+NbS2UU5RfnI43kBbN+GvSKD57mIlFLUC++RfLsTczqr3aXrEpxliEYE
+EBECAAYFAkZSePIACgkQMsHW7w8UO8F/LwCeKjlz8pbyQfI3ZbNSXtpb1nUOHl8A
+n16zM2BcQkYkRaEnXFnxh7FRU/lniEYEEBECAAYFAkZSePcACgkQy66+OaRsTKGH
+0QCgm9osoC33yu/KoBvPS42LP562oaoAni

Re: [VOTE] Releasing Apache Tomcat Native 1.1.18

2009-11-19 Thread Henri Gomez
It works with the update tarball :

I just used :

./configure --with-apr=/usr/bin
--with-java-home=/System/Library/Frameworks/JavaVM.framework/Versions/Current/
make

got :

total 2544
-rwxr-xr-x  1 henri  staff   186280 19 nov 09:39 libtcnative-1.0.1.18.dylib
drwxr-xr-x  3 henri  staff  102 19 nov 09:39 libtcnative-1.0.1.18.dylib.dSYM
lrwxr-xr-x  1 henri  staff   26 19 nov 09:39 libtcnative-1.0.dylib
-> libtcnative-1.0.1.18.dylib
-rw-r--r--  1 henri  staff  1095088 19 nov 09:39 libtcnative-1.a
lrwxr-xr-x  1 henri  staff   26 19 nov 09:39 libtcnative-1.dylib
-> libtcnative-1.0.1.18.dylib
lrwxr-xr-x  1 henri  staff   19 19 nov 09:39 libtcnative-1.la ->
../libtcnative-1.la
-rw-r--r--  1 henri  staff  907 19 nov 09:39 libtcnative-1.lai



2009/11/19 jean-frederic clere :
> On 11/19/2009 08:51 AM, Henri Gomez wrote:
>>
>> did you run buildconf ?
>
> jnirelease.sh should have done that...
> Investigating...
>
>>
>> I'm running SnowLeopard
>
> I still have to update my box
>
> Cheers
>
> Jean-Frederic
>
>
>>
>> 2009/11/19 jean-frederic clere:
>>>
>>> On 11/18/2009 09:43 PM, Henri Gomez wrote:

 JF, could you provide a new tarball with the configure included.

 I couldn't built it under OS/X since buildconf failed about missing :

 cp: /usr/bin/build/apr_common.m4: No such file or directory
 cp: /usr/bin/build/find_apr.m4: No such file or directory
 cp: /usr/bin/build/install.sh: No such file or directory
 cp: /usr/bin/build/config.guess: No such file or directory
 cp: /usr/bin/build/config.sub: No such file or directory
>>>
>>> Weird it works for me.
>>> +++
>>> macosx:~ jfclere$ uname -a
>>> Darwin macosx.gva.redhat.com 9.8.0 Darwin Kernel Version 9.8.0: Wed Jul
>>> 15
>>> 16:55:01 PDT 2009; root:xnu-1228.15.4~1/RELEASE_I386 i386
>>> +++
>>> Broken apr?
>>>
>>> Cheers
>>>
>>> Jean-Frederic
>>>
>>> -
>>> To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
>>> For additional commands, e-mail: dev-h...@tomcat.apache.org
>>>
>>>
>>
>> -
>> To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: dev-h...@tomcat.apache.org
>>
>>
>
>
> -
> To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: dev-h...@tomcat.apache.org
>
>

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: [VOTE] Releasing Apache Tomcat Native 1.1.18

2009-11-19 Thread jean-frederic clere

On 11/19/2009 08:51 AM, Henri Gomez wrote:

did you run buildconf ?


jnirelease.sh should have done that...
Investigating...



I'm running SnowLeopard


I still have to update my box

Cheers

Jean-Frederic




2009/11/19 jean-frederic clere:

On 11/18/2009 09:43 PM, Henri Gomez wrote:


JF, could you provide a new tarball with the configure included.

I couldn't built it under OS/X since buildconf failed about missing :

cp: /usr/bin/build/apr_common.m4: No such file or directory
cp: /usr/bin/build/find_apr.m4: No such file or directory
cp: /usr/bin/build/install.sh: No such file or directory
cp: /usr/bin/build/config.guess: No such file or directory
cp: /usr/bin/build/config.sub: No such file or directory


Weird it works for me.
+++
macosx:~ jfclere$ uname -a
Darwin macosx.gva.redhat.com 9.8.0 Darwin Kernel Version 9.8.0: Wed Jul 15
16:55:01 PDT 2009; root:xnu-1228.15.4~1/RELEASE_I386 i386
+++
Broken apr?

Cheers

Jean-Frederic

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org




-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org





-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org