[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-04-29 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 apk...@icloud.com changed: What|Removed |Added Hardware|PC |Macintosh OS|Linux

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-02-17 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 Aloon changed: What|Removed |Added URL||ad...@apache.org CC|

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-17 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 Joe Orton changed: What|Removed |Added CC||martyn.shakespe...@bt.com --- Comment #13

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-16 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 William A. Rowe Jr. changed: What|Removed |Added Status|NEW |RESOLVED Resolution|---

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-14 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #11 from William A. Rowe Jr. --- Proposed in httpd-2.4/STATUS for backport. -- You are receiving this mail because: You are the assignee for the bug. - To

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-14 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #10 from mike bayer --- so... what's the timeline for this to be released and getting it downstream at least as a downloadable rpm? I'm being hit with this issue daily. also any thoughts on why this issue is not more widespread?

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-10 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #9 from Joe Orton --- Fixed in r1850946. -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail:

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-08 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #8 from William A. Rowe Jr. --- This may be based on a misunderstanding by our developers of the SSL_clear_error() function, as first identified here; https://bz.apache.org/bugzilla/show_bug.cgi?id=62590 -- You are receiving

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-08 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 mike bayer changed: What|Removed |Added Status|NEEDINFO|NEW --- Comment #7 from mike bayer ---

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-08 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 William A. Rowe Jr. changed: What|Removed |Added Status|NEW |NEEDINFO --- Comment #6 from

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-07 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 Jacob Lundberg changed: What|Removed |Added CC||ja...@collegenet.com -- You are

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-06 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #5 from Ruediger Pluem --- (In reply to mike bayer from comment #3) > this is fedora 29 so packages look like: > > openssl-1.1.1-3.fc29.x86_64 > openssl-pkcs11-0.4.8-2.fc29.x86_64 > compat-openssl10-1.0.2o-3.fc29.x86_64 >

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-02 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #3 from mike bayer --- this is fedora 29 so packages look like: openssl-1.1.1-3.fc29.x86_64 openssl-pkcs11-0.4.8-2.fc29.x86_64 compat-openssl10-1.0.2o-3.fc29.x86_64 openssl-libs-1.1.1-3.fc29.x86_64 httpd-tools-2.4.37-5.fc29.x86_64

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-02 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #4 from mike bayer --- >From my end this kind of looks like a pretty big DOS vulnerability, anyone can just run the attacks from that publicly available online tool a few dozen times against any site running the latest Apache and

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-02 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #2 from Joe Orton --- Nice analysis, thanks. What OpenSSL version? Also can you work out what thread 60 is doing, is it spinning inside OPENSSL_init_crypto() ? -- You are receiving this mail because: You are the assignee for

[Bug 63052] CPU at 100% in process after SSL "scan" that logs as AH02042

2019-01-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63052 --- Comment #1 from mike bayer --- OK yup a kind soul on twitter pointed me to the source of these requests and it is https://www.ssllabs.com/ssltest/analyze.html, I hit my server with this and it's that same IP number 64.41.200.103 and it